Lookup for vulnerable packages by Package URL.
| Purl | pkg:npm/electron@41.0.1 |
| Type | npm |
| Namespace | |
| Name | electron |
| Version | 41.0.1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 41.1.0 |
| Latest_non_vulnerable_version | 42.0.0-alpha.5 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-7yvz-624p-m7fe |
| vulnerability_id |
VCID-7yvz-624p-m7fe |
| summary |
Electron: Use-after-free in offscreen shared texture release() callback |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34764 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02673 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.027 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0268 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02678 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03454 |
| published_at |
2026-05-07T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03435 |
| published_at |
2026-05-05T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04871 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05044 |
| published_at |
2026-04-29T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05045 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05004 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04973 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04819 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04829 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0489 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34764 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34764, GHSA-8x5q-pvf5-64mp
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7yvz-624p-m7fe |
|
| 1 |
| url |
VCID-t1z9-bmnv-57bm |
| vulnerability_id |
VCID-t1z9-bmnv-57bm |
| summary |
Electron: HTTP Response Header Injection in custom protocol handlers and webRequest
### Impact
Apps that register custom protocol handlers via `protocol.handle()` / `protocol.registerSchemesAsPrivileged()` or modify response headers via `webRequest.onHeadersReceived` may be vulnerable to HTTP response header injection if attacker-controlled input is reflected into a response header name or value.
An attacker who can influence a header value may be able to inject additional response headers, affecting cookies, content security policy, or cross-origin access controls.
Apps that do not reflect external input into response headers are not affected.
### Workarounds
Validate or sanitize any untrusted input before including it in a response header name or value.
### Fixed Versions
* `41.0.3`
* `40.8.3`
* `39.8.3`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, send an email to [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34767 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01274 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01535 |
| published_at |
2026-05-05T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01281 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01285 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0128 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01529 |
| published_at |
2026-05-07T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08164 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08159 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08105 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08944 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09178 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09301 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09288 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0918 |
| published_at |
2026-04-16T12:55:00Z |
|
| 14 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0933 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34767 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34767, GHSA-4p4r-m79c-wq3v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t1z9-bmnv-57bm |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:npm/electron@41.0.1 |