GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.7.10"
},
{
"introduced": "0"
},
{
"last_affected": "1.6.15"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000006.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.8.2-beta1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.8.2-beta2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.8.2-beta3"
}
]
}
]