mozjs60 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mozjs60 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

*
  • M
Missing Required Cryptographic Step

*
  • M
Missing Required Cryptographic Step

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Resource Exhaustion

*
  • L
Incorrect Regular Expression

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Open Redirect

*
  • L
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Stack-based Buffer Overflow

<0:60.9.0-4.el8
  • M
Improper Authentication

<0:60.9.0-4.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Use After Free

<0:60.9.0-3.el8
  • L
Information Exposure

<0:60.9.0-3.el8
  • L
Out-of-Bounds

<0:60.9.0-3.el8
  • L
Use After Free

<0:60.9.0-3.el8
  • L
Integer Overflow or Wraparound

<0:60.9.0-3.el8
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.9.0-3.el8
  • L
Arbitrary Code Injection

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Improper Validation of Array Index

<0:60.9.0-3.el8
  • L
Arbitrary Code Injection

<0:60.9.0-3.el8
  • L
Arbitrary Code Injection

<0:60.9.0-3.el8
  • L
Arbitrary Code Injection

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Out-of-bounds Read

<0:60.9.0-3.el8
  • L
Arbitrary Code Injection

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Out-of-bounds Read

<0:60.9.0-3.el8
  • L
Arbitrary Code Injection

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Arbitrary Code Injection

<0:60.9.0-3.el8
  • L
Use After Free

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Use After Free

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Use After Free

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Improper Authorization

<0:60.9.0-3.el8
  • L
Cross-site Scripting (XSS)

<0:60.9.0-3.el8
  • L
Improper Input Validation

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Use After Free

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Arbitrary Code Injection

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Arbitrary Code Injection

<0:60.9.0-3.el8
  • L
Out-of-bounds Write

<0:60.9.0-3.el8
  • L
Cross-site Scripting (XSS)

<0:60.9.0-3.el8
  • L
Use After Free

<0:60.9.0-3.el8
  • L
Arbitrary Code Injection

<0:60.9.0-3.el8
  • L
Out-of-Bounds

<0:60.9.0-3.el8
  • L
Out-of-bounds Read

<0:60.9.0-3.el8
  • L
Information Exposure

<0:60.9.0-3.el8
  • L
Improper Authorization

<0:60.9.0-3.el8
  • M
Race Condition

<0:60.9.0-4.el8
  • M
Improper Ownership Management

<0:60.9.0-4.el8
  • M
Improper Ownership Management

<0:60.9.0-4.el8