webkit2gtk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the webkit2gtk package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2025-43458

*
  • H
CVE-2025-13947

*
  • L
CVE-2025-43421

*
  • H
Buffer Overflow

*
  • L
CVE-2025-43430

<2.50.2-1
  • L
CVE-2025-43425

<2.50.2-1
  • L
CVE-2025-43440

<2.50.2-1
  • L
CVE-2023-43000

<2.42.0-1
  • L
CVE-2025-43429

<2.50.2-1
  • L
CVE-2025-43434

<2.50.2-1
  • L
CVE-2025-43419

<2.50.0-1
  • L
CVE-2025-43443

<2.50.2-1
  • L
Out-of-bounds Write

<2.50.2-1
  • L
CVE-2025-43432

<2.50.2-1
  • H
Integer Overflow or Wraparound

<2.50.2-1
  • L
CVE-2025-43392

<2.50.2-1
  • L
CVE-2025-43427

<2.50.2-1
  • L
CVE-2025-43480

<2.46.0-1
  • L
CVE-2025-43343

<2.50.1-1
  • L
CVE-2025-43356

<2.50.0-1
  • L
CVE-2025-43368

<2.50.0-1
  • L
CVE-2025-43342

<2.50.0-1
  • L
CVE-2025-43272

<2.50.0-1
  • L
CVE-2025-43265

<2.48.5-1
  • L
CVE-2025-43211

<2.48.5-1
  • L
CVE-2025-31215

<2.48.2-1
  • L
CVE-2025-30427

<2.48.1-1
  • L
CVE-2025-24213

<2.48.1-1
  • L
CVE-2025-31206

<2.48.2-1
  • L
CVE-2025-43240

<2.48.5-1
  • L
CVE-2024-54551

<2.48.1-1
  • L
CVE-2025-31205

<2.48.2-1
  • L
CVE-2025-43216

<2.48.5-1
  • C
Use After Free

<2.44.3-1
  • L
CVE-2025-24189

<2.48.0-1
  • M
CVE-2024-44192

<2.48.0-1
  • L
CVE-2025-31204

<2.48.2-1
  • L
CVE-2025-24208

<2.48.1-1
  • C
Out-of-bounds Write

<2.46.0-1
  • L
CVE-2025-24209

<2.48.1-1
  • L
CVE-2025-31257

<2.48.2-1
  • L
CVE-2025-31278

<2.48.5-1
  • M
CVE-2025-24143

<2.46.6-1
  • M
Arbitrary Code Injection

<2.44.0-1
  • M
CVE-2024-23263

<2.44.0-1
  • H
Arbitrary Code Injection

<2.46.0-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.46.5-1
  • M
Origin Validation Error

<2.46.0-1
  • H
CVE-2024-44308

<2.46.4-1
  • H
CVE-2023-41074

<2.42.0-1
  • H
Use After Free

<2.42.0-1
  • H
CVE-2024-23213

<2.42.5-1
  • M
CVE-2024-40789

<2.44.3-1
  • M
CVE-2023-38599

<2.40.5-1
  • H
CVE-2024-27820

<2.44.2-1
  • M
CVE-2024-40794

<2.44.3-1
  • H
CVE-2024-27808

<2.44.2-1
  • H
CVE-2023-42950

<2.44.0-1
  • H
CVE-2023-37450

<2.40.4-1
  • H
CVE-2023-42890

<2.42.0-1
  • H
Use After Free

<2.38.0-1
  • L
CVE-2023-42875

<2.42.0-1
  • H
CVE-2023-32359

<2.42.0-1
  • C
CVE-2023-40397

<2.40.5-1
  • H
CVE-2023-35074

<2.40.0-1
  • H
Use After Free

<2.38.0-1
  • H
Improper Check for Unusual or Exceptional Conditions

<2.42.1-1
  • M
Cross-site Scripting (XSS)

<2.44.3-1
  • H
Use After Free

<2.40.1-1
  • M
CVE-2023-32370

<2.40.1-1
  • H
Use After Free

<2.40.5-1
  • M
Authentication Bypass

<2.44.0-1
  • H
CVE-2023-38595

<2.40.5-1
  • H
CVE-2023-38572

<2.40.5-1
  • H
Use After Free

<2.38.0-1
  • M
CVE-2022-46705

<2.38.4-1
  • H
CVE-2023-38600

<2.40.5-1
  • M
CVE-2022-46698

<2.38.3-1
  • L
CVE-2023-32409

<2.42.0-1
  • H
Out-of-bounds Write

<2.36.6-1
  • H
Use After Free

<2.38.4-1
  • H
Use After Free

<2.40.1-1
  • M
CVE-2022-42824

<2.38.2-1
  • H
Use After Free

<2.38.0-1
  • H
CVE-2022-48503

<2.38.0-1
  • H
CVE-2023-38597

<2.40.5-1
  • M
Improper Restriction of Rendered UI Layers or Frames

<2.38.2-1
  • M
Use After Free

<2.34.0-1
  • H
Out-of-bounds Write

<2.40.1-1
  • H
Out-of-bounds Write

<2.38.0-1
  • H
Out-of-bounds Write

<2.38.0-1
  • M
CVE-2022-46692

<2.38.3-1
  • H
Use After Free

<2.36.3-1
  • H
Out-of-bounds Read

<2.34.4-1
  • M
Improper Restriction of Rendered UI Layers or Frames

<2.38.4-1
  • H
Out-of-bounds Write

<2.36.7-1
  • M
CVE-2022-32933

<2.38.0-1
  • M
CVE-2022-22662

<2.36.0-1
  • H
Use After Free

<2.36.0-1
  • M
CVE-2022-22589

<2.34.5-1
  • M
Memory Leak

<2.34.0-1
  • H
Integer Overflow or Wraparound

<2.34.4-1
  • M
CVE-2021-30823

<2.34.1-1
  • H
Use After Free

<2.34.4-1
  • H
Use After Free

<2.36.3-1
  • H
Out-of-bounds Write

<2.36.3-1
  • M
Improper Authentication

<2.32.3-1
  • H
Buffer Overflow

<2.26.1-2
  • H
Use After Free

<2.32.3-1
  • M
CVE-2021-30887

<2.34.3-1
  • H
Out-of-bounds Write

<2.36.0-1
  • M
CVE-2021-1799

<2.30.6-1
  • H
Out-of-bounds Write

<2.36.3-1
  • M
Exposure of Resource to Wrong Sphere

<2.30.1-1
  • H
Use After Free

<2.36.0-1
  • M
CVE-2022-22677

<2.36.4-1
  • M
Cross-site Scripting (XSS)

<2.32.3-1
  • H
Out-of-bounds Write

<2.26.1-2
  • H
Out-of-bounds Write

<2.32.3-1
  • H
CVE-2020-9802

<2.28.3-1
  • M
CVE-2022-22592

<2.34.5-1
  • H
Use After Free

<2.30.1-1
  • H
Out-of-Bounds

<2.26.4-1
  • L
CVE-2025-31273

<2.48.5-1
  • C
CVE-2021-1870

<2.30.6-1
  • M
Out-of-Bounds

<2.26.4-1
  • M
Cross-site Scripting (XSS)

<2.30.1-1
  • H
Out-of-Bounds

<2.26.4-1
  • L
CVE-2025-24264

<2.48.1-1
  • H
Out-of-Bounds

<2.28.3-1
  • H
Use After Free

<2.30.3-1
  • H
Race Condition

<2.34.4-1
  • M
CVE-2020-9915

<2.28.4-1
  • H
Use After Free

<2.26.3-1
  • H
Out-of-bounds Write

<2.46.5-1
  • H
CVE-2024-54479

<2.46.5-1
  • H
Out-of-Bounds

<2.26.0-1
  • H
Out-of-bounds Write

<2.34.0-1
  • H
Arbitrary Command Injection

<2.46.6-1
  • C
CVE-2020-9850

<2.28.3-1
  • H
Out-of-Bounds

<2.26.1-1
  • M
Cross-site Scripting (XSS)

<2.46.4-1
  • H
Open Redirect

<2.34.1-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.28.0-2
  • H
Buffer Overflow

<2.34.4-1
  • L
CVE-2025-24216

<2.48.1-1
  • C
Improper Input Validation

<2.28.3-1
  • M
CVE-2024-27838

<2.44.3-1
  • H
Out-of-Bounds

<2.26.0-1
  • H
CVE-2024-54508

<2.46.5-1
  • M
Use After Free

<2.44.3-1
  • H
Out-of-Bounds

<2.32.0-2
  • H
Out-of-Bounds

<2.24.4-1
  • H
Out-of-bounds Write

<2.26.0-1
  • H
Out-of-Bounds

<2.24.4-1
  • M
CVE-2024-23271

<2.42.5-1
  • H
Out-of-bounds Write

<2.32.3-1
  • H
Out-of-Bounds

<2.26.0-1
  • H
Out-of-bounds Write

<2.26.3-1
  • H
Out-of-Bounds

<2.24.3-1
  • M
Cross-site Scripting (XSS)

<2.24.3-1
  • H
Use After Free

<2.30.1-1
  • H
Use After Free

<2.32.3-1
  • H
Use After Free

<2.28.4-1
  • M
Cross-site Scripting (XSS)

<2.30.1-1
  • L
CVE-2023-42970

<2.42.0-1
  • M
Information Exposure

<2.24.0-1
  • H
Out-of-bounds Write

<2.24.3-1
  • M
Out-of-bounds Read

<2.42.3-1
  • H
Out-of-Bounds

<2.26.0-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.30.1-1
  • M
Cross-site Scripting (XSS)

<2.28.0-2
  • H
CVE-2023-40451

<2.40.5-1
  • H
Out-of-bounds Write

<2.24.4-1
  • H
Out-of-Bounds

<2.28.3-1
  • H
CVE-2023-42833

<2.38.0-1
  • H
Use After Free

<2.24.3-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-Bounds

<2.24.4-1
  • H
Out-of-Bounds

<2.26.0-1
  • H
Out-of-bounds Write

<2.24.2-1
  • H
Use After Free

<2.24.2-1
  • M
Out-of-bounds Read

<2.24.2-1
  • M
CVE-2024-23254

<2.44.0-1
  • H
Resource Exhaustion

<2.28.2-1
  • H
Use After Free

<2.40.2-1
  • H
Use After Free

<2.30.3-1
  • M
Out-of-bounds Read

<2.24.2-1
  • H
Use After Free

<2.30.6-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Use After Free

<2.28.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.3-1
  • H
Out-of-bounds Write

<2.24.3-1
  • H
Out-of-bounds Write

<2.26.1-1
  • H
Integer Overflow or Wraparound

<2.24.1-1
  • M
Cross-site Scripting (XSS)

<2.26.0-1
  • H
Out-of-bounds Write

<2.24.1-1
  • L
Race Condition

<2.28.0-2
  • H
Out-of-Bounds

<2.26.0-1
  • H
Out-of-bounds Write

<2.38.3-1
  • H
Use After Free

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.38.1-1
  • H
Out-of-bounds Write

<2.24.2-1
  • H
Out-of-bounds Write

<2.24.4-1
  • M
CVE-2022-46725

<2.38.4-1
  • L
CVE-2025-43227

<2.48.5-1
  • L
Improper Input Validation

<2.48.5-1
  • L
Out-of-bounds Write

<2.22.5-1
  • H
CVE-2023-23518

<2.38.4-1
  • L
Out-of-bounds Write

<2.22.5-1
  • L
Out-of-Bounds

<2.22.0-2
  • M
CVE-2023-27954

<2.40.1-1
  • L
CVE-2025-43212

<2.48.5-1
  • L
Out-of-Bounds

<2.22.0-2
  • M
CVE-2022-42852

<2.38.3-1
  • M
Improper Restriction of Rendered UI Layers or Frames

<2.36.6-1
  • H
Out-of-bounds Write

<2.24.1-1
  • L
Out-of-Bounds

<2.22.1-1
  • L
Out-of-Bounds

<2.22.1-1
  • L
Out-of-Bounds

<2.22.3-1
  • M
CVE-2022-32816

<2.36.6-1
  • L
Out-of-Bounds

<2.22.0-2
  • L
CVE-2025-24223

<2.48.2-1
  • M
CVE-2025-24158

<2.46.6-1
  • H
Out-of-bounds Write

<2.24.2-1
  • H
Use After Free

<2.34.5-1
  • M
CVE-2024-54658

<2.44.0-1
  • L
Cross-site Scripting (XSS)

<2.22.5-1
  • M
Origin Validation Error

<2.40.1-1
  • H
Use After Free

<2.38.3-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.34.4-1
  • L
Use After Free

<2.22.0-2
  • H
Out-of-bounds Write

<2.24.1-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
CVE-2018-4278

<2.20.4-1
  • M
Cross-site Scripting (XSS)

<2.34.3-1
  • M
CVE-2024-44296

<2.46.3-1
  • L
Race Condition

<2.20.4-1
  • M
Information Exposure

<2.24.1-1
  • M
CVE-2021-42762

<2.34.1-1
  • L
Use After Free

<2.22.0-2
  • M
Out-of-bounds Read

<2.44.3-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
Cross-site Scripting (XSS)

<2.22.0-2
  • M
CVE-2024-54502

<2.46.5-1
  • L
Out-of-Bounds

<2.20.4-1
  • H
Out-of-Bounds

<2.44.3-1
  • H
Use After Free

<2.24.1-1
  • H
Integer Overflow or Wraparound

<2.44.2-1
  • M
Origin Validation Error

<2.34.4-1
  • L
Out-of-Bounds

<2.22.3-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Improper Input Validation

<2.22.0-2
  • M
Use After Free

<2.44.3-1
  • H
Out-of-bounds Write

<2.36.1-1
  • H
CVE-2021-30797

<2.32.3-1
  • H
Use After Free

<2.32.4-1
  • L
Out-of-bounds Write

<2.22.6-1
  • L
Improper Validation of Array Index

<2.22.0-2
  • C
Out-of-bounds Write

<2.48.0-1
  • L
Out-of-Bounds

<2.22.0-2
  • L
Out-of-Bounds

<2.20.1-2
  • L
Improper Input Validation

<2.22.0-2
  • M
CVE-2024-23284

<2.44.0-1
  • L
Out-of-Bounds

<2.20.3-1
  • M
Out-of-bounds Read

<2.32.4-1
  • H
Use After Free

<2.30.6-1
  • M
CVE-2021-30682

<2.32.0-2
  • C
CVE-2021-1871

<2.32.0-2
  • L
Out-of-Bounds

<2.20.3-1
  • L
Out-of-Bounds

<2.22.3-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.22.3-1
  • L
Insufficiently Protected Credentials

<2.20.3-1
  • H
Use After Free

<2.32.0-2
  • C
Use After Free

<2.42.1-1
  • M
CVE-2024-23206

<2.42.5-1
  • M
CVE-2023-42883

<2.42.4-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-bounds Write

<2.22.4-1
  • L
Reachable Assertion

<2.20.0-2
  • H
CVE-2023-38611

<2.40.5-1
  • L
Out-of-Bounds

<2.22.1-1
  • L
CVE-2018-4361

<2.22.0-2
  • L
Out-of-Bounds

<2.22.5-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • M
CVE-2023-38133

<2.40.5-1
  • L
Out-of-bounds Write

<2.20.3-1
  • L
Out-of-Bounds

<2.22.4-1
  • M
Out-of-Bounds

<2.42.2-1
  • M
CVE-2024-54467

<2.48.0-1
  • H
Out-of-bounds Write

<2.30.3-1
  • H
Out-of-bounds Write

<2.30.1-1
  • H
CVE-2023-38592

<2.40.5-1
  • L
Out-of-Bounds

<2.18.6-1
  • H
CVE-2023-32393

<2.40.0-1
  • L
Out-of-Bounds

<2.18.6-1
  • L
Use After Free

<2.20.2-1
  • L
Cross-site Scripting (XSS)

<2.18.1-1
  • H
Use After Free

<2.30.1-1
  • H
CVE-2023-42852

<2.42.2-1
  • H
Use After Free

<2.38.0-1
  • L
Cross-site Scripting (XSS)

<2.20.0-2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.38.5-1
  • L
Use After Free

<2.22.0-2
  • L
Out-of-Bounds

<2.18.4-1
  • L
Out-of-Bounds

<2.18.1-1
  • H
Out-of-Bounds

<2.28.0-2
  • L
Origin Validation Error

<2.22.0-2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.38.3-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.38.2-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
CVE-2023-38594

<2.40.5-1
  • L
Out-of-Bounds

<2.22.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • M
CVE-2022-32923

<2.38.0-1
  • H
Out-of-bounds Write

<2.36.3-1
  • H
Out-of-bounds Write

<2.40.0-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • M
Cross-site Scripting (XSS)

<2.26.4-1
  • H
Out-of-Bounds

<2.24.4-1
  • L
Cross-site Scripting (XSS)

<2.18.1-1
  • L
Out-of-Bounds

<2.16.6-1
  • H
Out-of-Bounds

<2.26.1-1
  • L
Improper Input Validation

<2.16.6-1
  • L
Race Condition

<2.20.1-1
  • H
Out-of-bounds Write

<2.26.3-1
  • H
Use After Free

<2.34.6-1
  • L
Out-of-Bounds

<2.20.1-1
  • L
Out-of-Bounds

<2.16.3-2
  • H
Out-of-bounds Write

<2.24.3-1
  • L
Out-of-Bounds

<2.20.0-2
  • H
Use After Free

<2.34.4-1
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-bounds Write

<2.20.4-1
  • H
Out-of-bounds Write

<2.34.0-1
  • H
Out-of-bounds Write

<2.32.4-1
  • H
Out-of-bounds Write

<2.32.3-1
  • L
Cross-site Scripting (XSS)

<2.16.3-1
  • H
Use After Free

<2.32.4-1
  • L
Out-of-Bounds

<2.16.3-1
  • L
Out-of-Bounds

<2.16.3-2
  • H
Use After Free

<2.28.0-2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.34.1-1
  • L
Out-of-Bounds

<2.18.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.14.6-1
  • H
Use After Free

<2.24.4-1
  • H
Use After Free

<2.24.2-1
  • M
Cross-site Scripting (XSS)

<2.32.3-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Improper Certificate Validation

<2.20.2-1
  • L
Out-of-Bounds

<2.16.4-1
  • M
Improper Restriction of Rendered UI Layers or Frames

<2.26.0-1
  • H
Out-of-bounds Write

<2.24.2-1
  • L
Out-of-Bounds

<2.14.6-1
  • M
Cross-site Scripting (XSS)

<2.26.0-1
  • L
Out-of-Bounds

<2.16.6-1
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
CVE-2017-2446

<2.14.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • H
Out-of-Bounds

<2.32.3-1
  • H
Integer Overflow or Wraparound

<2.32.3-1
  • L
Out-of-Bounds

<2.16.3-2
  • H
Use After Free

<2.24.1-1
  • M
Cross-site Scripting (XSS)

<2.24.4-1
  • L
Out-of-Bounds

<2.18.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Improper Validation of Array Index

<2.24.1-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.14.6-1
  • H
Use After Free

<2.24.1-1
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.24.1-1
  • L
Out-of-Bounds

<2.14.4-1
  • M
Out-of-bounds Read

<2.28.4-1
  • L
Out-of-bounds Write

<2.22.0-2
  • L
Information Exposure

<2.14.4-1
  • H
Cross-site Scripting (XSS)

<2.28.3-1
  • H
Arbitrary Command Injection

<2.28.4-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • H
Out-of-bounds Write

<2.24.1-1
  • L
Out-of-Bounds

<2.22.3-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.28.0-2
  • H
Out-of-Bounds

<2.28.0-2
  • L
Out-of-Bounds

<2.16.6-1
  • M
Always-Incorrect Control Flow Implementation

<2.28.0-2
  • L
Out-of-Bounds

<2.18.1-1
  • H
Origin Validation Error

<2.26.4-1
  • M
CVE-2021-1801

<2.30.6-1
  • L
Out-of-Bounds

<2.14.6-1
  • L
CVE-2020-29623

<2.30.6-1
  • H
Use After Free

<2.30.5-1
  • L
Out-of-Bounds

<2.22.0-2
  • L
Out-of-Bounds

<2.18.3-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.22.0-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.22.0-2
  • L
Out-of-Bounds

<2.14.4-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.14.3-1
  • M
Cross-site Scripting (XSS)

<2.24.1-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
Use After Free

<2.14.6-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.20.4-1
  • H
Out-of-Bounds

<2.26.1-1
  • L
Information Exposure

<2.14.3-1
  • H
Out-of-Bounds

<2.26.1-1
  • L
Out-of-Bounds

<2.16.4-1
  • L
Out-of-Bounds

<2.22.0-2
  • L
CVE-2025-43228

<2.48.5-1
  • M
Cross-site Scripting (XSS)

<2.26.1-1
  • M
Information Exposure

<2.26.0-1
  • L
Out-of-Bounds

<2.22.0-2
  • L
Improper Input Validation

<2.22.0-2
  • L
Out-of-Bounds

<2.18.4-1
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
Out-of-Bounds

<2.14.3-1
  • L
Improper Input Validation

<2.14.6-1
  • L
Improper Input Validation

<2.14.4-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Improper Input Validation

<2.16.3-2
  • L
Out-of-Bounds

<2.20.2-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Improper Input Validation

<2.12.4-1
  • M
Cross-site Scripting (XSS)

<2.24.4-1
  • L
Out-of-Bounds

<2.14.6-1
  • L
CVE-2017-2415

<2.14.6-1
  • L
Information Exposure

<2.14.3-1
  • H
Out-of-Bounds

<2.26.2-1
  • H
Out-of-bounds Write

<2.24.4-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Information Exposure

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Information Exposure

<2.20.0-2
  • L
Out-of-Bounds

<2.18.6-1
  • M
Cross-site Scripting (XSS)

<2.24.4-1
  • L
Arbitrary Command Injection

<2.18.6-1
  • M
CVE-2024-44185

<2.46.0-1
  • L
Out-of-Bounds

<2.14.4-1
  • H
Out-of-Bounds

<2.24.4-1
  • M
CVE-2024-40866

<2.46.0-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.14.4-1
  • H
Out-of-bounds Write

<2.24.1-1
  • L
Use After Free

<2.20.2-1
  • L
Out-of-Bounds

<2.18.6-1
  • L
Out-of-Bounds

<2.18.6-1
  • L
Out-of-Bounds

<2.18.3-1
  • M
Use After Free

<2.24.1-1
  • M
CVE-2025-24162

<2.46.6-1
  • M
Out-of-bounds Write

<2.46.3-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Integer Overflow or Wraparound

<2.16.3-2
  • L
Information Exposure

<2.18.1-1
  • L
Information Exposure

<2.14.4-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.42.5-1
  • M
CVE-2024-27834

<2.44.2-1
  • H
Out-of-Bounds

<2.24.4-1
  • H
Improper Input Validation

<2.24.1-1
  • H
Out-of-bounds Write

<2.42.3-1
  • M
CVE-2023-42956

<2.44.0-1
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.18.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
CVE-2018-11646

<2.20.3-1
  • L
Out-of-Bounds

<2.18.1-1
  • M
Out-of-bounds Read

<2.44.3-1
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.18.6-1
  • H
CVE-2019-6251

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • L
Out-of-Bounds

<2.14.3-1
  • M
Improper Data Handling

<2.24.1-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.40.3-1
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-bounds Write

<2.22.5-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Information Exposure

<2.14.3-1
  • M
CVE-2023-27932

<2.40.1-1
  • L
Cross-site Scripting (XSS)

<2.22.3-1
  • H
Out-of-bounds Write

<2.24.1-1
  • M
Out-of-bounds Read

<2.40.2-1
  • M
Improper Input Validation

<2.24.1-1
  • L
Information Exposure

<2.22.0-2
  • L
Use After Free

<2.22.0-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.22.1-1
  • H
CVE-2023-23517

<2.38.4-1
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
Out-of-Bounds

<2.14.6-1
  • L
Use After Free

<2.22.0-2
  • H
Out-of-bounds Write

<2.38.3-1
  • L
Out-of-bounds Read

<2.20.3-1
  • L
Incorrect Type Conversion or Cast

<2.20.4-1
  • L
Information Exposure

<2.14.3-1
  • H
Out-of-bounds Write

<2.38.0-1
  • L
Out-of-Bounds

<2.22.1-1
  • L
CVE-2017-2419

<2.14.6-1
  • L
CVE-2017-2386

<2.16.3-2
  • L
Information Exposure

<2.14.6-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
CVE-2017-2376

<2.16.3-2
  • L
Out-of-Bounds

<2.20.4-1
  • L
Out-of-Bounds

<2.18.4-1
  • H
CVE-2022-22637

<2.34.4-1
  • H
Use After Free

<2.36.4-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Use After Free

<2.22.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.3-1
  • L
Out-of-bounds Write

<2.36.6-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • M
CVE-2021-30884

<2.34.1-1
  • H
Out-of-bounds Write

<2.32.4-1
  • H
Buffer Overflow

<2.34.1-1
  • M
Use After Free

<2.32.4-1
  • H
Use After Free

<2.32.3-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Information Exposure

<2.18.1-1
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.16.6-1
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • H
Resource Management Errors

<2.42.0-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.30.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • M
Cross-site Scripting (XSS)

<2.28.4-1
  • C
Use After Free

<2.28.4-1
  • M
CVE-2021-1765

<2.30.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.32.2-1
  • H
Out-of-Bounds

<2.28.3-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • H
Cross-site Scripting (XSS)

<2.28.3-1
  • L
Out-of-Bounds

<2.16.3-2
  • H
Cross-site Scripting (XSS)

<2.28.3-1
  • L
Out-of-Bounds

<2.14.6-1
  • H
Out-of-bounds Write

<2.26.2-1
  • C
Improper Input Validation

<2.28.0-2
  • H
Out-of-Bounds

<2.26.1-1
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • H
Out-of-Bounds

<2.24.3-1
  • H
Out-of-bounds Write

<2.24.4-1
  • L
Out-of-Bounds

<2.14.3-1
  • H
Out-of-bounds Write

<2.24.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • H
Use After Free

<2.24.4-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.2-1
  • H
Out-of-bounds Write

<2.24.4-1
  • L
Out-of-Bounds

<2.14.3-1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Use After Free

<2.24.1-1
  • L
Out-of-Bounds

<2.22.0-2
  • L
Improper Access Control

<2.12.4-1
  • H
Out-of-bounds Write

<2.24.1-1
  • L
Out-of-bounds Write

<2.22.4-1
  • M
Cross-site Scripting (XSS)

<2.24.4-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.24.1-1
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

<2.22.6-1
  • L
Use After Free

<2.22.0-2
  • L
Out-of-Bounds

<2.20.4-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
Improper Input Validation

<2.22.0-2
  • L
Incorrect Type Conversion or Cast

<2.20.4-1
  • L
CVE-2018-4212

<2.22.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
CVE-2018-4232

<2.20.3-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Use After Free

<2.20.3-1
  • L
CVE-2018-11713

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Open Redirect

<2.18.6-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Information Exposure

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Improper Input Validation

<2.16.3-2
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Cross-site Scripting (XSS)

<2.14.6-1
  • L
Information Exposure

<2.14.4-1
  • L
Out-of-Bounds

<2.14.4-1
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.14.4-1
  • L
Out-of-Bounds

<2.18.4-1
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.14.4-1
  • L
Information Exposure

<2.16.3-2
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.12.4-1
  • L
Out-of-Bounds

<2.10.5-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.12.4-1
  • L
Out-of-Bounds

<2.10.5-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1