webkitgtk4-jsc-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the webkitgtk4-jsc-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
CVE-2024-23284

<0:2.42.5-1.amzn2.0.3
  • M
CVE-2023-42956

<0:2.42.5-1.amzn2.0.3
  • M
CVE-2024-23263

<0:2.42.5-1.amzn2.0.3
  • H
CVE-2024-23252

<0:2.42.5-1.amzn2.0.1
  • H
Use After Free

<0:2.42.4-3.amzn2.0.2
  • H
CVE-2023-42843

<0:2.42.3-3.amzn2.0.1
  • H
CVE-2024-23226

<0:2.42.3-3.amzn2.0.1
  • H
CVE-2024-23213

<0:2.42.5-1.amzn2.0.1
  • H
CVE-2024-23206

<0:2.42.5-1.amzn2.0.1
  • H
Use After Free

<0:2.42.5-1.amzn2.0.1
  • H
CVE-2023-42833

<0:2.42.5-1.amzn2.0.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.42.4-3.amzn2.0.2
  • H
Out-of-bounds Write

<0:2.42.3-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.42.4-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.42.3-3.amzn2.0.1
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.42.3-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.42.3-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.42.3-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.42.4-3.amzn2.0.1
  • H
CVE-2023-35074

<0:2.42.3-3.amzn2.0.1
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.42.3-3.amzn2.0.1
  • H
CVE-2023-40451

<0:2.42.3-3.amzn2.0.1
  • H
CVE-2023-41074

<0:2.42.3-3.amzn2.0.1
  • H
Use After Free

<0:2.42.3-3.amzn2.0.1
  • H
Use After Free

<0:2.42.3-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.42.3-3.amzn2.0.1
  • H
CVE-2023-32359

<0:2.42.3-3.amzn2.0.1
  • H
Improper Enforcement of Behavioral Workflow

<0:2.42.3-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.42.3-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.40.5-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.40.5-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.40.5-3.amzn2.0.1
  • H
Use After Free

<0:2.40.5-3.amzn2.0.1
  • H
Static Code Injection

<0:2.40.5-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.40.5-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.40.5-3.amzn2.0.1
  • H
Information Exposure

<0:2.40.5-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.40.5-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.40.5-3.amzn2.0.1
  • H
Overly Permissive Cross-domain Whitelist

<0:2.40.5-3.amzn2.0.1
  • H
CVE-2023-32370

<0:2.40.5-3.amzn2.0.1
  • H
Information Exposure

<0:2.40.5-3.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.38.5-3.amzn2.0.3
  • H
Arbitrary Code Injection

<0:2.38.5-3.amzn2.0.2
  • H
Arbitrary Code Injection

<0:2.38.5-3.amzn2.0.2
  • H
Arbitrary Code Injection

<0:2.38.5-3.amzn2.0.2
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Protection Mechanism Failure

<0:2.38.5-3.amzn2.0.1
  • H
Information Exposure

<0:2.38.5-3.amzn2.0.1
  • H
Overly Permissive Cross-domain Whitelist

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
CVE-2022-42852

<0:2.38.5-3.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.38.5-3.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.38.5-3.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.38.5-3.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
Information Exposure

<0:2.38.5-3.amzn2.0.1
  • H
CVE-2022-46692

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
CVE-2022-42824

<0:2.38.5-3.amzn2.0.1
  • H
CVE-2022-32816

<0:2.38.5-3.amzn2.0.1
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.38.5-3.amzn2.0.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Improper Use of Validation Framework

<0:2.38.5-3.amzn2.0.1
  • H
Improper Use of Validation Framework

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
Improper Use of Validation Framework

<0:2.38.5-3.amzn2.0.1
  • H
Improper Resource Shutdown or Release

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Information Exposure

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Memory Leak

<0:2.38.5-3.amzn2.0.1
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
CVE-2021-32912

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Read

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Race Condition

<0:2.38.5-3.amzn2.0.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-3.amzn2.0.1
  • H
Buffer Overflow

<0:2.38.5-3.amzn2.0.1
  • H
Cross-site Scripting (XSS)

<0:2.38.5-3.amzn2.0.1
  • H
Integer Overflow or Wraparound

<0:2.38.5-3.amzn2.0.1
  • H
Buffer Overflow

<0:2.38.5-3.amzn2.0.1
  • H
Open Redirect

<0:2.38.5-3.amzn2.0.1
  • H
CVE-2021-30887

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.5-3.amzn2.0.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Information Exposure

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-bounds Read

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Cross-site Scripting (XSS)

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Information Exposure

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Integer Overflow or Wraparound

<0:2.38.5-3.amzn2.0.1
  • H
Out-of-Bounds

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Improper Input Validation

<0:2.38.5-3.amzn2.0.1
  • H
Incorrect Authorization

<0:2.38.5-3.amzn2.0.1
  • H
Use After Free

<0:2.38.5-3.amzn2.0.1
  • H
Incomplete Cleanup

<0:2.38.5-3.amzn2.0.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-3.amzn2.0.1
  • H
CVE-2020-22592

<0:2.38.5-3.amzn2.0.1
  • H
Incorrect Authorization

<0:2.38.5-3.amzn2.0.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.28.2-3.amzn2.0.2
  • M
Use After Free

<0:2.28.2-3.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Always-Incorrect Control Flow Implementation

<0:2.28.2-2.amzn2.0.1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.28.2-2.amzn2.0.1
  • M
Race Condition

<0:2.28.2-2.amzn2.0.1
  • M
CVE-2020-3899

<0:2.28.2-2.amzn2.0.1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.28.2-2.amzn2.0.1
  • M
Origin Validation Error

<0:2.28.2-2.amzn2.0.1
  • M
Use After Free

<0:2.28.2-2.amzn2.0.1
  • M
CVE-2020-3862

<0:2.28.2-2.amzn2.0.1
  • M
Use After Free

<0:2.28.2-2.amzn2.0.1
  • M
Use After Free

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
CVE-2019-8769

<0:2.28.2-2.amzn2.0.1
  • M
Improper Restriction of Rendered UI Layers or Frames

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Incomplete Cleanup

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-Bounds

<0:2.28.2-2.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Read

<0:2.28.2-2.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Read

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.28.2-2.amzn2.0.1
  • M
CVE-2019-6251

<0:2.28.2-2.amzn2.0.1
  • M
Out-of-bounds Write

<0:2.28.2-2.amzn2.0.1
  • M
Improper Data Handling

<0:2.28.2-2.amzn2.0.1