webkit2gtk3-jsc-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the webkit2gtk3-jsc-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-Bounds

*
  • M
Information Exposure

*
  • M
Origin Validation Error

*
  • M
CVE-2024-40866

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • M
Cross-site Scripting (XSS)

*
  • M
Overly Permissive Cross-domain Whitelist

*
  • H
Out-of-Bounds

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • H
Improper Authorization

*
  • M
CVE-2023-42956

*
  • M
Authentication Bypass

*
  • H
Use After Free

*
  • H
Out-of-Bounds

<0:2.42.5-1.el8
  • H
Out-of-Bounds

<0:2.42.5-1.el8
  • H
CVE-2023-32359

<0:2.42.5-1.el8
  • H
Improper Input Validation

<0:2.40.5-1.el8
  • H
Improper Input Validation

<0:2.40.5-1.el8
  • H
Improper Enforcement of Behavioral Workflow

<0:2.40.5-1.el8
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.40.5-1.el8
  • M
CVE-2024-23263

*
  • M
CVE-2024-23254

*
  • H
CVE-2024-23226

*
  • M
CVE-2024-23252

*
  • M
Arbitrary Code Injection

*
  • M
CVE-2024-23284

*
  • H
CVE-2024-23213

<0:2.42.5-1.el8
  • H
Use After Free

<0:2.42.5-1.el8
  • H
CVE-2023-42833

<0:2.40.5-1.el8
  • H
Resource Exhaustion

<0:2.42.5-1.el8
  • H
CVE-2024-23206

<0:2.42.5-1.el8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el8_8.5
  • H
Out-of-Bounds

<0:2.42.5-1.el8
  • H
Out-of-Bounds

<0:2.42.5-1.el8
  • H
Out-of-bounds Write

<0:2.40.5-1.el8_9.1
  • H
CVE-2023-40451

<0:2.40.5-1.el8
  • H
Use After Free

<0:2.40.5-1.el8
  • H
Use After Free

<0:2.42.5-1.el8
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.38.5-1.el8_8.5
  • H
Static Code Injection

<0:2.40.5-1.el8
  • H
CVE-2023-32370

<0:2.40.5-1.el8
  • H
Use After Free

<0:2.40.5-1.el8
  • M
CVE-2022-32816

<0:2.36.7-1.el8
  • M
Out-of-bounds Write

<0:2.36.7-1.el8
  • H
Overly Permissive Cross-domain Whitelist

<0:2.40.5-1.el8
  • H
Information Exposure

<0:2.40.5-1.el8
  • H
Improper Input Validation

<0:2.40.5-1.el8
  • H
Information Exposure

<0:2.40.5-1.el8
  • H
Out-of-Bounds

<0:2.40.5-1.el8
  • H
Out-of-Bounds

<0:2.40.5-1.el8
  • H
Out-of-Bounds

<0:2.40.5-1.el8
  • H
Overly Permissive Cross-domain Whitelist

<0:2.40.5-1.el8
  • H
Out-of-Bounds

<0:2.40.5-1.el8
  • H
Out-of-Bounds

<0:2.40.5-1.el8
  • H
Out-of-Bounds

<0:2.40.5-1.el8
  • H
Information Exposure

<0:2.40.5-1.el8
  • H
Out-of-Bounds

<0:2.40.5-1.el8
  • H
Arbitrary Code Injection

<0:2.38.5-1.el8_8.5
  • H
Arbitrary Code Injection

<0:2.38.5-1.el8_8.5
  • H
Arbitrary Code Injection

<0:2.38.5-1.el8_8.5
  • H
Arbitrary Code Injection

<0:2.38.5-1.el8
  • H
Use After Free

<0:2.38.5-1.el8_8.4
  • H
Improper Input Validation

<0:2.38.5-1.el8_8.4
  • H
Use After Free

<0:2.38.5-1.el8_8.3
  • H
Use After Free

<0:2.36.7-1.el8_7.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el8
  • H
Arbitrary Code Injection

<0:2.38.5-1.el8
  • H
Arbitrary Code Injection

<0:2.38.5-1.el8
  • H
Arbitrary Code Injection

<0:2.38.5-1.el8
  • H
Arbitrary Code Injection

<0:2.38.5-1.el8
  • H
Out-of-Bounds

<0:2.36.7-1.el8_7.2
  • H
Out-of-Bounds

<0:2.38.5-1.el8
  • H
Out-of-Bounds

<0:2.38.5-1.el8
  • H
Use After Free

<0:2.38.5-1.el8
  • H
Information Exposure

<0:2.38.5-1.el8
  • H
Out-of-bounds Write

<0:2.38.5-1.el8
  • H
CVE-2022-46692

<0:2.38.5-1.el8
  • H
Out-of-bounds Write

<0:2.38.5-1.el8
  • H
Out-of-bounds Write

<0:2.38.5-1.el8
  • H
Out-of-bounds Write

<0:2.38.5-1.el8
  • H
CVE-2022-42852

<0:2.38.5-1.el8
  • H
Use After Free

<0:2.38.5-1.el8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.36.7-1.el8_7.1
  • H
CVE-2022-42824

<0:2.38.5-1.el8
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.38.5-1.el8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el8
  • H
Out-of-Bounds

<0:2.38.5-1.el8
  • H
Out-of-bounds Write

<0:2.38.5-1.el8
  • M
Buffer Overflow

<0:2.36.7-1.el8
  • H
Out-of-Bounds

<0:2.38.5-1.el8
  • M
Improper Input Validation

<0:2.36.7-1.el8_6
  • M
Use After Free

<0:2.36.7-1.el8
  • M
Information Exposure

<0:2.36.7-1.el8
  • M
Use After Free

<0:2.36.7-1.el8
  • M
Use After Free

<0:2.36.7-1.el8
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el8
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el8
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el8
  • M
Out-of-bounds Write

<0:2.36.7-1.el8
  • M
Use After Free

<0:2.36.7-1.el8
  • M
CVE-2022-22637

<0:2.34.6-1.el8
  • M
Use After Free

<0:2.36.7-1.el8
  • M
Buffer Overflow

<0:2.36.7-1.el8
  • M
Use After Free

<0:2.34.6-1.el8
  • M
Improper Restriction of Rendered UI Layers or Frames

<0:2.34.6-1.el8
  • M
Use After Free

<0:2.34.6-1.el8
  • M
Improper Use of Validation Framework

<0:2.34.6-1.el8
  • M
Origin Validation Error

<0:2.34.6-1.el8
  • M
Use After Free

<0:2.34.6-1.el8
  • M
Race Condition

<0:2.34.6-1.el8
  • M
Use After Free

<0:2.34.6-1.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.34.6-1.el8
  • M
Out-of-bounds Read

<0:2.34.6-1.el8
  • M
Integer Overflow or Wraparound

<0:2.34.6-1.el8
  • M
Buffer Overflow

<0:2.34.6-1.el8
  • M
Memory Leak

<0:2.34.6-1.el8
  • M
Use After Free

<0:2.34.6-1.el8
  • M
Use After Free

<0:2.34.6-1.el8
  • M
Information Exposure

<0:2.34.6-1.el8
  • M
Information Exposure

<0:2.34.6-1.el8
  • M
Open Redirect

<0:2.34.6-1.el8
  • M
CVE-2021-30887

<0:2.34.6-1.el8
  • M
Out-of-bounds Read

<0:2.34.6-1.el8
  • M
CVE-2021-30823

<0:2.34.6-1.el8
  • M
Cross-site Scripting (XSS)

<0:2.34.6-1.el8
  • M
Buffer Overflow

<0:2.34.6-1.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.34.6-1.el8
  • M
Use After Free

<0:2.34.6-1.el8
  • M
Out-of-bounds Write

<0:2.34.6-1.el8
  • M
Out-of-bounds Write

<0:2.34.6-1.el8
  • M
Out-of-bounds Write

<0:2.34.6-1.el8
  • M
Out-of-bounds Write

<0:2.34.6-1.el8
  • M
Use After Free

<0:2.30.4-3.el8_4
  • M
Improper Input Validation

<0:2.30.4-1.el8
  • M
Improper Input Validation

<0:2.30.4-1.el8
  • M
Improper Input Validation

<0:2.30.4-1.el8
  • M
Improper Input Validation

<0:2.30.4-1.el8
  • M
Improper Input Validation

<0:2.30.4-1.el8
  • M
Improper Input Validation

<0:2.32.3-2.el8
  • M
Information Exposure

<0:2.32.3-2.el8
  • M
Improper Input Validation

<0:2.32.3-2.el8
  • M
Improper Input Validation

<0:2.32.3-2.el8
  • M
Cross-site Scripting (XSS)

<0:2.32.3-2.el8
  • M
Improper Input Validation

<0:2.32.3-2.el8
  • M
Improper Input Validation

<0:2.32.3-2.el8
  • M
Integer Overflow or Wraparound

<0:2.32.3-2.el8
  • M
Improper Input Validation

<0:2.32.3-2.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.32.3-2.el8
  • M
Improper Input Validation

<0:2.32.3-2.el8
  • M
Improper Input Validation

<0:2.32.3-2.el8
  • M
Use After Free

<0:2.32.3-2.el8
  • M
Use After Free

<0:2.32.3-2.el8
  • M
Use After Free

<0:2.32.3-2.el8
  • M
Improper Input Validation

<0:2.28.4-1.el8
  • M
Improper Input Validation

<0:2.28.4-1.el8
  • M
Improper Input Validation

<0:2.28.4-1.el8
  • M
Insufficiently Protected Credentials

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Cross-site Scripting (XSS)

<0:2.28.4-1.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Cross-site Scripting (XSS)

<0:2.28.4-1.el8
  • M
Race Condition

<0:2.28.4-1.el8
  • M
Always-Incorrect Control Flow Implementation

<0:2.28.4-1.el8
  • M
Resource Exhaustion

<0:2.28.4-1.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.28.4-1.el8
  • M
Origin Validation Error

<0:2.28.4-1.el8
  • M
Use After Free

<0:2.28.4-1.el8
  • M
Improper Enforcement of Behavioral Workflow

<0:2.28.4-1.el8
  • M
Resource Exhaustion

<0:2.28.4-1.el8
  • M
Out-of-bounds Write

<0:2.30.4-1.el8
  • M
Arbitrary Command Injection

<0:2.28.4-1.el8
  • M
Improper Input Validation

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Improper Enforcement of Behavioral Workflow

<0:2.28.4-1.el8
  • M
Use After Free

<0:2.30.4-1.el8
  • M
Improper Enforcement of Behavioral Workflow

<0:2.28.4-1.el8
  • M
Use After Free

<0:2.28.4-1.el8
  • M
Improper Access Control

<0:2.28.4-1.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.30.4-1.el8
  • M
Improper Input Validation

<0:2.28.4-1.el8
  • M
Improper Input Validation

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Improper Enforcement of Behavioral Workflow

<0:2.28.4-1.el8
  • M
Improper Input Validation

<0:2.28.4-1.el8
  • M
Out-of-bounds Write

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Use After Free

<0:2.28.4-1.el8
  • M
Cross-site Scripting (XSS)

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Improper Restriction of Rendered UI Layers or Frames

<0:2.28.4-1.el8
  • M
Information Exposure

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Cross-site Scripting (XSS)

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Cross-site Scripting (XSS)

<0:2.28.4-1.el8
  • M
Out-of-bounds Write

<0:2.28.4-1.el8
  • M
Out-of-bounds Write

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Out-of-Bounds

<0:2.28.4-1.el8
  • M
Buffer Overflow

<0:2.28.4-1.el8
  • M
Improper Input Validation

<0:2.30.4-1.el8
  • M
Use After Free

<0:2.30.4-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Use After Free

<0:2.24.3-1.el8
  • L
Information Exposure

<0:2.24.3-1.el8
  • L
Out-of-Bounds

<0:2.24.3-1.el8
  • L
Use After Free

<0:2.24.3-1.el8
  • L
Integer Overflow or Wraparound

<0:2.24.3-1.el8
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.24.3-1.el8
  • L
Arbitrary Code Injection

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Improper Validation of Array Index

<0:2.24.3-1.el8
  • L
Arbitrary Code Injection

<0:2.24.3-1.el8
  • L
Arbitrary Code Injection

<0:2.24.3-1.el8
  • L
Arbitrary Code Injection

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Out-of-bounds Read

<0:2.24.3-1.el8
  • L
Arbitrary Code Injection

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Out-of-bounds Read

<0:2.24.3-1.el8
  • L
Arbitrary Code Injection

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Arbitrary Code Injection

<0:2.24.3-1.el8
  • L
Use After Free

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Use After Free

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Use After Free

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Improper Authorization

<0:2.24.3-1.el8
  • L
Cross-site Scripting (XSS)

<0:2.24.3-1.el8
  • L
Improper Input Validation

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Use After Free

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Arbitrary Code Injection

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Arbitrary Code Injection

<0:2.24.3-1.el8
  • L
Out-of-bounds Write

<0:2.24.3-1.el8
  • L
Cross-site Scripting (XSS)

<0:2.24.3-1.el8
  • L
Use After Free

<0:2.24.3-1.el8
  • L
Arbitrary Code Injection

<0:2.24.3-1.el8
  • L
Out-of-Bounds

<0:2.24.3-1.el8
  • L
Out-of-bounds Read

<0:2.24.3-1.el8
  • L
Information Exposure

<0:2.24.3-1.el8
  • L
Improper Authorization

<0:2.24.3-1.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.30.4-1.el8
  • M
Cross-site Scripting (XSS)

<0:2.24.4-2.el8_1
  • M
Use After Free

<0:2.24.4-2.el8_1
  • M
Out-of-Bounds

<0:2.24.4-2.el8_1
  • M
Out-of-Bounds

<0:2.24.4-2.el8_1
  • M
Cross-site Scripting (XSS)

<0:2.24.4-2.el8_1
  • M
Out-of-Bounds

<0:2.24.4-2.el8_1
  • M
Out-of-bounds Write

<0:2.24.4-2.el8_1
  • M
Out-of-bounds Write

<0:2.24.4-2.el8_1
  • M
Cross-site Scripting (XSS)

<0:2.24.4-2.el8_1
  • M
Use After Free

<0:2.24.4-2.el8_1
  • M
Out-of-bounds Write

<0:2.24.4-2.el8_1
  • M
Out-of-Bounds

<0:2.24.4-2.el8_1
  • M
Out-of-bounds Write

<0:2.24.4-2.el8_1
  • M
Out-of-bounds Write

<0:2.24.4-2.el8_1
  • M
Out-of-Bounds

<0:2.24.4-2.el8_1
  • M
Out-of-Bounds

<0:2.24.4-2.el8_1
  • M
Cross-site Scripting (XSS)

<0:2.24.4-2.el8_1
  • M
Directory Traversal

<0:2.32.3-2.el8
  • M
Improper Input Validation

<0:2.32.3-2.el8
  • M
Use After Free

<0:2.32.3-2.el8
  • M
Out-of-Bounds

<0:2.32.3-2.el8
  • M
Improper Input Validation

<0:2.32.3-2.el8
  • M
Incorrect Authorization

<0:2.32.3-2.el8
  • M
Incorrect Authorization

<0:2.32.3-2.el8
  • M
Information Exposure

<0:2.32.3-2.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.32.3-2.el8
  • M
Use After Free

*
  • M
Directory Traversal

<0:2.32.3-2.el8
  • M
Incomplete Cleanup

<0:2.32.3-2.el8
  • M
Use After Free

<0:2.32.3-2.el8
  • M
Buffer Overflow

<0:2.32.3-2.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.30.4-1.el8
  • M
Use After Free

<0:2.32.3-2.el8