electron is vulnerable to Heap-based Buffer Overflow
88
High Risk
Embedded Chromium’s WebML path can mis-handle buffer sizing so crafted page content triggers memory corruption beyond intended bounds. Remote attackers can leverage typical browsing primitives to reach faulty tensor-style workloads and corrupt heap metadata. Successful exploitation can break renderer isolation assumptions and enable severe integrity impact under Chromium severity ratings. Electron pulls these fixes by cherry-picking the upstream Chromium commits bundled into its stable branch releases.
You are affected if you are using a version that falls within the vulnerable range.
electron is vulnerable to Heap-based Buffer Overflow in versions 39.0.0 - 39.8.9.
Upgrade the electron library to the patch version.
Connect your repositories to instantly see whether vulnerable or malicious packages exist in your codebase.
Free. No credit card required.

SOC 2Compliant
ISO 27001Compliant