Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade electron from 23.1.2 to 32.3.0 #129

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

karencapiiro
Copy link

snyk-top-banner

Snyk has created this PR to fix 1 vulnerabilities in the yarn dependencies of this project.

Snyk changed the following file(s):

  • packages/react-devtools/package.json

Note for zero-installs users

If you are using the Yarn feature zero-installs that was introduced in Yarn V2, note that this PR does not update the .yarn/cache/ directory meaning this code cannot be pulled and immediately developed on as one would expect for a zero-install project - you will need to run yarn to update the contents of the ./yarn/cache directory.
If you are not using zero-install you can ignore this as your flow should likely be unchanged.

⚠️ Warning
Failed to update the yarn.lock, please update manually before merging.

Vulnerabilities that will be fixed with an upgrade:

Issue Score
high severity Out-of-bounds Write
SNYK-JS-ELECTRON-8604283
  211  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

@rafikmojr
Copy link
Collaborator

Logo
Checkmarx One – Scan Summary & Details3cfe57dd-2e7b-4605-8992-0fb513864e35

New Issues (181)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2024-12692 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Type Confusion in V8 in Google Chrome versions prior to 131.0.6778.204 allowed a remote attacker to potentially exploit heap corruption via a craft...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-12694 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Use after free in Compositing in Google Chrome versions prior to 131.0.6778.204 allowed a remote attacker to potentially exploit heap corruption vi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-12695 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Out of bounds write in V8 in Google Chrome versions prior to 131.0.6778.204 allowed a remote attacker to execute arbitrary code inside a sandbox vi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-40643 Npm-htmlparser2-3.10.1
detailsRecommended version: 5.0.0
Description: Joplin is a free, open-source note-taking and to-do application. Joplin fails to consider that "<" followed by a non-letter character will not be c...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-40643 Npm-htmlparser2-3.3.0
detailsRecommended version: 5.0.0
Description: Joplin is a free, open-source note-taking and to-do application. Joplin fails to consider that "<" followed by a non-letter character will not be c...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-42461 Npm-elliptic-6.5.4
detailsRecommended version: 6.6.0
Description: In the elliptic package, "ECDSA" signature malleability occurs because "BER-encoded" signatures are allowed which leads to Improper Verification of...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-42461 Npm-elliptic-6.4.0
detailsRecommended version: 6.6.0
Description: In the elliptic package, "ECDSA" signature malleability occurs because "BER-encoded" signatures are allowed which leads to Improper Verification of...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-42461 Npm-elliptic-6.5.3
detailsRecommended version: 6.6.0
Description: In the elliptic package, "ECDSA" signature malleability occurs because "BER-encoded" signatures are allowed which leads to Improper Verification of...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-48949 Npm-elliptic-6.5.3
detailsRecommended version: 6.6.0
Description: The verify function in "lib/elliptic/eddsa/index.js" in the Elliptic versions 4.0.0 through 6.5.5 for Node.js omits "sig.S().gte(sig.eddsa.curve.n)...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-48949 Npm-elliptic-6.5.4
detailsRecommended version: 6.6.0
Description: The verify function in "lib/elliptic/eddsa/index.js" in the Elliptic versions 4.0.0 through 6.5.5 for Node.js omits "sig.S().gte(sig.eddsa.curve.n)...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-48949 Npm-elliptic-6.4.0
detailsRecommended version: 6.6.0
Description: The verify function in "lib/elliptic/eddsa/index.js" in the Elliptic versions 4.0.0 through 6.5.5 for Node.js omits "sig.S().gte(sig.eddsa.curve.n)...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-9369 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Insufficient data validation in Mojo in Google Chrome prior to 129.0.6668.89 allowed a remote attacker who had compromised the renderer process to ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-9370 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Inappropriate implementation in V8 in Google Chrome versions prior to 129.0.6668.89.
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-9963 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Insufficient data validation in Downloads in Google Chrome versions prior to 130.0.6723.58 allowed a remote attacker who convinced a user to engage...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2025-0444 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Use after free in Skia in Google Chrome prior to 133.0.6943.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2025-0445 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Use after free in V8 in Google Chrome prior to 133.0.6943.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML pa...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2025-0611 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Object corruption in V8 in Google Chrome prior to 132.0.6834.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTM...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
CRITICAL Cx1113a032-799e Npm-webmarker-js-0.0.3
detailsDescription: This package is loading pollyfill script from cdn.polyfill.io, which has been compromised to deliver malicious code. Click here to learn more about...
Vulnerable Package
HIGH CVE-2022-21213 Npm-mout-1.1.0
detailsRecommended version: 1.2.4
Description: This affects versions prior to version 1.2.4 of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while t...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-25858 Npm-terser-4.8.0
detailsRecommended version: 4.8.1
Description: The package terser before 4.8.1, and 5.0.x before 5.14.2 is vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of reg...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.5.6
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.2.3
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.5.3
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.5.21
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10229 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Inappropriate implementation in Extensions in Google Chrome versions prior to 130.0.6723.69 allowed a remote attacker to bypass site isolation via ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10230 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Type Confusion in V8 in Google Chrome versions prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafte...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10231 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Type Confusion in V8 in Google Chrome versions prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafte...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10487 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Out-of-bounds write in Dawn in Google Chrome versions prior to 130.0.6723.92 allowed a remote attacker to perform out of bounds memory access via a...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10488 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Use after free in WebRTC in Google Chrome versions prior to 130.0.6723.92 allowed a remote attacker to potentially exploit heap corruption via a cr...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10826 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Use after free in Family Experiences in Google Chrome on Android versions prior to 130.0.6723.116 allowed a remote attacker to potentially exploit ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10827 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Use after free in Serial in Google Chrome versions prior to 130.0.6723.116 allowed a remote attacker to potentially exploit heap corruption via a c...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-11112 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Use after free in Media in Google Chrome on Windows prior to 131.0.6778.69 allowed a remote attacker to potentially exploit heap corruption via a c...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
HIGH CVE-2024-11113 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Use After Free in Accessibility in Google Chrome versions prior to 131.0.6778.69, allowed a remote attacker who had compromised the renderer proces...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-11114 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Inappropriate implementation in Views in Google Chrome on Windows versions prior to 131.0.6778.69 allowed a remote attacker who had compromised the...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
HIGH CVE-2024-11115 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 131.0.6778.69 allowed a remote attacker to perform privilege escalat...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-11395 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Type Confusion in V8 in Google Chrome versions prior to 131.0.6778.85 allowed a remote attacker to potentially exploit heap corruption via a crafte...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-12053 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Type Confusion in V8 in Google Chrome versions prior to 131.0.6778.108 allowed a remote attacker to potentially exploit object corruption via a cra...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-12382 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Use after free in Translate in Google Chrome versions prior to 131.0.6778.139 allowed a remote attacker to potentially exploit heap corruption via ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-12693 Npm-electron-32.3.0
detailsRecommended version: 33.4.0
Description: Out of bounds memory access in V8 in Google Chrome versions prior to 131.0.6778.204 allowed a remote attacker to execute arbitrary code inside a sa...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21536 Npm-http-proxy-middleware-0.17.3
detailsRecommended version: 2.0.7
Description: The http-proxy-middleware versions through 2.0.7-beta.0 and 3.0.0-beta.0 through 3.0.2 are vulnerable to Denial of Service (DoS) due to an "Unhandl...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21536 Npm-http-proxy-middleware-2.0.6
detailsRecommended version: 2.0.7
Description: The http-proxy-middleware versions through 2.0.7-beta.0 and 3.0.0-beta.0 through 3.0.2 are vulnerable to Denial of Service (DoS) due to an "Unhandl...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21536 Npm-http-proxy-middleware-0.17.4
detailsRecommended version: 2.0.7
Description: The http-proxy-middleware versions through 2.0.7-beta.0 and 3.0.0-beta.0 through 3.0.2 are vulnerable to Denial of Service (DoS) due to an "Unhandl...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21538 Npm-cross-spawn-5.1.0
detailsRecommended version: 6.0.6
Description: Versions of the package cross-spawn prior to 6.0.6 and 7.x prior to 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS), due to im...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package

More results are available on the CxOne platform

Fixed Issues (578)
Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.14
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.23
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.20
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.28
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.12
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.22
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.17
HIGH CVE-2023-1534 Npm-electron-23.1.2
HIGH CVE-2023-2033 Npm-electron-23.1.2
HIGH CVE-2023-2136 Npm-electron-23.1.2
HIGH CVE-2023-2312 Npm-electron-23.1.2
HIGH CVE-2023-2313 Npm-electron-23.1.2
HIGH CVE-2023-2457 Npm-electron-23.1.2
HIGH CVE-2023-2458 Npm-electron-23.1.2
HIGH CVE-2023-2460 Npm-electron-23.1.2
HIGH CVE-2023-2461 Npm-electron-23.1.2
HIGH CVE-2023-2721 Npm-electron-23.1.2
HIGH CVE-2023-2722 Npm-electron-23.1.2
HIGH CVE-2023-2723 Npm-electron-23.1.2
HIGH CVE-2023-2724 Npm-electron-23.1.2
HIGH CVE-2023-2725 Npm-electron-23.1.2
HIGH CVE-2023-2726 Npm-electron-23.1.2
HIGH CVE-2023-29198 Npm-electron-23.1.2
HIGH CVE-2023-2929 Npm-electron-23.1.2
HIGH CVE-2023-2930 Npm-electron-23.1.2
HIGH CVE-2023-2931 Npm-electron-23.1.2
HIGH CVE-2023-2932 Npm-electron-23.1.2
HIGH CVE-2023-2933 Npm-electron-23.1.2
HIGH CVE-2023-2934 Npm-electron-23.1.2
HIGH CVE-2023-2935 Npm-electron-23.1.2
HIGH CVE-2023-29350 Npm-electron-23.1.2
HIGH CVE-2023-2936 Npm-electron-23.1.2
HIGH CVE-2023-2939 Npm-electron-23.1.2
HIGH CVE-2023-3079 Npm-electron-23.1.2
HIGH CVE-2023-3214 Npm-electron-23.1.2
HIGH CVE-2023-3215 Npm-electron-23.1.2
HIGH CVE-2023-3216 Npm-electron-23.1.2
HIGH CVE-2023-3217 Npm-electron-23.1.2
HIGH CVE-2023-33143 Npm-electron-23.1.2
HIGH CVE-2023-3420 Npm-electron-23.1.2
HIGH CVE-2023-3421 Npm-electron-23.1.2
HIGH CVE-2023-3422 Npm-electron-23.1.2
HIGH CVE-2023-3598 Npm-electron-23.1.2
HIGH CVE-2023-36014 Npm-electron-23.1.2
HIGH CVE-2023-36024 Npm-electron-23.1.2
HIGH CVE-2023-36034 Npm-electron-23.1.2
HIGH CVE-2023-36562 Npm-electron-23.1.2
HIGH CVE-2023-36735 Npm-electron-23.1.2
HIGH CVE-2023-36741 Npm-electron-23.1.2
HIGH CVE-2023-36787 Npm-electron-23.1.2
HIGH CVE-2023-3727 Npm-electron-23.1.2
HIGH CVE-2023-3728 Npm-electron-23.1.2
HIGH CVE-2023-3729 Npm-electron-23.1.2
HIGH CVE-2023-3730 Npm-electron-23.1.2
HIGH CVE-2023-3731 Npm-electron-23.1.2
HIGH CVE-2023-3732 Npm-electron-23.1.2
HIGH CVE-2023-4068 Npm-electron-23.1.2
HIGH CVE-2023-4069 Npm-electron-23.1.2
HIGH CVE-2023-4070 Npm-electron-23.1.2
HIGH CVE-2023-4071 Npm-electron-23.1.2
HIGH CVE-2023-4072 Npm-electron-23.1.2
HIGH CVE-2023-4073 Npm-electron-23.1.2
HIGH CVE-2023-4074 Npm-electron-23.1.2
HIGH CVE-2023-4075 Npm-electron-23.1.2
HIGH CVE-2023-4076 Npm-electron-23.1.2
HIGH CVE-2023-4077 Npm-electron-23.1.2
HIGH CVE-2023-4078 Npm-electron-23.1.2
HIGH CVE-2023-4349 Npm-electron-23.1.2
HIGH CVE-2023-4351 Npm-electron-23.1.2
HIGH CVE-2023-4352 Npm-electron-23.1.2
HIGH CVE-2023-4353 Npm-electron-23.1.2
HIGH CVE-2023-4354 Npm-electron-23.1.2
HIGH CVE-2023-4355 Npm-electron-23.1.2
HIGH CVE-2023-4356 Npm-electron-23.1.2
HIGH CVE-2023-4357 Npm-electron-23.1.2
HIGH CVE-2023-4358 Npm-electron-23.1.2
HIGH CVE-2023-4362 Npm-electron-23.1.2
HIGH CVE-2023-4366 Npm-electron-23.1.2
HIGH CVE-2023-4368 Npm-electron-23.1.2
HIGH CVE-2023-4369 Npm-electron-23.1.2
HIGH CVE-2023-4427 Npm-electron-23.1.2
HIGH CVE-2023-4428 Npm-electron-23.1.2
HIGH CVE-2023-4429 Npm-electron-23.1.2
HIGH CVE-2023-4430 Npm-electron-23.1.2
HIGH CVE-2023-4431 Npm-electron-23.1.2
HIGH CVE-2023-44402 Npm-electron-23.1.2
HIGH CVE-2023-4572 Npm-electron-23.1.2
HIGH CVE-2023-4761 Npm-electron-23.1.2
HIGH CVE-2023-4762 Npm-electron-23.1.2
HIGH CVE-2023-4763 Npm-electron-23.1.2
HIGH CVE-2023-4863 Npm-electron-23.1.2
HIGH CVE-2023-5186 Npm-electron-23.1.2
HIGH CVE-2023-5187 Npm-electron-23.1.2
HIGH CVE-2023-5217 Npm-electron-23.1.2
HIGH CVE-2023-5218 Npm-electron-23.1.2
HIGH CVE-2023-5346 Npm-electron-23.1.2
HIGH CVE-2023-5472 Npm-electron-23.1.2
HIGH CVE-2023-5474 Npm-electron-23.1.2
HIGH CVE-2023-5476 Npm-electron-23.1.2
HIGH CVE-2023-5482 Npm-electron-23.1.2
HIGH CVE-2023-5849 Npm-electron-23.1.2
HIGH CVE-2023-5852 Npm-electron-23.1.2
HIGH CVE-2023-5854 Npm-electron-23.1.2
HIGH CVE-2023-5855 Npm-electron-23.1.2
HIGH CVE-2023-5856 Npm-electron-23.1.2
HIGH CVE-2023-5857 Npm-electron-23.1.2
HIGH CVE-2023-5996 Npm-electron-23.1.2
HIGH CVE-2023-5997 Npm-electron-23.1.2
HIGH CVE-2023-6112 Npm-electron-23.1.2
HIGH CVE-2023-6345 Npm-electron-23.1.2
HIGH CVE-2023-6346 Npm-electron-23.1.2
HIGH CVE-2023-6347 Npm-electron-23.1.2
HIGH CVE-2023-6348 Npm-electron-23.1.2
HIGH CVE-2023-6350 Npm-electron-23.1.2
HIGH CVE-2023-6351 Npm-electron-23.1.2
HIGH CVE-2023-6508 Npm-electron-23.1.2
HIGH CVE-2023-6509 Npm-electron-23.1.2
HIGH CVE-2023-6510 Npm-electron-23.1.2
HIGH CVE-2023-6702 Npm-electron-23.1.2
HIGH CVE-2023-6703 Npm-electron-23.1.2
HIGH CVE-2023-6704 Npm-electron-23.1.2
HIGH CVE-2023-6705 Npm-electron-23.1.2
HIGH CVE-2023-6706 Npm-electron-23.1.2
HIGH CVE-2023-6707 Npm-electron-23.1.2
HIGH CVE-2023-7024 Npm-electron-23.1.2
HIGH CVE-2024-0222 Npm-electron-23.1.2
HIGH CVE-2024-0223 Npm-electron-23.1.2
HIGH CVE-2024-0224 Npm-electron-23.1.2
HIGH CVE-2024-0225 Npm-electron-23.1.2
HIGH CVE-2024-0517 Npm-electron-23.1.2
HIGH CVE-2024-0518 Npm-electron-23.1.2
HIGH CVE-2024-0519 Npm-electron-23.1.2
HIGH CVE-2024-0804 Npm-electron-23.1.2
HIGH CVE-2024-0806 Npm-electron-23.1.2
HIGH CVE-2024-0807 Npm-electron-23.1.2
HIGH CVE-2024-0808 Npm-electron-23.1.2
HIGH CVE-2024-0812 Npm-electron-23.1.2
HIGH CVE-2024-0813 Npm-electron-23.1.2
HIGH CVE-2024-1059 Npm-electron-23.1.2
HIGH CVE-2024-1060 Npm-electron-23.1.2
HIGH CVE-2024-1077 Npm-electron-23.1.2
HIGH CVE-2024-1283 Npm-electron-23.1.2
HIGH CVE-2024-1284 Npm-electron-23.1.2
HIGH CVE-2024-1669 Npm-electron-23.1.2
HIGH CVE-2024-1670 Npm-electron-23.1.2
HIGH CVE-2024-1673 Npm-electron-23.1.2
HIGH CVE-2024-1938 Npm-electron-23.1.2
HIGH CVE-2024-1939 Npm-electron-23.1.2
HIGH CVE-2024-21326 Npm-electron-23.1.2
HIGH CVE-2024-21385 Npm-electron-23.1.2
HIGH CVE-2024-21399 Npm-electron-23.1.2
HIGH CVE-2024-2173 Npm-electron-23.1.2
HIGH CVE-2024-2174 Npm-electron-23.1.2
HIGH CVE-2024-2400 Npm-electron-23.1.2
HIGH CVE-2024-26192 Npm-electron-23.1.2
HIGH CVE-2024-2625 Npm-electron-23.1.2
HIGH CVE-2024-2627 Npm-electron-23.1.2
HIGH CVE-2024-2883 Npm-electron-23.1.2
HIGH CVE-2024-2885 Npm-electron-23.1.2
HIGH CVE-2024-2886 Npm-electron-23.1.2
HIGH CVE-2024-2887 Npm-electron-23.1.2
HIGH CVE-2024-3157 Npm-electron-23.1.2
HIGH CVE-2024-3515 Npm-electron-23.1.2
HIGH CVE-2024-3516 Npm-electron-23.1.2
HIGH Cx89601373-08db Npm-debug-3.2.6
HIGH Cx89601373-08db Npm-debug-2.6.8
HIGH Cx89601373-08db Npm-debug-2.6.7
HIGH Cx89601373-08db Npm-debug-2.6.9
HIGH Cx89601373-08db Npm-debug-4.1.1
HIGH Cx89601373-08db Npm-debug-3.2.7
HIGH Cx89601373-08db Npm-debug-4.2.0
HIGH Cx89601373-08db Npm-debug-2.2.0
HIGH Cx89601373-08db Npm-debug-4.1.0
HIGH Cx89601373-08db Npm-debug-3.1.0
HIGH Cx89601373-08db Npm-debug-2.6.0
HIGH Cxab55612e-3a56 Npm-braces-3.0.2
HIGH Cxab55612e-3a56 Npm-braces-1.8.5
HIGH Cxab55612e-3a56 Npm-braces-2.3.2
HIGH Cxca84a1c2-1f12 Npm-micromatch-4.0.2
HIGH Cxca84a1c2-1f12 Npm-micromatch-3.1.10
HIGH Cxca84a1c2-1f12 Npm-micromatch-4.0.5
HIGH Cxca84a1c2-1f12 Npm-micromatch-4.0.4
HIGH Cxca84a1c2-1f12 Npm-micromatch-2.3.11
HIGH Cxf6e7f2c1-dc59 Npm-yauzl-2.4.1
HIGH Cxf6e7f2c1-dc59 Npm-yauzl-2.10.0
MEDIUM CVE-2023-2311 Npm-electron-23.1.2
MEDIUM CVE-2023-2314 Npm-electron-23.1.2
MEDIUM CVE-2023-2459 Npm-electron-23.1.2
MEDIUM CVE-2023-2463 Npm-electron-23.1.2
MEDIUM CVE-2023-2464 Npm-electron-23.1.2
MEDIUM CVE-2023-2465 Npm-electron-23.1.2
MEDIUM CVE-2023-2466 Npm-electron-23.1.2

More results are available on the CxOne platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants