Build cross platform desktop apps with JavaScript, HTML, and CSS
90%
Total Score
98
100
100
100
50
| Title | Versions | Severity |
|---|---|---|
CVE-2025-55305 electron is vulnerable to Improper Control of Generation of Code ('Code Injection') in versions 0.0.0 - 35.7.5, 36.0.0-alpha.1 - 36.8.1, 37.0.0-alpha.1 - 37.3.1 and 38.0.0-alpha.1 - 38.0.0-beta.6. | 0.0.0 - 35.7.536.0.0-alpha.1 - 36.8.137.0.0-alpha.1 - 37.3.1 +1 more | Medium |
AIKIDO-2025-10543 electron is vulnerable to Use After Free in versions 35.0.0 - 37.2.5. | 35.0.0 - 37.2.5 | High |
AIKIDO-2025-10523 electron is vulnerable to Use After Free in versions 35.0.0 - 37.2.3. | 35.0.0 - 37.2.3 | High |
AIKIDO-2025-10438 electron is vulnerable to ASAR Integrity Bypass By Just Modifying The Content in versions 30.0.1 - 30.0.4. | 30.0.1 - 30.0.4 | High |
AIKIDO-2025-10437 electron is vulnerable to Heap-based Buffer Overflow in versions 28.0.0 - 28.3.1, 29.0.0 - 29.3.2 and 30.0.0 - 30.0.2. | 28.0.0 - 28.3.129.0.0 - 29.3.230.0.0 - 30.0.2 | Medium |
| Dependency | Last Release | Score |
|---|---|---|
@types/node Version ^24.9.0 | — | — |
extract-zip Version ^2.0.1 | — | — |
@electron/get Version ^2.0.0 | — | — |
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant