Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2016-1202
Deferred
More InfoOfficial Page
Source-vultures@jpcert.or.jp
View Known Exploited Vulnerability (KEV) details
Published At-25 Apr, 2016 | 18:59
Updated At-12 Apr, 2025 | 10:46

Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.8HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Electron (OpenJS Foundation)
atom
>>electron>>Versions up to 0.33.4(inclusive)
cpe:2.3:a:atom:electron:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
Evaluator Description

CWE-426: Untrusted Search Path
Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://jvn.jp/en/jp/JVN00324715/index.htmlvultures@jpcert.or.jp
Vendor Advisory
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054vultures@jpcert.or.jp
Vendor Advisory
https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194dvultures@jpcert.or.jp
N/A
https://github.com/electron/electron/pull/2976vultures@jpcert.or.jp
N/A
http://jvn.jp/en/jp/JVN00324715/index.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194daf854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/electron/electron/pull/2976af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found