Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-34774 | 8.1 HIGH | Electron: Use-after-free in offscreen child window paint callback |
| CVE-2026-34769 | 7.8 HIGH | Electron: Renderer command-line switch injection via undocumented commandLineSwitches webP |
| CVE-2026-34771 | 7.5 HIGH | Electron: Use-after-free in WebContents fullscreen, pointer-lock, and keyboard-lock permis |
| CVE-2026-34770 | 7.0 HIGH | Electron: Use-after-free in PowerMonitor on Windows and macOS |
| CVE-2026-34775 | 6.8 MEDIUM | Electron: nodeIntegrationInWorker not correctly scoped in shared renderer processes |
| CVE-2026-34767 | 5.9 MEDIUM | Electron: HTTP Response Header Injection in custom protocol handlers and webRequest |
| CVE-2026-34778 | 5.9 MEDIUM | Electron: Service worker can spoof executeJavaScript IPC replies |
| CVE-2026-34772 | 5.8 MEDIUM | Electron: Use-after-free in download save dialog callback |
| CVE-2026-34777 | 5.4 MEDIUM | Electron: Incorrect origin passed to permission request handler for iframe requests |
| CVE-2026-34776 | 5.3 MEDIUM | Electron: Out-of-bounds read in second-instance IPC on macOS and Linux |
| CVE-2026-34773 | 4.7 MEDIUM | Electron: Registry key path injection in app.setAsDefaultProtocolClient on Windows |
| CVE-2026-34766 | 3.3 LOW | Electron: USB device selection not validated against filtered device list |
No comments yet