webkit2gtk3-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the webkit2gtk3-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-Bounds

<0:2.50.3-1.el9_7
  • H
Buffer Overflow

<0:2.50.3-1.el9_7
  • H
CVE-2025-13947

<0:2.50.3-1.el9_7
  • H
Out-of-bounds Read

<0:2.50.3-1.el9_7
  • H
Use After Free

<0:2.50.3-1.el9_7
  • H
Out-of-Bounds

<0:2.50.3-1.el9_7
  • H
Out-of-Bounds

<0:2.50.3-1.el9_7
  • H
Use After Free

<0:2.50.3-1.el9_7
  • H
Buffer Overflow

<0:2.50.3-1.el9_7
  • H
Information Exposure

<0:2.46.1-2.el9_4
  • H
Out-of-Bounds

<0:2.50.3-1.el9_7
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

<0:2.50.3-1.el9_7
  • H
Improper Input Validation

<0:2.50.3-1.el9_7
  • H
Information Exposure

<0:2.50.3-1.el9_7
  • H
Improper Input Validation

<0:2.50.3-1.el9_7
  • H
Buffer Overflow

<0:2.50.3-1.el9_7
  • H
Use After Free

<0:2.42.5-1.el9
  • H
Out-of-Bounds

<0:2.50.1-0.el9_6
  • H
Improper Input Validation

<0:2.50.1-0.el9_6
  • H
Out-of-Bounds

<0:2.50.1-0.el9_6
  • H
Use After Free

<0:2.50.1-0.el9_6
  • H
Information Exposure

<0:2.50.1-0.el9_6
  • H
Improper Neutralization of Equivalent Special Elements

<0:2.48.5-1.el9_6
  • H
Out-of-bounds Read

<0:2.48.5-1.el9_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.48.5-1.el9_6
  • H
Allocation of Resources Without Limits or Throttling

<0:2.48.5-1.el9_6
  • H
Use After Free

<0:2.48.5-1.el9_6
  • H
Out-of-Bounds

<0:2.48.5-1.el9_6
  • H
Out-of-Bounds

<0:2.48.5-1.el9_6
  • M
User Interface (UI) Misrepresentation of Critical Information

*
  • H
Exposure of Private Information ('Privacy Violation')

<0:2.48.5-1.el9_6
  • H
Improper Validation of Array Index

<0:2.48.1-1.el9_5
  • H
Out-of-Bounds

<0:2.48.5-1.el9_6
  • H
Use After Free

<0:2.42.5-1.el9
  • H
Use After Free

<0:2.42.5-1.el9
  • H
NULL Pointer Dereference

<0:2.38.5-1.el9_2.3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9_2.3
  • H
Out-of-bounds Read

<0:2.38.5-1.el9_2.3
  • H
Use After Free

<0:2.38.5-1.el9_2.3
  • H
Information Exposure

<0:2.48.2-1.el9_6
  • H
Use After Free

<0:2.48.2-1.el9_6
  • H
Use After Free

<0:2.48.1-1.el9_5
  • H
Buffer Overflow

<0:2.48.1-1.el9_5
  • H
Cross-site Scripting (XSS)

<0:2.48.1-1.el9_5
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.48.1-1.el9_5
  • H
Out-of-Bounds

<0:2.48.1-1.el9_5
  • H
Information Exposure

<0:2.48.1-1.el9_5
  • H
Improper Input Validation

<0:2.48.1-1.el9_5
  • H
Out-of-bounds Write

<0:2.46.6-2.el9_5
  • M
Improperly Implemented Security Check for Standard

*
  • H
Access of Memory Location After End of Buffer

<0:2.46.3-1.el9_5
  • H
Out-of-bounds Write

<0:2.46.1-2.el9_4
  • H
Access of Memory Location After End of Buffer

<0:2.46.1-2.el9_4
  • H
Cross-site Scripting (XSS)

<0:2.46.3-2.el9_5
  • M
Arbitrary Command Injection

*
  • M
Missing Authorization

*
  • H
Allocation of Resources Without Limits or Throttling

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.46.6-1.el9_5
  • H
Out-of-bounds Write

<0:2.46.6-1.el9_5
  • H
Allocation of Resources Without Limits or Throttling

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.46.1-2.el9_4
  • H
Use After Free

<0:2.46.1-2.el9_4
  • H
Improper Input Validation

<0:2.46.5-1.el9_5
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.46.5-1.el9_5
  • H
Out-of-bounds Read

<0:2.46.5-1.el9_5
  • H
Improper Resource Shutdown or Release

<0:2.46.5-1.el9_5
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.3
  • H
Origin Validation Error

<0:2.46.1-2.el9_4
  • H
CVE-2024-40866

<0:2.46.1-2.el9_4
  • H
Out-of-Bounds

<0:2.46.1-2.el9_4
  • H
Information Exposure

<0:2.46.1-2.el9_4
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.46.1-2.el9_4
  • H
Overly Permissive Cross-domain Whitelist

<0:2.42.5-1.el9
  • H
Use After Free

<0:2.46.1-2.el9_4
  • H
Out-of-bounds Read

<0:2.46.1-2.el9_4
  • H
Out-of-bounds Read

<0:2.46.1-2.el9_4
  • H
Use After Free

<0:2.46.1-2.el9_4
  • H
Out-of-bounds Read

<0:2.46.1-2.el9_4
  • H
Improper Authorization

<0:2.38.5-1.el9_2.3
  • H
Authentication Bypass

<0:2.44.3-2.el9
  • H
CVE-2023-42956

<0:2.44.3-2.el9
  • H
Use After Free

<0:2.44.3-2.el9
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
CVE-2023-32359

<0:2.42.5-1.el9
  • H
Improper Input Validation

<0:2.40.5-1.el9
  • H
Improper Input Validation

<0:2.40.5-1.el9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.40.5-1.el9
  • H
Improper Enforcement of Behavioral Workflow

<0:2.40.5-1.el9
  • H
CVE-2024-23263

<0:2.46.1-2.el9_4
  • H
CVE-2024-23252

<0:2.38.5-1.el9_2.3
  • H
CVE-2024-23226

*
  • H
CVE-2024-23284

<0:2.46.1-2.el9_4
  • H
Arbitrary Code Injection

<0:2.46.1-2.el9_4
  • H
CVE-2024-23254

<0:2.46.1-2.el9_4
  • H
CVE-2023-42833

<0:2.40.5-1.el9
  • H
Use After Free

<0:2.42.5-1.el9
  • H
Resource Exhaustion

<0:2.42.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
Out-of-bounds Write

<0:2.42.5-1.el9
  • H
CVE-2023-40451

<0:2.40.5-1.el9
  • H
CVE-2023-41074

<0:2.38.5-1.el9_2.3
  • H
Use After Free

<0:2.42.5-1.el9
  • H
CVE-2023-35074

<0:2.38.5-1.el9_2.3
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.38.5-1.el9_2.3
  • H
Static Code Injection

<0:2.40.5-1.el9
  • H
CVE-2023-32370

<0:2.40.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9_2.3
  • M
CVE-2022-32816

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • H
Overly Permissive Cross-domain Whitelist

<0:2.40.5-1.el9
  • H
Information Exposure

<0:2.40.5-1.el9
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.3
  • H
Information Exposure

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Overly Permissive Cross-domain Whitelist

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Information Exposure

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9_2.2
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.2
  • H
Use After Free

<0:2.38.5-1.el9_2.1
  • H
Use After Free

<0:2.36.7-1.el9_1.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.36.7-1.el9_1.2
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Information Exposure

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
CVE-2022-46692

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
CVE-2022-42852

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.36.7-1.el9_1.1
  • H
CVE-2022-42824

<0:2.38.5-1.el9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.38.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • M
Buffer Overflow

<0:2.36.7-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • M
Improper Input Validation

<0:2.36.7-1.el9_0
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Information Exposure

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Buffer Overflow

<0:2.36.7-1.el9