gtk3-immodule-xim vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gtk3-immodule-xim package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Arbitrary Code Injection

*
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Directory Traversal

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Stack-based Buffer Overflow

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
NULL Pointer Dereference

<0:3.22.30-3.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Improper Authorization

<0:3.22.30-5.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Information Exposure

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Improper Certificate Validation

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Uncontrolled Recursion

<0:3.22.30-3.el7