Vulnerabilities > Electronjs > Electron > 7.1.12
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-06-13 | CVE-2022-29257 | Unspecified vulnerability in Electronjs Electron Electron is a framework for writing cross-platform desktop applications using JavaScript (JS), HTML, and CSS. | 7.2 |
2022-06-13 | CVE-2022-29247 | Unspecified vulnerability in Electronjs Electron Electron is a framework for writing cross-platform desktop applications using JavaScript (JS), HTML, and CSS. | 9.8 |
2022-03-22 | CVE-2022-21718 | Missing Authorization vulnerability in Electronjs Electron Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. | 5.0 |
2020-07-07 | CVE-2020-4077 | Unspecified vulnerability in Electronjs Electron In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass. | 9.9 |
2020-07-07 | CVE-2020-4076 | Unspecified vulnerability in Electronjs Electron In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass. | 9.0 |
2020-07-07 | CVE-2020-4075 | Files or Directories Accessible to External Parties vulnerability in Electronjs Electron In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. | 7.5 |
2020-07-07 | CVE-2020-15096 | Unspecified vulnerability in Electronjs Electron In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. | 6.8 |