Логотип exploitDog
bind:CVE-2020-15096
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-15096

Количество 3

Количество 3

nvd логотип

CVE-2020-15096

больше 5 лет назад

In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affected. There are no app-side workarounds, you must update your Electron version to be protected. This is fixed in versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21.

CVSS3: 6.8
EPSS: Низкий
debian логотип

CVE-2020-15096

больше 5 лет назад

In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, the ...

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-6vrv-94jv-crrg

больше 5 лет назад

Context isolation bypass via Promise in Electron

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-15096

In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affected. There are no app-side workarounds, you must update your Electron version to be protected. This is fixed in versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21.

CVSS3: 6.8
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-15096

In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, the ...

CVSS3: 6.8
0%
Низкий
больше 5 лет назад
github логотип
GHSA-6vrv-94jv-crrg

Context isolation bypass via Promise in Electron

CVSS3: 6.8
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу