An issue in He3 App for macOS version 2.0.17, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
References
Link | Resource |
---|---|
https://github.com/intbjw | Not Applicable |
https://github.com/intbjw/CVE-2024-25249 | Broken Link |
https://www.electronjs.org/blog/statement-run-as-node-cves | Technical Description |
https://github.com/intbjw | Not Applicable |
https://github.com/intbjw/CVE-2024-25249 | Broken Link |
https://www.electronjs.org/blog/statement-run-as-node-cves | Technical Description |
Configurations
History
27 Mar 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 |
12 Feb 2025, 16:44
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
He3app he3 App
He3app |
|
CPE | cpe:2.3:a:he3app:he3_app:2.0.17:*:*:*:*:macos:*:* | |
References | () https://github.com/intbjw - Not Applicable | |
References | () https://github.com/intbjw/CVE-2024-25249 - Broken Link | |
References | () https://www.electronjs.org/blog/statement-run-as-node-cves - Technical Description | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
21 Nov 2024, 09:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/intbjw - | |
References | () https://github.com/intbjw/CVE-2024-25249 - | |
References | () https://www.electronjs.org/blog/statement-run-as-node-cves - |
22 Feb 2024, 19:07
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Feb 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-21 20:15
Updated : 2025-03-27 20:15
NVD link : CVE-2024-25249
Mitre link : CVE-2024-25249
CVE.ORG link : CVE-2024-25249
JSON object : View
Products Affected
he3app
- he3_app
CWE