org.webjars.npm:electron vulnerabilities

  • latest version

    32.0.1

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    3 months ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.npm:electron package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Use After Free

[,32.0.1)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Type Confusion

[,32.0.1)
  • H
Out-of-bounds Read

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

[,1.7.3)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Out-of-Bounds

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Denial of Service (DoS)

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Out-of-Bounds

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Use After Free

[20.0.0,20.3.9) [21.0.0,21.3.4)
  • H
Use After Free

[20.0.0,20.3.9) [21.0.0,21.3.4)
  • H
Use After Free

[20.0.0,20.3.9) [21.0.0,21.3.4)
  • H
Use After Free

[20.0.0,20.3.9) [21.0.0,21.3.4)
  • H
Denial of Service (DoS)

[,32.0.1)
  • H
Use After Free

[20.0.0,20.3.9) [21.0.0,21.3.4)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[20.0.0,20.3.9) [21.0.0,21.3.4)
  • H
Use After Free

[20.0.0,20.3.9) [21.0.0,21.3.4)
  • H
Use After Free

[20.0.0,20.3.9) [21.0.0,21.3.4)
  • M
Access Restriction Bypass

[20.0.0,20.3.9) [21.0.0,21.3.4)
  • M
Access Restriction Bypass

[20.0.0,20.3.9) [21.0.0,21.3.4)
  • H
Heap-based Buffer Overflow

[19.0.0,19.1.8) [20.0.0,20.3.8)
  • H
Use After Free

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Denial of Service (DoS)

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • M
Information Exposure

[,32.0.1)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • M
Improper Input Validation

[,32.0.1)
  • H
Type Confusion

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,32.0.1)
  • H
Out-of-bounds Write

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[18.0.0,18.3.14) [19.0.0,19.1.1)
  • H
Use After Free

[,32.0.1)
  • H
Improper Input Validation

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Denial of Service (DoS)

[,32.0.1)
  • H
Use After Free

[,19.0.15)
  • H
Use After Free

[,32.0.1)
  • M
Improper Authentication

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • M
Access Control Bypass

[,18.3.9) [19.0.0,19.0.12)
  • M
Buffer Overflow

[,18.3.8) [19.0.0,19.0.13)
  • M
Improper Input Validation

[,18.3.8) [19.0.0,19.0.13)
  • M
Information Exposure

[,18.3.9) [19.0.0,19.0.12)
  • H
Denial of Service (DoS)

[,17.4.11) [18.0.0,18.3.7)
  • H
Type Confusion

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Use After Free

[,16.2.6) [17.0.0,17.4.3) [18.0.0,18.2.2)
  • M
Protection Mechanism Failure

[,17.4.9) [18.0.0,18.3.6) [19.0.0,19.0.7)
  • M
Arbitrary File Read

[17.0.0,17.4.8) [18.0.0,18.3.5)
  • H
Use After Free

[,32.0.1)
  • M
Exposure of Resource to Wrong Sphere

[,15.5.6) [16.0.0,16.2.6) [17.0.0,17.2.0) [18.0.0-beta.1,18.0.0)
  • M
Improper Input Validation

[,32.0.1)
  • M
Improper Input Validation

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,15.5.6) [16.0.0-alpha.1,16.2.7) [17.0.0-alpha.1,17.4.5)
  • M
Insecure Defaults

[,32.0.1)
  • H
Use After Free

[,15.5.6) [16.0.0-alpha.1,16.2.7) [17.0.0-alpha.1,17.4.5)
  • H
Use After Free

[,16.2.4) [17.0.0-alpha.1,17.4.2)
  • H
Use After Free

[,15.5.6) [16.0.0-alpha.1,16.2.6) [17.0.0-alpha.1,17.4.4)
  • H
Inappropriate implementation

[,15.5.5) [16.0.0,16.2.6) [17.0.0,17.4.4) [18.0.0,18.2.2)
  • H
Improper Input Validation

[,15.5.4) [16.0.0,16.2.6) [17.0.0,17.4.3) [18.0.0,18.2.2)
  • H
Use After Free

[,15.5.4) [16.0.0,16.2.6) [17.0.0,17.4.3)
  • H
Type Confusion

[,32.0.1)
  • M
Type Confusion

[,32.0.1)
  • M
Improper implementation

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,16.2.5) [17.0.0,17.4.3)
  • M
Inappropriate implementation

[,16.2.5) [17.0.0,17.4.3)
  • H
Use After Free

[,15.5.4) [16.0.0,16.2.5) [17.0.0,17.4.3)
  • M
Inappropriate implementation

[,15.5.4) [16.0.0,16.2.3) [17.0.0,17.4.1)
  • H
Heap-based Buffer Overflow

[13.0.0,14.2.4) [15.0.0,15.3.5)
  • C
Type Confusion

[,32.0.1)
  • M
Information Exposure

[,14.2.8) [15.0.0,15.4.2) [16.0.0,16.2.0)
  • H
Heap-based Buffer Overflow

[14.0.0,14.2.9) [15.0.0,15.4.2) [16.0.0,16.2.0)
  • H
Use After Free

[14.0.0,14.2.8) [15.0.0,15.4.2) [16.0.0,16.2.0)
  • H
Type Confusion

[,32.0.1)
  • M
Use After Free

[,32.0.1)
  • L
Improper Access Control

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Improper Check or Handling of Exceptional Conditions

[,32.0.1)
  • H
Integer Overflow or Wraparound

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • M
Incorrect Authorization

[,32.0.1)
  • H
Incorrect Authorization

[,32.0.1)
  • C
Improper Input Validation

[,32.0.1)
  • M
Improper Control of a Resource Through its Lifetime

[,32.0.1)
  • H
Interger Underflow

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Type Confusion

[,32.0.1)
  • H
Type Confusion

[,13.6.8) [14.0.0,14.2.5) [15.0.0,15.3.6)
  • H
Use After Free

[,13.6.6) [14.0.0,14.2.4) [15.0.0,15.3.5)
  • M
Improper Input Validation

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Type Confusion

[,32.0.1)
  • H
Type Confusion

[,32.0.1)
  • M
Inappropriate Implementation

[,32.0.1)
  • M
Inappropriate Implementation

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • M
Domain Spoofing

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • C
Type Confusion

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • M
Information Exposure

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • M
Exposure of Resource to Wrong Sphere

[,32.0.1)
  • M
Improper Access Control

[,32.0.1)
  • M
Sandbox Bypass

[,12.2.2) [13.0.0,13.5.2) [14.0.0,14.2.0)
  • M
Information Exposure

[,32.0.1)
  • M
Improper Input Validation

[13.0.0,13.5.1) [,12.2.1)
  • H
Use After Free

[13.0.0,13.5.0) [,12.2.0)
  • H
Buffer Overflow

[13.0.0,13.5.0) [,12.2.0)
  • H
Out-of-Bounds

[13.0.0,13.5.0) [,12.2.0)
  • H
Access Restriction Bypass

[13.0.0,13.5.0) [,12.2.0)
  • H
Type Confusion

[,32.0.1)
  • M
Out-of-Bounds

[,32.0.1)
  • M
Heap-based Buffer Overflow

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • M
Use After Free

[,32.0.1)
  • H
Type Confusion

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • C
Out-of-bounds Write

[,32.0.1)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • M
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Race Condition

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Type Confusion

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • L
Out Of Bounds Read

[,10.4.4) [11.0.0,11.4.4) [12.0.0,12.0.6)
  • M
Improper Input Validation

[,11.4.4) [12.0.0,12.0.6)
  • H
Integer Overflow or Wraparound

[,10.4.4) [12.0.0,12.0.6)
  • H
Use After Free

[,11.4.4) [12.0.0,12.0.6)
  • H
Integer Overflow

[,10.4.4)
  • H
Heap-based Buffer Overflow

[,11.4.4)
  • H
Out-of-bounds Read

[11.0.0,11.4.4) [,10.4.4)
  • H
Use After Free

[11.0.0,11.4.4) [,10.4.4)
  • H
Use After Free

[11.0.0,11.4.4) [,10.4.4)
  • C
Out-of-bounds

[11.0.0,11.4.4) [12.0.0,12.0.6) [,10.4.4)
  • H
Use After Free

[,12.0.5)
  • H
Use After Free

[,12.0.5)
  • H
Use After Free

[,12.0.5)
  • H
Use After Free

[,32.0.1)
  • H
Improper Input Validation

[,32.0.1)
  • H
Out-of-bounds Write

[,32.0.1)
  • H
Insecure Defaults

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Heap Buffer Overflow

[,32.0.1)
  • M
Information Exposure

[,32.0.1)
  • H
Out-of-Bounds

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • C
Use After Free

[,32.0.1)
  • H
Insufficient Validation

[,32.0.1)
  • M
Use After Free

[,32.0.1)
  • M
Information Exposure

[,32.0.1)
  • M
Improper Input Validation

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • C
Use After Free

[,32.0.1)
  • H
Out-of-bounds Read

[,32.0.1)
  • M
Information Exposure

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Insufficient Validation

[,32.0.1)
  • H
Improper Validation

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Improper Access Control

[,32.0.1)
  • H
Improper Input Validation

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Heap-based Buffer Overflow

[,32.0.1)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,32.0.1)
  • M
Improper Access Control

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Type Confusion

[,32.0.1)
  • M
Arbitrary File Read

[,7.2.4) [8.0.0,8.2.4)
  • H
Privilege Escalation

[,7.2.4) [8.0.0,8.2.4)
  • H
Privilege Escalation

[,7.2.4) [8.0.0,8.2.4)
  • H
Privilege Escalation

[,6.1.11) [7.0.0,7.2.4) [8.0.0,8.2.4)
  • H
Type Confusion

[,7.3.1)
  • H
Use After Free

[,8.3.1)
  • H
Buffer Overflow

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Improper Validation

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Type Confusion

[,32.0.1)
  • H
Out-of-bounds Write

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • C
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • M
Buffer Underflow

[,6.1.10) [7.0.0,7.2.2) [8.0.0-beta.1,8.2.0)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • M
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Site Isolation Bypass

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Use After Free

[8.0.0,8.4.0)
  • H
Use After Free

[,32.0.1)
  • H
Improper Access Control

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Heap Overflow

[,32.0.1)
  • H
Use After Free

[,32.0.1)
  • H
Out-of-bounds Read

[,32.0.1)
  • H
Arbitrary Code Execution

[,32.0.1)
  • H
Arbitrary Code Execution

[,32.0.1)
  • H
Privilege Escalation

[,0.33.5)
  • H
Use After Free

[,32.0.1)
  • C
Arbitrary Code Execution

[,32.0.1)
  • H
Arbitrary Code Execution

[,32.0.1)
  • H
Arbitrary Code Execution

[,32.0.1)
  • M
URL Spoofing

[,32.0.1)
  • C
Directory Traversal

[,32.0.1)
  • M
Denial of Service (DoS)

[,1.6.8)
  • M
Denial of Service (DoS)

[,1.6.8)
  • M
Cross-site Scripting (XSS)

[,1.6.8)
  • M
Cross-site Scripting (XSS)

[,1.6.8)
  • L
Denial of Service (DoS)

[,1.6.8)
  • C
Arbitrary Code Injection

[,1.4.15)
  • H
Denial of Service (DoS)

[1.3.0,1.3.13) [1.4.0,1.4.11)
  • H
Uninitialized Memory Exposure

[,1.6.1)
  • C
Arbitrary Code Execution

[,32.0.1)

Package versions

1 - 4 of 4 Results
version published direct vulnerabilities
32.0.1 22 Aug, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.7.3 13 Jun, 2017
  • 11
    C
  • 188
    H
  • 47
    M
  • 2
    L
1.3.3 22 Aug, 2016
  • 12
    C
  • 191
    H
  • 51
    M
  • 3
    L
0.4.1 23 Nov, 2015
  • 12
    C
  • 191
    H
  • 51
    M
  • 3
    L