v8-12.4-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the v8-12.4-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
OS Command Injection

*
  • M
CVE-2023-30588

*
  • M
Integer Overflow or Wraparound

*
  • M
CVE-2023-30589

*
  • M
Improper Validation of Integrity Check Value

*
  • M
CVE-2023-30590

*
  • L
Information Exposure

*
  • M
Integer Overflow or Wraparound

*
  • H
Numeric Truncation Error

<3:12.4.254.21-1.22.16.0.2.module+el8.10.0+23338+c5a38893
  • L
Inefficient Regular Expression Complexity

*
  • L
Inefficient Regular Expression Complexity

*
  • H
CVE-2023-30581

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
HTTP Request Smuggling

*
  • H
Uncaught Exception

<3:12.4.254.21-1.22.16.0.1.module+el8.10.0+23140+4056b950
  • H
Memory Leak

<3:12.4.254.21-1.22.16.0.1.module+el8.10.0+23140+4056b950
  • L
Memory Leak

*
  • L
Buffer Under-read

*
  • M
HTTP Request Smuggling

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • H
Heap-based Buffer Overflow

<3:12.4.254.21-1.22.15.0.1.module+el8.10.0+23068+28ff2340
  • M
Integer Overflow or Wraparound

*
  • H
Use After Free

<3:12.4.254.21-1.22.15.0.1.module+el8.10.0+23068+28ff2340
  • M
Detection of Error Condition Without Action

*
  • H
Resource Exhaustion

<3:12.4.254.21-1.22.13.1.1.module+el8.10.0+22759+46b58560
  • H
Incorrect Authorization

<3:12.4.254.21-1.22.13.1.1.module+el8.10.0+22759+46b58560
  • H
Use of Insufficiently Random Values

<3:12.4.254.21-1.22.13.1.1.module+el8.10.0+22759+46b58560