[ { "app_name": "1Clipboard", "repo": "https://github.com/wiziple/1clipboard", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "1Password", "repo": "", "electron_version": "25.8.1", "date_accessed": "", "access_type": "manual", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "3CX Desktop App", "repo": "", "electron_version": "19.0.8", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "5EClient", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Abstract", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Account Surfer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Advanced REST Client", "repo": "https://github.com/advanced-rest-client/arc-electron", "electron_version": "^17.0.0", "date_accessed": "2023-10-14 21:37:08-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Aedron Shrine", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Aeon", "repo": "https://github.com/leinelissen/aeon", "electron_version": "23.2.0", "date_accessed": "2023-10-14 21:37:09-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Aether", "repo": "https://github.com/aethereans/aether-app", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Agora Flat", "repo": "https://github.com/netless-io/flat", "electron_version": "", "date_accessed": "2023-10-14 21:37:12-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Aipo.com", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Airtame", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Altair GraphQL Client", "repo": "https://github.com/imolorhe/altair", "electron_version": "", "date_accessed": "2023-10-14 21:37:14-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Amialive", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "AnotherRedisDesktopManager", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Antares", "repo": "https://github.com/Fabio286/antares", "electron_version": "~22.3.23", "date_accessed": "2023-10-14 21:37:15-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Appium Desktop", "repo": "https://github.com/appium/appium-desktop", "electron_version": "^10.0", "date_accessed": "2023-10-14 21:37:16-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Arena", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Asana", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Assessment Disaggregation", "repo": "https://github.com/tazzben/Assessment-Disaggregation.git", "electron_version": "^27.0.0", "date_accessed": "2023-10-14 21:37:18-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Assetizr", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "AstroPrint Desktop", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Atom", "repo": "https://github.com/atom/atom", "electron_version": "", "date_accessed": "2023-10-14 21:37:19-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Authy", "repo": "", "electron_version": "16.2.8", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "awsaml", "repo": "https://github.com/rapid7/awsaml", "electron_version": "^26.2.4", "date_accessed": "2023-10-14 21:37:20-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "Barklarm", "repo": "https://github.com/kanekotic/barklarm", "electron_version": "25.3.2", "date_accessed": "2023-10-14 21:37:21-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Basecamp 3", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Bdash", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Beaker Browser", "repo": "https://github.com/beakerbrowser/beaker", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Beekeeper Studio", "repo": "https://github.com/beekeeper-studio/beekeeper-studio", "electron_version": "", "date_accessed": "2023-10-14 21:37:26-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Believers Sword", "repo": "https://github.com/Bible-Projects/believers-sword-app", "electron_version": "^19.0.0", "date_accessed": "2023-10-14 21:37:27-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "bibisco", "repo": "https://github.com/andreafeccomandi/bibisco/", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Biscuit", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Blockbench", "repo": "https://github.com/JannisX11/blockbench", "electron_version": "^25.7.0", "date_accessed": "2023-10-14 21:37:29-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Boost Changer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Bootstrap Studio", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "BoxHero", "repo": "https://github.com/bgpworks/boxhero-electron", "electron_version": "23.0.0", "date_accessed": "2023-10-14 21:37:31-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Boxy SVG", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Brim", "repo": "https://github.com/brimsec/brim", "electron_version": "", "date_accessed": "2023-10-14 21:37:32-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Brisqi", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Browserosaurus", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Buckets", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Buka", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Buttercup", "repo": "https://github.com/buttercup/buttercup-desktop", "electron_version": "^22.0.0", "date_accessed": "2023-10-14 21:37:33-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Cacher", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Calmly Writer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Camunda Modeler", "repo": "https://github.com/camunda/camunda-modeler/", "electron_version": "^26.2.4", "date_accessed": "2023-10-14 21:37:34-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "canSnippet", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Caption Pro", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Caret", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Cargo Messenger", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "CashNotify", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "CatLight", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "CBETA Reader 2 (Unofficial)", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ChatWork", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Chronobreak", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Cider", "repo": "https://github.com/ciderapp/Cider", "electron_version": "github:castlabs/electron-releases", "date_accessed": "2023-10-14 21:37:36-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "clipboard-manager-electron", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Clipper", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "clippo", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "cliptext", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "clockodo", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Clovery", "repo": "https://github.com/webcatalog/neutron", "electron_version": "18.0.1", "date_accessed": "2023-10-14 21:37:37-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "CLtracer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Cocos Creator", "repo": "https://github.com/cocos-creator/engine", "electron_version": "", "date_accessed": "2023-10-14 21:37:38-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Codex", "repo": "https://github.com/jcv8000/Codex", "electron_version": "^22.3.27", "date_accessed": "2023-10-14 21:37:40-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "Colibri", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Collectie", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Color Ramp Formulator", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Colorpicker", "repo": "https://github.com/Toinane/colorpicker", "electron_version": "^19.1.7", "date_accessed": "2023-10-14 21:37:41-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Commandeer", "repo": "https://github.com/commandeer/open", "electron_version": "", "date_accessed": "2023-10-14 21:37:42-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Compact Log Viewer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Companion", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Composercat", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Compress", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Container PS", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Copy 2 Online", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Cozy Desktop", "repo": "https://github.com/cozy-labs/cozy-desktop", "electron_version": "23.0.0", "date_accessed": "2023-10-14 21:37:43-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "CryptoARM GOST", "repo": "https://github.com/TrustedRu/CryptoARMGOST", "electron_version": "7.1.13", "date_accessed": "2023-10-14 21:37:45-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "csBooks", "repo": "https://github.com/caesiumstudio/csBooks-updates.git", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "csgo-tracker", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "CyberX", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Cycle", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Cycligent Git Tool", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Danger Crew", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "DarkJ", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Dashy", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Dat", "repo": "https://github.com/datproject/dat-desktop", "electron_version": "^6.1.7", "date_accessed": "2023-10-14 21:37:48-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Data Pixels Playground", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Data-Forge Notebook", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Datazenit", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "DBcloner", "repo": "https://github.com/felipeleivav/dbcloner-app", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "DbGate", "repo": "https://github.com/dbgate/dbgate", "electron_version": "", "date_accessed": "2023-10-14 21:37:50-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "DBGlass", "repo": "https://github.com/web-pal/DBGlass", "electron_version": "", "date_accessed": "2023-10-14 21:37:51-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Debugtron", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "DECK", "repo": "https://github.com/sfx101/docker-stacks", "electron_version": "^13.0.0", "date_accessed": "2023-10-14 21:37:53-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Deckboard", "repo": "https://github.com/rivafarabi/deckboard", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "DeckMaster", "repo": "https://github.com/TheOtterlord/deckmaster", "electron_version": "^11.2.1", "date_accessed": "2023-10-14 21:37:56-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Deco IDE", "repo": "https://github.com/decosoftware/deco-ide", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Deepnest", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Deer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Demio", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Demoflow", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Deskfiler", "repo": "https://github.com/deskfiler/deskfiler", "electron_version": "6.0.9", "date_accessed": "2023-10-14 21:38:00-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Devbook", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "DevHub", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Dict", "repo": "https://github.com/bryht/Dict", "electron_version": "^9.4.4", "date_accessed": "2023-10-14 21:38:01-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Diffuse", "repo": "https://github.com/icidasset/diffuse", "electron_version": "", "date_accessed": "2023-10-14 21:38:03-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "DigiExam", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Discord", "repo": "", "electron_version": "22.3.24", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Discord RPC Maker", "repo": "https://github.com/thatonecalculator/discordrpcmaker", "electron_version": "^22.0.0", "date_accessed": "2023-10-14 21:38:04-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "display-dj", "repo": "https://github.com/synle/display-dj", "electron_version": "^19.0.2", "date_accessed": "2023-10-14 21:38:05-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Ditto++", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Dixa", "repo": "https://github.com/dixahq/dixa-desktop-app-release", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Dn Tool Container", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Doki Doki Mod Manager", "repo": "https://github.com/DokiDokiModManager/Mod-Manager", "electron_version": "^10.1.3", "date_accessed": "2023-10-14 21:38:08-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Domain Book", "repo": "https://github.com/darawish/domainbook", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "domodel-diary", "repo": "", "electron_version": "13.1.0", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "DomTerm", "repo": "https://github.com/PerBothner/DomTerm", "electron_version": "", "date_accessed": "2023-10-14 21:38:11-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Dopamine", "repo": "https://github.com/digimezzo/dopamine", "electron_version": "^21.0.0", "date_accessed": "2023-10-14 21:38:12-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Drawtify Designer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "DropPoint", "repo": "https://github.com/GameGodS3/DropPoint", "electron_version": "^21.3.1", "date_accessed": "2023-10-14 21:38:18-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "DupFinder", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Dusk Player", "repo": "https://github.com/Aveek-Saha/MusicPlayer", "electron_version": "^7.3.3", "date_accessed": "2023-10-14 21:38:25-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Dynobase", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Eagle", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "eagluet", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "EBTCalc", "repo": "https://github.com/EricTerrell/EBTCalc", "electron_version": "^26.1.0", "date_accessed": "2023-10-14 21:38:26-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "echo", "repo": "https://github.com/afractal/echo-app", "electron_version": "", "date_accessed": "2023-10-14 21:38:27-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "elcalc", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Electorrent", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Electro", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ElectroCRUD", "repo": "https://github.com/garrylachman/ElectroCRUD", "electron_version": "^22.0.0", "date_accessed": "2023-10-14 21:38:28-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Electron App Store (Unofficial)", "repo": "https://github.com/Electron-Store/electron-app-store", "electron_version": "^15.3.0", "date_accessed": "2023-10-14 21:38:30-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Electron-clippy", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Elements", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Elephicon", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "email-securely-app", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Enclica Messenger", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "encrypt0r", "repo": "https://github.com/kunalnagar/encrypt0r", "electron_version": "18.3.15", "date_accessed": "2023-10-14 21:38:31-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "EnderFramework", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Erin", "repo": "https://github.com/losbiw/erin", "electron_version": "^20.1.0", "date_accessed": "2023-10-14 21:38:32-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "eSearch", "repo": "https://github.com/xushengfeng/eSearch", "electron_version": "^22.3.6", "date_accessed": "2023-10-14 21:38:33-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "ETCD Manager", "repo": "https://github.com/icellmobilsoft/etcdmanager.git", "electron_version": "^6", "date_accessed": "2023-10-14 21:38:35-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Etcher", "repo": "https://github.com/resin-io/etcher", "electron_version": "^19.1.9", "date_accessed": "2023-10-14 21:38:36-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "EVE Trade", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Everdo", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Excel Parser Processor", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ExifCleaner", "repo": "https://github.com/szTheory/exifcleaner", "electron_version": "^11.0", "date_accessed": "2023-10-14 21:38:38-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "ExpanDrive", "repo": "", "electron_version": "22.3.1", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Explorer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ExpressLRS Configurator", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "F-Curator", "repo": "https://github.com/xizon/F-Curator/", "electron_version": "^16.0.6", "date_accessed": "2023-10-14 21:38:39-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "FAIRshare", "repo": "https://github.com/fairdataihub/FAIRshare", "electron_version": "25.8.4", "date_accessed": "2023-10-14 21:38:40-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "fangyuanjian", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "FATpick", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Fen\u00eatre", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Ferdi", "repo": "https://github.com/getferdi/ferdi", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Fifo", "repo": "https://github.com/snaildos/Fifo-Browser", "electron_version": "21.4.4", "date_accessed": "2023-10-14 21:38:42-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Figma", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "FileCtor", "repo": "https://github.com/tomaschyly/FileCtor", "electron_version": "^9.2.0", "date_accessed": "2023-10-14 21:38:44-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Fileside", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Final-Countdown", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Find Better Questions", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Fireman", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Fishing Funds", "repo": "https://github.com/1zilc/fishing-funds", "electron_version": "^27.0.0", "date_accessed": "2023-10-14 21:38:45-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Flawesome", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "FLB Music", "repo": "https://github.com/Patrick-web/FLB-Music-Player-Official", "electron_version": "13.2.2", "date_accessed": "2023-10-14 21:38:46-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "FleetDeck", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "FlexPaper", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Flow", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Fluent Reader", "repo": "https://github.com/yang991178/fluent-reader", "electron_version": "^21.0.1", "date_accessed": "2023-10-14 21:38:47-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Focused Task", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Fog", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "FontBase", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Forestpin Analytics", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Forget Me Not", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "FotoJet", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Frame", "repo": "https://github.com/floating/frame.git", "electron_version": "23.1.3", "date_accessed": "2023-10-14 21:38:49-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Franz", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Free Chess Club", "repo": "https://github.com/freechessclub/freechessclub-app", "electron_version": "^24.1.3", "date_accessed": "2023-10-14 21:38:50-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Freeter", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Friends", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Front", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Fudget", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Galeri", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Gaucho", "repo": "https://github.com/angrykoala/gaucho", "electron_version": "~13.1.9", "date_accessed": "2023-10-14 21:38:51-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "GaussSense Desktop", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "GDevelop", "repo": "https://github.com/4ian/GDevelop", "electron_version": "18.2.2", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Geeks Diary", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Geniemoji", "repo": "https://github.com/virejdasani/Geniemoji", "electron_version": "^12.0.4", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Getr\u00e4nkeliste App", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Gibu", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Git-it", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "GitBook", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "GitHoard", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "GitHub Desktop", "repo": "https://github.com/desktop/desktop", "electron_version": "26.2.4", "date_accessed": "2023-10-14 21:39:01-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "Gitify", "repo": "https://github.com/manosim/gitify", "electron_version": "^13.1.7", "date_accessed": "2023-10-14 21:39:02-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "GitKraken", "repo": "", "electron_version": "22.3.24", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Gitscout", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Gluppi", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Glyphr Studio", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Gordie", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "GrabCAD Print", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "GramTools", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "GraphiQL", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "GraphQL Playground", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "graSSHopper", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Gravit Designer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Graviton Editor", "repo": "https://github.com/Graviton-Code-Editor/Graviton-App", "electron_version": "", "date_accessed": "2023-10-14 21:39:04-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "gSubs", "repo": "https://github.com/sanjevirau/gsubs/", "electron_version": "~9.1.0", "date_accessed": "2023-10-14 21:39:05-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "HashTag", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "HBBatchBeast", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "heads-tails", "repo": "https://github.com/SmartHoldemDAPPs/heads-tails", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Headset", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "healthi", "repo": "https://github.com/pablopunk/healthi-app", "electron_version": "^15.5.5", "date_accessed": "2023-10-14 21:39:07-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Hearo", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Helios Launcher", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Heroic", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "HexoClient", "repo": "https://github.com/gaoyoubo/hexo-client", "electron_version": "^7.2.4", "date_accessed": "2023-10-14 21:39:09-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Hive", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "homura", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Horen", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Hoster", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Hozz", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "HTTP Toolkit", "repo": "https://github.com/httptoolkit", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "HTTPS Checker", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Hyper", "repo": "https://github.com/vercel/hyper", "electron_version": "22.3.24", "date_accessed": "2023-10-14 21:39:10-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Hyperspace", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "i18n Manager", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "i5sing", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Iconset", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Illyriad", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Image Optimizer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ImageShrinker", "repo": "https://github.com/stefansl/image-shrinker", "electron_version": "^11.2.1", "date_accessed": "2023-10-14 21:39:12-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Imagine", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Inboxer", "repo": "https://github.com/denysdovhan/inboxer", "electron_version": "^3.0", "date_accessed": "2023-10-14 21:39:13-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "INDE Writer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "InfiniTex", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Infiniti Clips", "repo": "https://github.com/azure06/infiniti-clips.git", "electron_version": "^21.2.0", "date_accessed": "2023-10-14 21:39:14-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Infinity", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Inkdrop", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Insomnia", "repo": "https://github.com/getinsomnia/insomnia", "electron_version": "", "date_accessed": "2023-10-14 21:39:16-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Instatron", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Interactive Data Editor", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Intu-Mind", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Invizi", "repo": "https://github.com/invizi/invizi/", "electron_version": "^8.3.0", "date_accessed": "2023-10-14 21:39:17-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "ioui", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Iperius Console", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "IPTVnator", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Istrolid", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "itch", "repo": "https://github.com/itchio/itch", "electron_version": "^22.3.14", "date_accessed": "2023-10-14 21:39:18-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Jabra Direct", "repo": "", "electron_version": "16,2,2", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "jamovi", "repo": "https://github.com/jamovi/jamovi", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "JANDI", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Janpankana", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Janus Workspace", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Jasper", "repo": "https://github.com/jasperapp/jasper", "electron_version": "18.0.4", "date_accessed": "2023-10-14 21:39:20-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Joplin", "repo": "https://github.com/laurent22/joplin", "electron_version": "", "date_accessed": "2023-10-14 21:39:22-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "jqi", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Juggernaut", "repo": "https://github.com/LN-Juggernaut/juggernaut-desktop", "electron_version": "8.2.0", "date_accessed": "2023-10-14 21:39:23-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Jukeboks", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "JumpFm", "repo": "https://github.com/Gilad-Kutiel-App/jumpfm", "electron_version": "", "date_accessed": "2023-10-14 21:39:24-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Kahla", "repo": "https://github.com/AiursoftWeb/Kahla.App", "electron_version": "^8.3.0", "date_accessed": "2023-10-14 21:39:25-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "kalk", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "KanKan", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Kap", "repo": "https://github.com/wulkano/kap", "electron_version": "13.6.9", "date_accessed": "2023-10-14 21:39:26-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Kaplan Desktop", "repo": "https://github.com/kaplanPRO/kaplan-desktop", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "kappo", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Karaoke Mugen", "repo": "https://gitlab.com/karaokemugen/karaokemugen-app", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Katana", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Kattana", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Keeper Password Manager & Digital Vault", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "KeeWeb", "repo": "https://github.com/keeweb/keeweb", "electron_version": "^12.0.7", "date_accessed": "2023-10-14 21:39:31-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "KeyCombiner", "repo": "https://github.com/tkainrad/keycombiner", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Kinesis CI", "repo": "https://github.com/Kinesis-CI/education-and-innovation", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Kitematic", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Knowte", "repo": "https://github.com/digimezzo/knowte-electron", "electron_version": "17.3.1", "date_accessed": "2023-10-14 21:39:35-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Kobiton", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Kube Dev Dashboard", "repo": "https://github.com/prsh9/KubeCtl-Dashboard", "electron_version": "^22.0.0", "date_accessed": "2023-10-14 21:39:36-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Kube Forwarder", "repo": "https://github.com/pixel-point/kube-forwarder", "electron_version": "12.0.2", "date_accessed": "2023-10-14 21:39:38-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "LaraDumps", "repo": "https://github.com/laradumps/app", "electron_version": "26.2.4", "date_accessed": "2023-10-14 21:39:39-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "Laravel Kit", "repo": "https://github.com/tmdh/laravel-kit", "electron_version": "21.0.1", "date_accessed": "2023-10-14 21:39:40-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Last Hit", "repo": "https://github.com/last-hit-aab/last-hit", "electron_version": "^7.1.1", "date_accessed": "2023-10-14 21:39:41-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Laverna", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Lax", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "lazyType", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "LBRY Desktop", "repo": "https://github.com/lbryio/lbry-desktop", "electron_version": "17.2.0", "date_accessed": "2023-10-14 21:39:43-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "LeafView", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Lectrote", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Left", "repo": "https://hundredrabbits.itch.io/left", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Lepton", "repo": "https://github.com/hackjutsu/Lepton", "electron_version": "^13.0.0", "date_accessed": "2023-10-14 21:39:44-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Light Table", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "lightgallery", "repo": "https://github.com/sachinchoolur/lightgallery-desktop", "electron_version": "", "date_accessed": "2023-10-14 21:39:45-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "LightProxy", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "linked", "repo": "https://github.com/lostdesign/linked", "electron_version": "17.0.0", "date_accessed": "2023-10-14 21:39:46-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Lisk Hub", "repo": "https://github.com/LiskHQ/lisk-hub", "electron_version": "27.0.0", "date_accessed": "2023-10-14 21:39:48-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Local by Flywheel", "repo": "https://github.com/getflywheel/local-components", "electron_version": "", "date_accessed": "2023-10-14 21:39:49-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Local Mock Server", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Lode", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "LogSnag", "repo": "https://github.com/LogSnag/LogSnag", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Loom", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Loop Team", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "LosslessCut", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "LoT - Lot of Things", "repo": "https://github.com/Jisco/LotOfThings", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "lsdeer", "repo": "https://github.com/AlexanderPershin/lsdeer", "electron_version": "^8.2.1", "date_accessed": "2023-10-14 21:39:52-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "luna", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Lyna", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "MagicCap", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Mailspring", "repo": "https://github.com/Foundry376/Mailspring", "electron_version": "17.4.0", "date_accessed": "2023-10-14 21:39:53-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Manyverse", "repo": "https://gitlab.com/staltz/manyverse", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Markdown C3", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Markdownify", "repo": "https://github.com/amitmerchant1990/electron-markdownify", "electron_version": "^7.2.4", "date_accessed": "2023-10-14 21:39:55-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "MarkText", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "massCode", "repo": "https://github.com/antonreshetov/massCode", "electron_version": "^7.1.6", "date_accessed": "2023-10-14 21:39:56-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Master Tour", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Matrix Writer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Mattermost", "repo": "https://github.com/mattermost/desktop", "electron_version": "26.2.1", "date_accessed": "2023-10-14 21:39:58-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "MD5 Application", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "mdp", "repo": "https://github.com/ericlink/mdp", "electron_version": "^13.1.6", "date_accessed": "2023-10-14 21:39:59-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "media-dupes", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "mediaChips", "repo": "https://github.com/fupdec/mediaChips", "electron_version": "^17.0.0", "date_accessed": "2023-10-14 21:40:00-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "MeisterTask", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "M\u00e9lodie", "repo": "https://github.com/feugy/melodie", "electron_version": "", "date_accessed": "2023-10-14 21:40:01-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Merge Request Notifier", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Metastream", "repo": "https://github.com/samuelmaddock/metastream", "electron_version": "", "date_accessed": "2023-10-14 21:40:02-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Metronome", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Metronome Wallet", "repo": "https://github.com/autonomoussoftware/metronome-wallet-desktop", "electron_version": "13.1.4", "date_accessed": "2023-10-14 21:40:04-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Microsoft Teams", "repo": "", "electron_version": "19.1.8", "date_accessed": "", "access_type": "manual", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Microstockr", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Mikropausen", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Min", "repo": "https://github.com/minbrowser/min", "electron_version": "26.2.1", "date_accessed": "2023-10-14 21:40:05-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Mindmapp", "repo": "https://github.com/Mindmapp/mindmapp", "electron_version": "", "date_accessed": "2023-10-14 21:40:06-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Mingo", "repo": "https://github.com/mingo-app/mingo", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Mini Diary", "repo": "https://github.com/samuelmeuli/mini-diary", "electron_version": "^8.3.0", "date_accessed": "2023-10-14 21:40:09-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Minimal Image Viewer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Missive", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Mixmax", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "MJML App", "repo": "https://github.com/mjmlio/mjml-app", "electron_version": "7.2.4", "date_accessed": "2023-10-14 21:40:10-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Mobile Locker", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Mobirise", "repo": "https://github.com/Mobirise/Mobirise", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "MockingBot", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Mockoon", "repo": "https://github.com/255kb/mockoon", "electron_version": "", "date_accessed": "2023-10-14 21:40:13-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "modelDBA", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ModernDeck for Twitter", "repo": "https://github.com/dangeredwolf/ModernDeck", "electron_version": "^19.1.9", "date_accessed": "2023-10-14 21:40:14-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "MonAmi Note", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "MongoDB Compass", "repo": "", "electron_version": "24.8.2", "date_accessed": "", "access_type": "manual", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Mongomix", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Mongotron", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Monokle", "repo": "https://github.com/kubeshop/monokle", "electron_version": "26.3.0", "date_accessed": "2023-10-14 21:40:15-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "monolith code", "repo": "https://github.com/Haeri/MonolithCode2", "electron_version": "^26.2.3", "date_accessed": "2023-10-14 21:40:17-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "MonsterWriter", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Moonitor", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Moosync", "repo": "https://github.com/Moosync/Moosync", "electron_version": "25.5.0", "date_accessed": "2023-10-14 21:40:18-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Morgen", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Motrix", "repo": "https://github.com/agalwood/Motrix", "electron_version": "^22.3.9", "date_accessed": "2023-10-14 21:40:19-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "MoviePrint", "repo": "https://github.com/fakob/MoviePrint_v004", "electron_version": "7.1.11", "date_accessed": "2023-10-14 21:40:21-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Mr Noplay", "repo": "https://github.com/scris/mrnoplay", "electron_version": "", "date_accessed": "2023-10-14 21:40:22-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Mr.Dclutterer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "mStream", "repo": "https://github.com/IrosTheBeggar/mStream", "electron_version": "", "date_accessed": "2023-10-14 21:40:24-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "muezzin", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Multiple File Manager", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Multrin", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Museeks", "repo": "https://github.com/martpie/museeks", "electron_version": "26.1.0", "date_accessed": "2023-10-14 21:40:25-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Music Player", "repo": "https://github.com/Tenpi/Music-Player", "electron_version": "^17.2.0", "date_accessed": "2023-10-14 21:40:27-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "music-player", "repo": "https://github.com/Aveek-Saha/MusicPlayer", "electron_version": "^7.3.3", "date_accessed": "2023-10-14 21:40:28-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Musify", "repo": "https://github.com/SrGMC/musify", "electron_version": "^7.2.4", "date_accessed": "2023-10-14 21:40:29-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "MuteMe", "repo": "", "electron_version": "23.2.2", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "MyLottery", "repo": "https://gitee.com/gemron/myLottery", "electron_version": "", "date_accessed": "2023-10-14 21:40:34-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "MyTools", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "NATTT", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Nertivia", "repo": "https://github.com/supertiger1234/nertivia-desktop-app/", "electron_version": "^15.3.1", "date_accessed": "2023-10-14 21:40:35-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Netron", "repo": "https://github.com/lutzroeder/netron", "electron_version": "27.0.0", "date_accessed": "2023-10-14 21:40:36-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Network Status Check", "repo": "https://github.com/cjerrington/net-check", "electron_version": "^22.0.0", "date_accessed": "2023-10-14 21:40:37-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "NetworkAssembler", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "NeuCalculator", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Nicepage", "repo": "https://github.com/NicepageApp/Nicepage", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "nimblenote", "repo": "https://github.com/nimblenote/nimblenote", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "NodemailerApp", "repo": "https://github.com/nodemailer/nodemailer-app", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Norde Source", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "NorthReader", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Nota", "repo": "https://github.com/notaapp/releases", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Notable", "repo": "https://github.com/notable/notable", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Notejoy", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Notion", "repo": "", "electron_version": "26.2.1", "date_accessed": "", "access_type": "manual", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "nteract", "repo": "https://github.com/nteract/nteract", "electron_version": "11.5.0", "date_accessed": "2023-10-14 21:40:45-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "NubiDo", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "nuclear", "repo": "https://github.com/nukeop/nuclear", "electron_version": "^12.1.0", "date_accessed": "2023-10-14 21:40:46-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Nuclide", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "nxshell", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Obsidian", "repo": "", "electron_version": "25.8.1", "date_accessed": "", "access_type": "manual", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "octopi-init", "repo": "https://github.com/OutsourcedGuru/octopi-init/blob/master/electron_README.md", "electron_version": "2.0.8", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ODrive", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "OhHai Browser", "repo": "https://github.com/OhHaiBrowser/Browser/", "electron_version": "^8.2.5", "date_accessed": "2023-10-14 21:40:48-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "One Copy", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Open Log Viewer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Open Stage Control", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "OpenBazaar", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "OpenComic", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "OpenSpeedTest-Server", "repo": "https://github.com/openspeedtest/Speed-Test", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Oversetter", "repo": "https://github.com/4gray/oversetter", "electron_version": "^7.1.9", "date_accessed": "2023-10-14 21:40:50-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "P3X OneNote", "repo": "https://github.com/patrikx3/onenote", "electron_version": "^25.8.2", "date_accessed": "2023-10-14 21:40:51-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "P3X Redis UI", "repo": "https://github.com/patrikx3/redis-ui", "electron_version": "^26.1.0", "date_accessed": "2023-10-14 21:40:52-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "PamFax", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Panda 2", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "PanWriter", "repo": "https://github.com/mb21/panwriter", "electron_version": "^26.2.4", "date_accessed": "2023-10-14 21:40:53-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "PaperArxiv", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "PaperCubes", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Papyrus", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Parsify Desktop", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Particle Dev", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "passky", "repo": "https://github.com/Rabbit-Company/Passky-Desktop", "electron_version": "^22.1.0", "date_accessed": "2023-10-14 21:40:55-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Patchwork", "repo": "https://github.com/ssbc/patchwork", "electron_version": "^11.3.0", "date_accessed": "2023-10-14 21:40:56-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Paymo Time Tracker", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Peacock", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "PeerShare", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Pencil", "repo": "https://github.com/evolus/pencil", "electron_version": "16.0.0", "date_accessed": "2023-10-14 21:40:57-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Pendulums", "repo": "https://github.com/Swing-team/pendulums-web-client", "electron_version": "^6.0.7", "date_accessed": "2023-10-14 21:40:58-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Pennywise", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Petal", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Phiewer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "PhonePresenter", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Photo Viewer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "PhotoScreenSaver", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Pic Crop", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Picturama", "repo": "https://github.com/picturama/picturama", "electron_version": "~11.1.0", "date_accessed": "2023-10-14 21:40:59-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "PileMd", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "PiTV", "repo": "https://github.com/ozankaraali/PiTV", "electron_version": "22.0.0", "date_accessed": "2023-10-14 21:41:01-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Playback", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "PlayCode", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Pocket Server", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Poddycast", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "poi", "repo": "https://github.com/poooi/poi", "electron_version": "^27.0.0", "date_accessed": "2023-10-14 21:41:02-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Polypane", "repo": "", "electron_version": "26.2.4", "date_accessed": "", "access_type": "manual", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "pomodoro-logger", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Pomolectron", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Pomotroid", "repo": "https://github.com/Splode/pomotroid", "electron_version": "^11.0.1", "date_accessed": "2023-10-14 21:41:03-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "PopSQL", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Postbird", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Postman", "repo": "", "electron_version": "18.3.5", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Pragli", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "PreMiD", "repo": "https://github.com/PreMiD/PreMiD", "electron_version": "11.3.0", "date_accessed": "2023-10-14 21:41:05-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Preserver", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Presets.io", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "PrettyEarth", "repo": "https://github.com/evertdespiegeleer/PrettyEarth", "electron_version": "^15.0.0", "date_accessed": "2023-10-14 21:41:06-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "PrexView", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Primate", "repo": "https://github.com/getprimate/primate", "electron_version": "^22.0.3", "date_accessed": "2023-10-14 21:41:07-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "primitive.nextgen", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ProDoctor Medicamentos", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Proposales", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ProSecrec", "repo": "https://github.com/HydroCarbons/ProSecrec", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ProtegoPDF", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Protoman", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ProtoPie", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Pullp", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Puppetry", "repo": "https://github.com/dsheiko/puppetry/", "electron_version": "^12.0.6", "date_accessed": "2023-10-14 21:41:09-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Putler", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Q-player", "repo": "https://github.com/Toooorch/q-player/", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Qawl", "repo": "https://github.com/sufone/qawl", "electron_version": "^10.2.0", "date_accessed": "2023-10-14 21:41:12-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "qikQR", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "QMUI Web", "repo": "https://github.com/QMUI/qmui_web_desktop", "electron_version": "", "date_accessed": "2023-10-14 21:41:13-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Quail", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Quark", "repo": "https://github.com/Nishkalkashyap/Quark-electron", "electron_version": "^6.1.9", "date_accessed": "2023-10-14 21:41:14-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Quba E-Invoice Viewer", "repo": "https://github.com/ZUGFeRD/quba-viewer", "electron_version": "20.0.0", "date_accessed": "2023-10-14 21:41:15-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "QuickBooks", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "QuickRedis", "repo": "https://github.com/quick123official/quick_redis_blog", "electron_version": "15.5.5", "date_accessed": "2023-10-14 21:41:17-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "r2e-todoworks", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "R6RC", "repo": "https://github.com/austinleath/r6rc", "electron_version": "^9.1.0", "date_accessed": "2023-10-14 21:41:18-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Racompass", "repo": "https://github.com/racompass/racompass", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Radio 50/50 Player", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Raider for Instagram", "repo": "https://github.com/AssetKid/raider-release", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Rainbow Board", "repo": "https://github.com/HarshKhandeparkar/rainbow-board", "electron_version": "^12.0.1", "date_accessed": "2023-10-14 21:41:20-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Rambox", "repo": "https://github.com/saenzramiro/rambox", "electron_version": "13.6.3", "date_accessed": "2023-10-14 21:41:22-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Raven Reader", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "raycho", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Reach Podcast Player", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "React-Explorer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Rebaslight", "repo": "https://github.com/rebaslight/rebaslight", "electron_version": "^23.1.0", "date_accessed": "2023-10-14 21:41:23-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Recode Converter", "repo": "https://github.com/murgatt/recode-converter", "electron_version": "^11.5.0", "date_accessed": "2023-10-14 21:41:24-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Recollectr", "repo": "https://github.com/Recollectr/releases", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Redis GUI (unofficial)", "repo": "https://github.com/ekvedaras/redis-gui", "electron_version": "19.1.9", "date_accessed": "2023-10-14 21:41:31-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Remaining Time", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Remember", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Remind", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Remindr", "repo": "https://github.com/MrDavidRios/remindr_releases", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "RemSupp", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "RenderTune", "repo": "https://github.com/MartinBarker/RenderTune", "electron_version": "11.3.0", "date_accessed": "2023-10-14 21:41:33-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Repic", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ReqView", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Responsively App", "repo": "https://github.com/manojVivek/responsively-app", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Responsivize", "repo": "https://github.com/virejdasani/Responsivize", "electron_version": "^12.0.7", "date_accessed": "2023-10-14 21:41:38-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Reversee", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "RIDE", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Ride Receipts", "repo": "https://github.com/ridereceipts/ridereceipts", "electron_version": "^9.0.4", "date_accessed": "2023-10-14 21:41:39-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Riot", "repo": "https://github.com/vector-im/element-desktop", "electron_version": "^26.2.1", "date_accessed": "2023-10-14 21:41:40-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "rmclient", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Rocket.Chat", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "RunJS", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Runlet", "repo": "https://github.com/runletapp/runlet", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "RStudio", "repo": "https://github.com/rstudio/rstudio", "electron_version": "26.2.4", "date_accessed": "", "access_type": "manual", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Saadhn", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Scratch For Discord", "repo": "https://github.com/scratch-for-discord/scratch-for-discord-app", "electron_version": "^19.0.8", "date_accessed": "2023-10-14 21:41:43-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "ScreenCat", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ScreenTray", "repo": "https://github.com/DSnopov/screentray-distribution", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "SeaPig", "repo": "https://github.com/yasumichi/seapig", "electron_version": "^7.0.0", "date_accessed": "2023-10-14 21:41:45-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Sejda PDF Desktop", "repo": "", "electron_version": "^7.0.0", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Sencha Architect", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Sencha Inspector", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Sencha Test", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Sencha Themer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "SEOBrowse", "repo": "https://github.com/seobrowse/serp/", "electron_version": "^9.0.0", "date_accessed": "2023-10-14 21:41:47-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Serene App", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Serina", "repo": "https://github.com/ORN-Fox/serina-1", "electron_version": "^24.2.0", "date_accessed": "2023-10-14 21:41:48-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Ses", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "sFTP Client", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "shadowsocks-electron", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Shapespark", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "sheepChat", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Shift", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Shuttle", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Signal", "repo": "https://github.com/signalapp/Signal-Desktop", "electron_version": "25.8.4", "date_accessed": "2023-10-14 21:41:49-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "Silex website builder", "repo": "https://github.com/silexlabs/silex-desktop/", "electron_version": "10.1.5", "date_accessed": "2023-10-14 21:41:50-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Simpico", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Simple-Finder", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "SimpleInstaBot", "repo": "https://github.com/mifi/SimpleInstaBot", "electron_version": "^19.1.8", "date_accessed": "2023-10-14 21:41:51-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Simplenote", "repo": "https://github.com/Automattic/simplenote-electron", "electron_version": "12.0.5", "date_accessed": "2023-10-14 21:41:53-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Singlebox", "repo": "https://github.com/webcatalog/neutron", "electron_version": "18.0.1", "date_accessed": "2023-10-14 21:41:54-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Sizzy", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Skype", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Slack", "repo": "", "electron_version": "26.2.1", "date_accessed": "", "access_type": "manual", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Slapdash", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "sleek", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Smallpdf", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "SnailFM", "repo": "https://github.com/snaildos/SnailFM-Application", "electron_version": "25.8.1", "date_accessed": "2023-10-14 21:41:55-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "SnipAway", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "SnipCommand", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Snipline", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Snippet Store", "repo": "https://github.com/ZeroX-DG/SnippetStore", "electron_version": "^7.3.3", "date_accessed": "2023-10-14 21:41:56-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "SnowyOwl", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Social Amnesia", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Socially", "repo": "https://github.com/JackHumphries9/Socially", "electron_version": "^12.0.2", "date_accessed": "2023-10-14 21:41:57-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Sofia", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Somiibo", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "SongRiffer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Sononym", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Soundboard", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Soundglass", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Soundnode", "repo": "https://github.com/Soundnode/soundnode-app", "electron_version": "^8.0.1", "date_accessed": "2023-10-14 21:41:59-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Source Me", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "SpaceEye", "repo": "https://github.com/KYDronePilot/SpaceEye", "electron_version": "~9.2.0", "date_accessed": "2023-10-14 21:42:00-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "SparkChess", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "SpinShare Client", "repo": "https://github.com/SpinShare/client", "electron_version": "12.2.3", "date_accessed": "2023-10-14 21:42:01-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Splice", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "spofly", "repo": "https://github.com/itsjustaplant/spofly", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "SportFX Studio", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "SpotSpot", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Spreaker Studio", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Sqlectron", "repo": "https://github.com/sqlectron/sqlectron-gui", "electron_version": "^12.0.1", "date_accessed": "2023-10-14 21:42:03-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "sqlui-native", "repo": "https://github.com/synle/sqlui-native", "electron_version": "^20.2.0", "date_accessed": "2023-10-14 21:42:04-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Stack", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "stacker", "repo": "https://github.com/enqueuer-land/stacker", "electron_version": "^22.3.25", "date_accessed": "2023-10-14 21:42:06-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "Stacks", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "STAMP", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Standard Notes", "repo": "https://github.com/standardnotes/desktop", "electron_version": "17.4.2", "date_accessed": "2023-10-14 21:42:07-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Standup Picker", "repo": "https://github.com/Mokkapps/scrum-daily-standup-picker", "electron_version": "^16.0.7", "date_accessed": "2023-10-14 21:42:08-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Station", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "stay-hydrated", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "SteelSeries Engine 3", "repo": "", "electron_version": "23.1.3", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "StickyNotes", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Stinker", "repo": "https://github.com/PatentLobster/stinker", "electron_version": "^11.4.11", "date_accessed": "2023-10-14 21:42:09-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Stockifier", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Stopawu", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "StopLight", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Storaji", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Storm", "repo": "https://github.com/StormSDK/StormApp", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "StreamBop", "repo": "https://github.com/snaildos/StreamBop", "electron_version": "25.8.1", "date_accessed": "2023-10-14 21:42:11-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Streamlabs Desktop", "repo": "https://github.com/stream-labs/desktop", "electron_version": "17.4.11", "date_accessed": "2023-10-14 21:42:13-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Street View Download 360", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "StudioTrans", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "StudyMD", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Sturdy", "repo": "https://github.com/sturdy-dev/sturdy", "electron_version": "", "date_accessed": "2023-10-14 21:42:16-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Subordination", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Subtitler", "repo": "https://github.com/s8sachin/subtitler", "electron_version": "^8", "date_accessed": "2023-10-14 21:42:17-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Super Productivity", "repo": "https://github.com/johannesjo/super-productivity", "electron_version": "^25.9.0", "date_accessed": "2023-10-14 21:42:18-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "Superpowers \u2014 HTML5 2D+3D game maker", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Superscript", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Svgsus", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Swifty", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Swit", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Switch", "repo": "https://github.com/ahkohd/switch-desktop", "electron_version": "^7.0.0-beta.6", "date_accessed": "2023-10-14 21:42:19-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "SwitchHosts", "repo": "https://github.com/oldj/SwitchHosts", "electron_version": "24.8.3", "date_accessed": "2023-10-14 21:42:20-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Symphony", "repo": "https://github.com/symphonyoss/SymphonyElectron", "electron_version": "26.2.4", "date_accessed": "2023-10-14 21:42:22-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "Synap", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "T.Viewer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Tabby", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Tabby Terminal", "repo": "https://github.com/Eugeny/tabby", "electron_version": "^25.3.0", "date_accessed": "2023-10-14 21:42:23-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "TagFlow", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "TagSpaces", "repo": "https://github.com/tagspaces/tagspaces", "electron_version": "25.8.3", "date_accessed": "2023-10-14 21:42:24-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Tagstoo", "repo": "https://sourceforge.net/projects/tagstoo/files/Tagstoo__sourcecode/", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Taskade", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Taskana", "repo": "https://github.com/mountainash/taskana", "electron_version": "26.2.4", "date_accessed": "2023-10-14 21:42:26-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "TEA Ebook", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Teleios Bible", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Ten Hands", "repo": "https://github.com/saisandeepvaddi/ten-hands", "electron_version": "", "date_accessed": "2023-10-14 21:42:27-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "T\u00e8s\u00e8v\u00e8", "repo": "https://github.com/teseve/teseve", "electron_version": "", "date_accessed": "2023-10-14 21:42:29-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Tess", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "TestCafe Studio", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "TestMace", "repo": "https://github.com/TestMace/TestMace-issues", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Testrec", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "texpaste", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "TextureLab", "repo": "https://github.com/njbrown/texturelab", "electron_version": "^13.0.0", "date_accessed": "2023-10-14 21:42:31-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "The Poker Timer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "themebuilder", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ThisMyPC", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Thorium Reader", "repo": "https://github.com/edrlab/thorium-reader/", "electron_version": "^25.5.0", "date_accessed": "2023-10-14 21:42:33-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Threema For Desktop", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ThunderDocs", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "TIDAL", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "TidGi", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Tilde", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Tiliq", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Time Series Admin", "repo": "https://github.com/timeseriesadmin/timeseriesadmin", "electron_version": "8.5.2", "date_accessed": "2023-10-14 21:42:34-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Time Zone Converter and World Clock", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "timeBuzzer", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Timetable", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "To Do", "repo": "https://github.com/luapp/ToDo", "electron_version": "^11.1.1", "date_accessed": "2023-10-14 21:42:35-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Tockler", "repo": "https://github.com/MayGo/tockler", "electron_version": "", "date_accessed": "2023-10-14 21:42:36-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "todometer", "repo": "https://github.com/cassidoo/todometer/", "electron_version": "^22.0.2", "date_accessed": "2023-10-14 21:42:37-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Tofino", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "tonfotos", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Top Browser", "repo": "https://bitbucket.org/speedydemon/electron_top_browser/", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Tough Cookies", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Trackabi Time Tracker", "repo": "https://github.com/Trackabi/desktop-time-tracking", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "TrackingTime", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Transee", "repo": "https://github.com/alessioforte/transee", "electron_version": "^18.0.1", "date_accessed": "2023-10-14 21:42:41-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Translation Editor", "repo": "https://bitbucket.org/bflower/react-intl-editor", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Translatium", "repo": "https://github.com/webcatalog/translatium-desktop", "electron_version": "16.1.0", "date_accessed": "2023-10-14 21:42:43-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Trello", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "TriCo", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Trilium Notes", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Trivia Desktop", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Tropy", "repo": "https://github.com/tropy/tropy/", "electron_version": "^25.8.4", "date_accessed": "2023-10-14 21:42:44-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "Trym", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ttth", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Tunlookup", "repo": "https://github.com/thephucit/tunlookup", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Turbo Download Manager", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Tusk", "repo": "https://github.com/klaussinani/tusk", "electron_version": "6.0.11", "date_accessed": "2023-10-14 21:42:48-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Tutti Quanti Shelf", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "TweakStyle", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Tweeten", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Twinkle Tray", "repo": "https://github.com/xanderfrangos/twinkle-tray", "electron_version": "^20.3.6", "date_accessed": "2023-10-14 21:42:49-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Twitch", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "TwitterTron", "repo": "https://github.com/afractal/twittertron-app", "electron_version": "", "date_accessed": "2023-10-14 21:42:50-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Typetalk", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Tzared", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "U Stair", "repo": "https://github.com/afmorenosa/U_Stair", "electron_version": "^9.3.4", "date_accessed": "2023-10-14 21:42:52-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "UbAuth", "repo": "https://github.com/chrisenytc/ubauth", "electron_version": "", "date_accessed": "2023-10-14 21:42:53-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "ueli", "repo": "https://github.com/oliverschwendener/ueli", "electron_version": "^26.3.0", "date_accessed": "2023-10-14 21:42:54-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "UMLBoard", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Unfx Proxy Checker", "repo": "https://github.com/assnctr/unfx-proxy-checker", "electron_version": "^20.1.4", "date_accessed": "2023-10-14 21:42:56-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Unicopedia Plus", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Unicopedia Sinica", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Unofficial Desktop Client for Google Assistant", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Unofficial Google Chat App", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Unofficial Zalo", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Upcount", "repo": "https://github.com/madisvain/upcount", "electron_version": "^10.2.0", "date_accessed": "2023-10-14 21:42:57-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "uPhone", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Utilso", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Vade Mecum Shelf", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Vagrant Manager", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Vectr", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Vershd", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Video Hub App", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Video Player", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Vikunja", "repo": "https://code.vikunja.io/desktop", "electron_version": "", "date_accessed": "2023-10-14 21:43:02-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Visual Family Tree", "repo": "https://github.com/Jisco/VisualFamilyTree", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Visual Studio Code", "repo": "https://github.com/microsoft/vscode", "electron_version": "25.8.4", "date_accessed": "2023-10-14 21:43:06-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "VivifyScrum", "repo": "https://github.com/Vivify-Ideas/vivifyscrum2-electron/", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "VK Messenger", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Voice Notifies", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "VoIPstudio", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Vrap", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Vue Calc", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "VuPC", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Waifu2x GUI", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WAIL", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Waiterio Restaurant POS", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Wakefy", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Walling", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Wanna Class", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Waqt", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Wayward", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "wdOS", "repo": "https://github.com/Webdeskme/wdOS/releases", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Web Net", "repo": "https://github.com/MEGAMINDMK", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Web Toolbox", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WebCatalog", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Webkiosk-Wrapper", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WebKitty", "repo": "https://github.com/yikuansun/webkitty", "electron_version": "^17.1.0", "date_accessed": "2023-10-14 21:43:10-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "WebTorrent", "repo": "https://github.com/webtorrent/webtorrent-desktop", "electron_version": "15.5.7", "date_accessed": "2023-10-14 21:43:11-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "WeekToDo", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WeFlow", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WeightHub", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Weltenschaft", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Wexond", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Whale", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WhatsApp", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Wildlink", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "winds.yml", "repo": "https://github.com/getstream/winds", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Wire", "repo": "https://github.com/wireapp", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WizardMirror", "repo": "https://www.github.com/Sanjit1/WizardMirror", "electron_version": "^6.0.2", "date_accessed": "2023-10-14 21:43:18-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "wnr", "repo": "https://github.com/RoderickQiu/wnr", "electron_version": "22.3.18", "date_accessed": "2023-10-14 21:43:19-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "WordMark", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WordofTheHour", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WordPress", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WorkPuls", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WORKSHEETS Data Studio", "repo": "https://github.com/FalconSoft/worksheets-data.studio", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "World History AP", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WoW Stat", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "WriteBar", "repo": "https://github.com/alexander-shvets/writebar", "electron_version": "", "date_accessed": "2023-10-14 21:43:21-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "XMind ZEN", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Xuanxuan IM", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "y2mp3", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "yana", "repo": "https://github.com/lukasbach/yana", "electron_version": "^10.1.1", "date_accessed": "2023-10-14 21:43:22-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Yet-Another-Gitbook-Reader", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Yoheim", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Yout", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Youtube Music for Desktop (Unofficial)", "repo": "https://github.com/Venipa/ytmdesktop2", "electron_version": "^20.3.3", "date_accessed": "2023-10-14 21:43:24-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "YTMDesktop App", "repo": "https://github.com/adlerluiz/ytmdesktop", "electron_version": "^11.4.9", "date_accessed": "2023-10-14 21:43:25-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Zap", "repo": "https://github.com/LN-Zap/zap-desktop", "electron_version": "9.4.4", "date_accessed": "2023-10-14 21:43:26-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "vulnerable", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "Zector", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Zefenify", "repo": "https://github.com/Zefenify/Wolf-Cola", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Zello", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Zeplin", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Zerabase", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Zettlr", "repo": "https://github.com/zettlr/zettlr", "electron_version": "^25.8.4", "date_accessed": "2023-10-14 21:43:29-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "patched" }, { "app_name": "Znote", "repo": "https://github.com/alagrede/znote-app", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "zonote", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Zoommy", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" }, { "app_name": "Zulip", "repo": "https://github.com/zulip/zulip-desktop", "electron_version": "^25.8.1", "date_accessed": "2023-10-14 21:43:32-0700", "access_type": "programmatic", "vulnerable_cve_2023_4863": "patched", "vulnerable_cve_2023_5217": "vulnerable" }, { "app_name": "\u767d\u524d", "repo": "", "electron_version": "", "date_accessed": "", "access_type": "programmatic", "vulnerable_cve_2023_4863": "unknown", "vulnerable_cve_2023_5217": "unknown" } ]