webkit2gtk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the webkit2gtk package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-54479

<2.46.5-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.46.5-1
  • H
CVE-2024-54508

<2.46.5-1
  • M
CVE-2024-54502

<2.46.5-1
  • C
Out-of-bounds Write

<2.46.0-1
  • M
Cross-site Scripting (XSS)

<2.46.4-1
  • H
CVE-2024-44308

<2.46.4-1
  • M
CVE-2024-44296

<2.46.3-1
  • M
Out-of-bounds Write

<2.46.3-1
  • M
CVE-2024-44185

<2.46.0-1
  • H
CVE-2024-27808

<2.44.2-1
  • H
Integer Overflow or Wraparound

<2.44.2-1
  • M
Origin Validation Error

<2.46.0-1
  • M
CVE-2024-40866

<2.46.0-1
  • H
Out-of-Bounds

<2.44.3-1
  • M
CVE-2024-27838

<2.44.3-1
  • H
CVE-2024-27820

<2.44.2-1
  • M
CVE-2024-23271

<2.42.5-1
  • M
Use After Free

<2.44.3-1
  • M
Out-of-bounds Read

<2.44.3-1
  • M
Out-of-bounds Read

<2.44.3-1
  • M
CVE-2024-40789

<2.44.3-1
  • M
CVE-2024-40794

<2.44.3-1
  • M
Cross-site Scripting (XSS)

<2.44.3-1
  • C
Use After Free

<2.44.3-1
  • M
Use After Free

<2.44.3-1
  • M
CVE-2024-27834

<2.44.2-1
  • M
Arbitrary Code Injection

<2.44.0-1
  • H
CVE-2023-42950

<2.44.0-1
  • M
CVE-2024-23254

<2.44.0-1
  • M
CVE-2024-23284

<2.44.0-1
  • M
CVE-2024-23263

<2.44.0-1
  • M
Authentication Bypass

<2.44.0-1
  • M
CVE-2023-42956

<2.44.0-1
  • C
Use After Free

<2.42.1-1
  • H
CVE-2024-23213

<2.42.5-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.42.5-1
  • H
CVE-2023-42833

<2.38.0-1
  • M
CVE-2024-23206

<2.42.5-1
  • H
Resource Management Errors

<2.42.0-1
  • M
CVE-2023-42883

<2.42.4-1
  • H
CVE-2023-42890

<2.42.0-1
  • M
Out-of-bounds Read

<2.42.3-1
  • H
Out-of-bounds Write

<2.42.3-1
  • M
Out-of-Bounds

<2.42.2-1
  • H
CVE-2023-42852

<2.42.2-1
  • M
Improper Restriction of Rendered UI Layers or Frames

<2.38.4-1
  • M
CVE-2022-46725

<2.38.4-1
  • M
CVE-2022-46705

<2.38.4-1
  • H
CVE-2023-32359

<2.42.0-1
  • M
CVE-2022-32933

<2.38.0-1
  • H
Use After Free

<2.40.5-1
  • H
Use After Free

<2.42.0-1
  • H
CVE-2023-35074

<2.40.0-1
  • H
Improper Check for Unusual or Exceptional Conditions

<2.42.1-1
  • H
CVE-2023-41074

<2.42.0-1
  • H
CVE-2023-40451

<2.40.5-1
  • C
CVE-2023-40397

<2.40.5-1
  • H
Use After Free

<2.40.1-1
  • M
CVE-2023-32370

<2.40.1-1
  • H
CVE-2023-38611

<2.40.5-1
  • M
CVE-2023-38599

<2.40.5-1
  • H
CVE-2023-38595

<2.40.5-1
  • H
CVE-2023-38592

<2.40.5-1
  • H
CVE-2023-38600

<2.40.5-1
  • H
CVE-2023-38597

<2.40.5-1
  • M
CVE-2023-38133

<2.40.5-1
  • H
CVE-2023-38572

<2.40.5-1
  • H
CVE-2023-38594

<2.40.5-1
  • H
CVE-2023-32393

<2.40.0-1
  • H
CVE-2023-37450

<2.40.4-1
  • H
CVE-2022-48503

<2.38.0-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.40.3-1
  • H
Out-of-bounds Write

<2.40.0-1
  • L
CVE-2023-32409

<2.42.0-1
  • H
Use After Free

<2.40.2-1
  • M
Out-of-bounds Read

<2.40.2-1
  • M
CVE-2023-27932

<2.40.1-1
  • H
Use After Free

<2.40.1-1
  • M
CVE-2023-27954

<2.40.1-1
  • H
Out-of-bounds Write

<2.40.1-1
  • H
Use After Free

<2.38.0-1
  • H
Use After Free

<2.38.0-1
  • H
Use After Free

<2.38.0-1
  • H
Use After Free

<2.38.0-1
  • H
Use After Free

<2.38.0-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.38.5-1
  • H
CVE-2023-23518

<2.38.4-1
  • H
CVE-2023-23517

<2.38.4-1
  • H
Use After Free

<2.38.4-1
  • H
Out-of-bounds Write

<2.38.3-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.38.3-1
  • H
Use After Free

<2.38.3-1
  • M
CVE-2022-46692

<2.38.3-1
  • H
Out-of-bounds Write

<2.38.0-1
  • H
Out-of-bounds Write

<2.38.1-1
  • M
CVE-2022-46698

<2.38.3-1
  • H
Out-of-bounds Write

<2.38.3-1
  • M
CVE-2022-42852

<2.38.3-1
  • M
CVE-2022-42824

<2.38.2-1
  • M
Improper Restriction of Rendered UI Layers or Frames

<2.38.2-1
  • M
CVE-2022-32923

<2.38.0-1
  • H
Out-of-bounds Write

<2.38.0-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.38.2-1
  • H
Out-of-bounds Write

<2.38.0-1
  • M
Improper Restriction of Rendered UI Layers or Frames

<2.36.6-1
  • H
Out-of-bounds Write

<2.36.7-1
  • M
CVE-2022-32816

<2.36.6-1
  • H
Out-of-bounds Write

<2.36.6-1
  • M
CVE-2022-22662

<2.36.0-1
  • M
CVE-2022-22677

<2.36.4-1
  • H
Use After Free

<2.36.4-1
  • L
Out-of-bounds Write

<2.36.6-1
  • H
Use After Free

<2.36.3-1
  • H
Out-of-bounds Write

<2.36.3-1
  • H
Use After Free

<2.36.3-1
  • H
Out-of-bounds Write

<2.36.3-1
  • H
Out-of-bounds Write

<2.36.3-1
  • H
Out-of-bounds Write

<2.36.1-1
  • H
Out-of-bounds Write

<2.36.0-1
  • H
Use After Free

<2.36.0-1
  • H
Use After Free

<2.36.0-1
  • H
CVE-2022-22637

<2.34.4-1
  • H
Use After Free

<2.34.6-1
  • H
Use After Free

<2.34.5-1
  • M
CVE-2022-22592

<2.34.5-1
  • M
CVE-2022-22589

<2.34.5-1
  • M
Origin Validation Error

<2.34.4-1
  • H
Race Condition

<2.34.4-1
  • H
Use After Free

<2.34.4-1
  • H
Buffer Overflow

<2.34.4-1
  • H
Out-of-bounds Read

<2.34.4-1
  • H
Integer Overflow or Wraparound

<2.34.4-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.34.4-1
  • H
Use After Free

<2.34.4-1
  • M
Use After Free

<2.32.4-1
  • M
Memory Leak

<2.34.0-1
  • M
Use After Free

<2.34.0-1
  • M
Origin Validation Error

<2.40.1-1
  • H
Open Redirect

<2.34.1-1
  • H
Use After Free

<2.32.4-1
  • M
Cross-site Scripting (XSS)

<2.34.3-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.34.1-1
  • M
CVE-2021-30887

<2.34.3-1
  • H
Buffer Overflow

<2.34.1-1
  • M
Out-of-bounds Read

<2.32.4-1
  • M
CVE-2021-30884

<2.34.1-1
  • M
CVE-2021-30823

<2.34.1-1
  • H
Out-of-bounds Write

<2.34.0-1
  • H
Out-of-bounds Write

<2.32.4-1
  • H
Out-of-bounds Write

<2.32.4-1
  • H
Out-of-bounds Write

<2.34.0-1
  • M
CVE-2021-42762

<2.34.1-1
  • H
Use After Free

<2.32.4-1
  • H
Out-of-bounds Write

<2.30.1-1
  • H
Use After Free

<2.30.1-1
  • H
Out-of-bounds Write

<2.32.3-1
  • M
Cross-site Scripting (XSS)

<2.32.3-1
  • H
Use After Free

<2.32.3-1
  • M
CVE-2021-30682

<2.32.0-2
  • M
Improper Authentication

<2.32.3-1
  • H
Out-of-bounds Write

<2.26.1-2
  • H
Integer Overflow or Wraparound

<2.32.3-1
  • H
Out-of-bounds Write

<2.32.3-1
  • M
Exposure of Resource to Wrong Sphere

<2.30.1-1
  • M
Cross-site Scripting (XSS)

<2.30.1-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.32.2-1
  • M
Cross-site Scripting (XSS)

<2.32.3-1
  • H
Buffer Overflow

<2.26.1-2
  • H
Out-of-bounds Write

<2.32.3-1
  • H
Out-of-Bounds

<2.32.3-1
  • H
Use After Free

<2.28.0-2
  • H
CVE-2021-30797

<2.32.3-1
  • M
Cross-site Scripting (XSS)

<2.30.1-1
  • H
Use After Free

<2.30.6-1
  • H
Use After Free

<2.32.3-1
  • H
Use After Free

<2.32.3-1
  • H
Out-of-Bounds

<2.32.0-2
  • C
CVE-2021-1871

<2.32.0-2
  • H
Use After Free

<2.32.0-2
  • C
CVE-2021-1870

<2.30.6-1
  • M
CVE-2021-1799

<2.30.6-1
  • M
CVE-2021-1801

<2.30.6-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.30.6-1
  • M
CVE-2021-1765

<2.30.6-1
  • H
Use After Free

<2.30.1-1
  • H
Use After Free

<2.30.6-1
  • L
CVE-2020-29623

<2.30.6-1
  • H
Use After Free

<2.30.5-1
  • H
Use After Free

<2.30.3-1
  • H
Out-of-bounds Write

<2.30.3-1
  • H
Use After Free

<2.30.1-1
  • H
Cross-site Scripting (XSS)

<2.28.3-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.30.1-1
  • H
Use After Free

<2.30.3-1
  • C
Use After Free

<2.28.4-1
  • M
Cross-site Scripting (XSS)

<2.28.4-1
  • H
Arbitrary Command Injection

<2.28.4-1
  • H
Use After Free

<2.28.4-1
  • M
Out-of-bounds Read

<2.28.4-1
  • M
CVE-2020-9915

<2.28.4-1
  • H
Cross-site Scripting (XSS)

<2.28.3-1
  • H
Out-of-Bounds

<2.28.3-1
  • C
Improper Input Validation

<2.28.3-1
  • C
CVE-2020-9850

<2.28.3-1
  • H
Out-of-Bounds

<2.28.3-1
  • H
Out-of-Bounds

<2.28.3-1
  • H
CVE-2020-9802

<2.28.3-1
  • H
Cross-site Scripting (XSS)

<2.28.3-1
  • M
Always-Incorrect Control Flow Implementation

<2.28.0-2
  • H
Resource Exhaustion

<2.28.2-1
  • L
Race Condition

<2.28.0-2
  • H
Out-of-Bounds

<2.28.0-2
  • H
Out-of-Bounds

<2.28.0-2
  • M
Cross-site Scripting (XSS)

<2.28.0-2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.28.0-2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.28.0-2
  • H
Use After Free

<2.28.1-1
  • C
Improper Input Validation

<2.28.0-2
  • M
Cross-site Scripting (XSS)

<2.26.4-1
  • H
Out-of-Bounds

<2.26.4-1
  • H
Out-of-Bounds

<2.26.4-1
  • M
Out-of-Bounds

<2.26.4-1
  • H
Origin Validation Error

<2.26.4-1
  • H
Use After Free

<2.26.3-1
  • H
Out-of-bounds Write

<2.26.3-1
  • H
Out-of-bounds Write

<2.26.3-1
  • H
Out-of-Bounds

<2.26.0-1
  • H
Out-of-Bounds

<2.26.1-1
  • H
Out-of-bounds Write

<2.26.0-1
  • H
Out-of-Bounds

<2.24.4-1
  • M
Cross-site Scripting (XSS)

<2.26.0-1
  • H
Out-of-bounds Write

<2.26.1-1
  • H
Out-of-Bounds

<2.26.1-1
  • H
Out-of-Bounds

<2.26.0-1
  • H
Out-of-Bounds

<2.26.2-1
  • H
Out-of-Bounds

<2.24.4-1
  • H
Out-of-Bounds

<2.26.1-1
  • H
Out-of-Bounds

<2.26.1-1
  • H
Out-of-Bounds

<2.24.4-1
  • H
Out-of-bounds Write

<2.26.2-1
  • H
Out-of-Bounds

<2.26.1-1
  • H
Out-of-Bounds

<2.26.0-1
  • H
Out-of-Bounds

<2.26.0-1
  • H
Out-of-Bounds

<2.26.0-1
  • M
Cross-site Scripting (XSS)

<2.26.1-1
  • M
Cross-site Scripting (XSS)

<2.26.0-1
  • M
Cross-site Scripting (XSS)

<2.24.4-1
  • H
Use After Free

<2.24.4-1
  • H
Use After Free

<2.24.2-1
  • M
Improper Restriction of Rendered UI Layers or Frames

<2.26.0-1
  • M
Cross-site Scripting (XSS)

<2.24.4-1
  • M
Information Exposure

<2.24.0-1
  • H
Out-of-Bounds

<2.24.4-1
  • H
Out-of-Bounds

<2.26.0-1
  • H
Out-of-Bounds

<2.24.4-1
  • M
Information Exposure

<2.26.0-1
  • H
Out-of-Bounds

<2.24.3-1
  • M
Cross-site Scripting (XSS)

<2.24.3-1
  • H
Out-of-bounds Write

<2.24.4-1
  • H
Out-of-bounds Write

<2.24.2-1
  • H
Out-of-Bounds

<2.24.3-1
  • H
Out-of-bounds Write

<2.24.3-1
  • H
Out-of-bounds Write

<2.24.4-1
  • H
Out-of-bounds Write

<2.24.4-1
  • H
Out-of-bounds Write

<2.24.4-1
  • H
Use After Free

<2.24.3-1
  • H
Out-of-bounds Write

<2.24.3-1
  • H
Out-of-bounds Write

<2.24.2-1
  • H
Use After Free

<2.24.2-1
  • H
Out-of-bounds Write

<2.24.2-1
  • H
Out-of-bounds Write

<2.24.2-1
  • H
Out-of-bounds Write

<2.24.3-1
  • H
Use After Free

<2.24.4-1
  • M
Cross-site Scripting (XSS)

<2.24.4-1
  • M
Cross-site Scripting (XSS)

<2.24.4-1
  • H
Out-of-bounds Write

<2.24.4-1
  • H
Out-of-Bounds

<2.24.4-1
  • H
Out-of-bounds Write

<2.24.3-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Integer Overflow or Wraparound

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Use After Free

<2.24.1-1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • M
Use After Free

<2.24.1-1
  • H
Use After Free

<2.24.1-1
  • H
Improper Validation of Array Index

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Use After Free

<2.24.1-1
  • M
Out-of-bounds Read

<2.24.2-1
  • H
Out-of-bounds Write

<2.24.2-1
  • M
Out-of-bounds Read

<2.24.2-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • M
Improper Input Validation

<2.24.1-1
  • M
Cross-site Scripting (XSS)

<2.24.1-1
  • M
Information Exposure

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2.24.1-1
  • H
Use After Free

<2.24.1-1
  • H
Use After Free

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • H
Improper Input Validation

<2.24.1-1
  • H
Out-of-bounds Write

<2.24.1-1
  • M
Improper Data Handling

<2.24.1-1
  • L
Out-of-Bounds

<2.24.1-1
  • L
Out-of-bounds Write

<2.22.6-1
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

<2.22.6-1
  • L
Out-of-bounds Write

<2.22.4-1
  • L
Out-of-bounds Write

<2.22.5-1
  • L
Out-of-bounds Write

<2.22.5-1
  • L
Out-of-bounds Write

<2.22.5-1
  • L
Out-of-bounds Write

<2.22.4-1
  • L
Cross-site Scripting (XSS)

<2.22.5-1
  • L
Out-of-bounds Write

<2.22.0-2
  • H
CVE-2019-6251

<2.24.1-1
  • L
Out-of-Bounds

<2.22.3-1
  • L
Out-of-Bounds

<2.22.5-1
  • L
Out-of-Bounds

<2.22.0-2
  • L
Out-of-Bounds

<2.22.3-1
  • L
Out-of-Bounds

<2.22.3-1
  • L
Out-of-Bounds

<2.22.3-1
  • L
Out-of-Bounds

<2.22.1-1
  • L
Out-of-Bounds

<2.22.1-1
  • L
Out-of-Bounds

<2.22.4-1
  • L
Out-of-Bounds

<2.22.3-1
  • L
Out-of-Bounds

<2.22.1-1
  • L
Out-of-Bounds

<2.22.1-1
  • L
Out-of-Bounds

<2.22.0-2
  • L
Out-of-Bounds

<2.22.1-1
  • L
Cross-site Scripting (XSS)

<2.22.3-1
  • L
Out-of-Bounds

<2.22.1-1
  • L
CVE-2018-4361

<2.22.0-2
  • L
Use After Free

<2.22.0-2
  • L
Out-of-Bounds

<2.22.0-2
  • L
Use After Free

<2.22.0-2
  • L
Out-of-Bounds

<2.22.0-2
  • L
Improper Input Validation

<2.22.0-2
  • L
Use After Free

<2.22.0-2
  • L
Cross-site Scripting (XSS)

<2.22.0-2
  • L
Use After Free

<2.22.0-2
  • L
Out-of-Bounds

<2.22.0-2
  • L
Origin Validation Error

<2.22.0-2
  • L
Improper Validation of Array Index

<2.22.0-2
  • L
Out-of-Bounds

<2.22.0-2
  • L
Improper Input Validation

<2.22.0-2
  • L
Out-of-Bounds

<2.22.0-2
  • L
CVE-2018-4212

<2.22.0-2
  • L
Use After Free

<2.22.0-2
  • L
Improper Input Validation

<2.22.0-2
  • L
Information Exposure

<2.22.0-2
  • L
Out-of-Bounds

<2.22.0-2
  • L
Out-of-Bounds

<2.22.0-2
  • L
Use After Free

<2.22.0-2
  • L
Improper Input Validation

<2.22.0-2
  • L
Use After Free

<2.22.0-2
  • L
Out-of-Bounds

<2.20.4-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
Incorrect Type Conversion or Cast

<2.20.4-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
Out-of-Bounds

<2.20.4-1
  • L
CVE-2018-4278

<2.20.4-1
  • L
Race Condition

<2.20.4-1
  • L
Out-of-Bounds

<2.20.2-1
  • L
Out-of-bounds Write

<2.20.4-1
  • L
Out-of-bounds Write

<2.20.3-1
  • L
Use After Free

<2.20.2-1
  • L
Use After Free

<2.20.3-1
  • L
Incorrect Type Conversion or Cast

<2.20.4-1
  • L
Out-of-Bounds

<2.20.3-1
  • L
Use After Free

<2.20.2-1
  • L
Out-of-bounds Read

<2.20.3-1
  • L
Race Condition

<2.20.1-1
  • L
Out-of-Bounds

<2.20.1-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
CVE-2018-4232

<2.20.3-1
  • L
Insufficiently Protected Credentials

<2.20.3-1
  • L
Out-of-Bounds

<2.20.3-1
  • L
Out-of-Bounds

<2.20.1-1
  • L
Improper Certificate Validation

<2.20.2-1
  • L
CVE-2018-11713

<2.20.0-2
  • L
CVE-2018-11646

<2.20.3-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.18.6-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.18.6-1
  • L
Information Exposure

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Arbitrary Command Injection

<2.18.6-1
  • L
Out-of-Bounds

<2.18.6-1
  • L
Out-of-Bounds

<2.18.6-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Reachable Assertion

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.18.6-1
  • L
Open Redirect

<2.18.6-1
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.20.0-2
  • L
Out-of-Bounds

<2.18.6-1
  • L
Cross-site Scripting (XSS)

<2.20.0-2
  • L
Out-of-Bounds

<2.18.6-1
  • L
Out-of-Bounds

<2.18.4-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.4-1
  • L
Out-of-Bounds

<2.18.4-1
  • L
Out-of-Bounds

<2.18.4-1
  • L
Out-of-Bounds

<2.22.0-2
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.3-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.3-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.3-1
  • L
Improper Input Validation

<2.16.3-2
  • L
Integer Overflow or Wraparound

<2.16.3-2
  • L
Information Exposure

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Cross-site Scripting (XSS)

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Cross-site Scripting (XSS)

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Information Exposure

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Out-of-Bounds

<2.18.1-1
  • L
Information Exposure

<2.16.3-2
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
Improper Input Validation

<2.16.3-2
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.6-1
  • L
Improper Input Validation

<2.16.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.4-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.6-1
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.4-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-1
  • L
Cross-site Scripting (XSS)

<2.16.3-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
CVE-2017-2376

<2.16.3-2
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.14.6-1
  • L
Improper Input Validation

<2.14.6-1
  • L
Out-of-Bounds

<2.14.6-1
  • L
CVE-2017-2415

<2.14.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Information Exposure

<2.16.3-2
  • L
Out-of-Bounds

<2.14.6-1
  • L
CVE-2017-2386

<2.16.3-2
  • L
Out-of-Bounds

<2.16.3-2
  • L
Cross-site Scripting (XSS)

<2.14.6-1
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Cross-site Scripting (XSS)

<2.16.3-2
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.14.6-1
  • L
CVE-2017-2419

<2.14.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.14.6-1
  • L
Out-of-Bounds

<2.14.6-1
  • L
Use After Free

<2.14.6-1
  • L
Out-of-Bounds

<2.16.3-2
  • L
CVE-2017-2446

<2.14.6-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Information Exposure

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.4-1
  • L
Information Exposure

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.4-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Information Exposure

<2.14.6-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Information Exposure

<2.14.4-1
  • L
Out-of-Bounds

<2.14.4-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.4-1
  • L
Out-of-Bounds

<2.14.4-1
  • L
Information Exposure

<2.14.3-1
  • L
Information Exposure

<2.14.4-1
  • L
Out-of-Bounds

<2.14.4-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Information Exposure

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Improper Input Validation

<2.14.4-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Out-of-Bounds

<2.14.4-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Information Exposure

<2.14.3-1
  • L
Out-of-Bounds

<2.14.3-1
  • L
Information Exposure

<2.14.4-1
  • L
Improper Access Control

<2.12.4-1
  • L
Improper Input Validation

<2.12.4-1
  • L
Out-of-Bounds

<2.12.4-1
  • L
Out-of-Bounds

<2.12.4-1
  • L
Out-of-Bounds

<2.10.5-1
  • L
Out-of-Bounds

<2.10.5-1