This CPE summary could be partial or incomplete. Please contact us for a detailed listing.


Vendor Apache First view 2014-03-02
Product Cordova Last view 2021-02-16
Version Type
Sofware Edition  
Target Software  
Target Hardware  

Activity : Overall


CPE Name Affected CVE
cpe:2.3:a:apache:cordova:1.8.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.3.0:rc2:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.4.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.4.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.4.1:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.5.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.5.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.6.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.6.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.6.1:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.7.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.7.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.8.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.3.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.8.1:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.9.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.9.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.0.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.0.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.1.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.1.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.1.0:rc2:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.2.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.2.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.2.0:rc2:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.3.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:0.9.4:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.5.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.4.0:rc2:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.4.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.5.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.3.0:rc2:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.3.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.9.0:-:*:*:*:iphone_os:*:* 14
cpe:2.3:a:apache:cordova:0.9.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:0.9.1:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:0.9.2:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:0.9.3:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:2.4.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:0.9.5:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:0.9.6:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.0.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.0.0:rc1:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.0.0:rc2:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.0.0:rc3:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.1.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.2.0:*:*:*:*:android:*:* 14
cpe:2.3:a:apache:cordova:1.3.0:*:*:*:*:android:*:* 14

Related : CVE

  Date Alert Description
7.8 2021-02-16 CVE-2021-21315

The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(),, si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.

3.3 2020-12-01 CVE-2020-11990

We have resolved a security issue in the camera plugin that could have affected certain Cordova (Android) applications. An attacker who could install (or lead the victim to install) a specially crafted (or malicious) Android application would be able to access pictures taken with the app externally.

7.4 2018-02-01 CVE-2017-3160

After the Android platform is added to Cordova the first time, or after a project is created using the build scripts, the scripts will fetch Gradle on the first build. However, since the default URI is not using https, it is vulnerable to a MiTM and the Gradle executable is not safe. The severity of this issue is high due to the fact that the build scripts immediately start a build after Gradle has been fetched. Developers who are concerned about this issue should install version 6.1.2 or higher of Cordova-Android. If developers are unable to install the latest version, this vulnerability can easily be mitigated by setting the CORDOVA_ANDROID_GRADLE_DISTRIBUTION_URL environment variable to

9.8 2017-10-30 CVE-2014-0073

The CDVInAppBrowser class in the Apache Cordova In-App-Browser standalone plugin (org.apache.cordova.inappbrowser) before 0.3.2 for iOS and the In-App-Browser plugin for iOS from Cordova 2.6.0 through 2.9.0 does not properly validate callback identifiers, which allows remote attackers to execute arbitrary JavaScript in the host page and consequently gain privileges via a crafted gap-iab: URI.

7.5 2017-10-30 CVE-2014-0072

ios/CDVFileTransfer.m in the Apache Cordova File-Transfer standalone plugin (org.apache.cordova.file-transfer) before 0.4.2 for iOS and the File-Transfer plugin for iOS from Cordova 2.4.0 through 2.9.0 might allow remote attackers to spoof SSL servers by leveraging a default value of true for the trustAllHosts option.

5.3 2017-10-27 CVE-2015-1835

Apache Cordova Android before 3.7.2 and 4.x before 4.0.2, when an application does not set explicit values in config.xml, allows remote attackers to modify undefined secondary configuration variables (preferences) via a crafted intent: URL.

7.5 2017-05-09 CVE-2016-6799

Product: Apache Cordova Android 5.2.2 and earlier. The application calls methods of the Log class. Messages passed to these methods (Log.v(), Log.d(), Log.i(), Log.w(), and Log.e()) are stored in a series of circular buffers on the device. By default, a maximum of four 16 KB rotated logs are kept in addition to the current log. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per application; any application installed on the device has the capability to read data logged by other applications.

4.4 2016-05-09 CVE-2015-5208

Apache Cordova iOS before 4.0.0 allows remote attackers to execute arbitrary plugins via a link.

5.3 2016-05-09 CVE-2015-5207

Apache Cordova iOS before 4.0.0 might allow attackers to bypass a URL whitelist protection mechanism in an app and load arbitrary resources by leveraging unspecified methods.

5 2015-11-23 CVE-2015-8320

Apache Cordova-Android before 3.7.0 improperly generates random values for BridgeSecret data, which makes it easier for attackers to conduct bridge hijacking attacks by predicting a value.

4.3 2015-11-23 CVE-2015-5256

Apache Cordova-Android before 4.1.0, when an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism, which allows attackers to bypass intended access restrictions via a crafted URI.

4.3 2014-11-15 CVE-2014-3502

Apache Cordova Android before 3.5.1 allows remote attackers to open and send data to arbitrary applications via a URL with a crafted URI scheme for an Android intent.

4.3 2014-11-15 CVE-2014-3501

Apache Cordova Android before 3.5.1 allows remote attackers to bypass the HTTP whitelist and connect to arbitrary servers by using JavaScript to open WebSocket connections through WebView.

6.4 2014-11-15 CVE-2014-3500

Apache Cordova Android before 3.5.1 allows remote attackers to change the start page via a crafted intent URL.

7.5 2014-03-02 CVE-2014-1884

Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier on Windows Phone 7 and 8 do not properly restrict navigation events, which allows remote attackers to bypass intended device-resource restrictions via content that is accessed (1) in an IFRAME element or (2) with the XMLHttpRequest method by a crafted application.

7.5 2014-03-02 CVE-2014-1882

Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier allow remote attackers to bypass intended device-resource restrictions of an event-based bridge via a crafted library clone that leverages IFRAME script execution and directly accesses bridge JavaScript objects, as demonstrated by certain cordova.require calls.

7.5 2014-03-02 CVE-2014-1881

Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier allow remote attackers to bypass intended device-resource restrictions of an event-based bridge via a crafted library clone that leverages IFRAME script execution and waits a certain amount of time for an OnJsPrompt handler return value as an alternative to correct synchronization.

7.5 2014-03-02 CVE-2012-6637

Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier do not anchor the end of domain-name regular expressions, which allows remote attackers to bypass a whitelist protection mechanism via a domain name that contains an acceptable name as an initial substring.

CWE : Common Weakness Enumeration

31% (5) CWE-264 Permissions, Privileges, and Access Controls
25% (4) CWE-20 Improper Input Validation
12% (2) CWE-254 Security Features
6% (1) CWE-532 Information Leak Through Log Files
6% (1) CWE-284 Access Control (Authorization) Issues
6% (1) CWE-200 Information Exposure
6% (1) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
6% (1) CWE-17 Code

Nessus® Vulnerability Scanner

id Description
2014-10-30 Name: The remote Windows host has web portal software installed that is affected by...
File: websphere_portal_8_5_0_0_cf03.nasl - Type: ACT_GATHER_INFO