gtk3-devel-docs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gtk3-devel-docs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Directory Traversal

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Information Exposure

<0:3.22.30-3.el7
  • M
Improper Certificate Validation

<0:3.22.30-3.el7
  • M
NULL Pointer Dereference

<0:3.22.30-3.el7
  • M
Stack-based Buffer Overflow

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Uncontrolled Recursion

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Improper Authorization

<0:3.22.30-5.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Arbitrary Code Injection

*
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Directory Traversal

<0:3.22.30-3.el7
  • M
Directory Traversal

<0:3.22.30-3.el7
  • M
Directory Traversal

<0:3.22.30-3.el7
  • M
Directory Traversal

<0:3.22.30-3.el7
  • M
Directory Traversal

<0:3.22.30-3.el7
  • M
Directory Traversal

<0:3.22.30-3.el7
  • M
Directory Traversal

<0:3.22.30-3.el7
  • M
Directory Traversal

<0:3.22.30-3.el7
  • M
Directory Traversal

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Stack-based Buffer Overflow

<0:3.22.30-3.el7
  • M
Stack-based Buffer Overflow

<0:3.22.30-3.el7
  • M
Stack-based Buffer Overflow

<0:3.22.30-3.el7
  • M
Stack-based Buffer Overflow

<0:3.22.30-3.el7
  • M
Stack-based Buffer Overflow

<0:3.22.30-3.el7
  • M
Stack-based Buffer Overflow

<0:3.22.30-3.el7
  • M
Stack-based Buffer Overflow

<0:3.22.30-3.el7
  • M
Stack-based Buffer Overflow

<0:3.22.30-3.el7
  • M
Stack-based Buffer Overflow

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
NULL Pointer Dereference

<0:3.22.30-3.el7
  • M
NULL Pointer Dereference

<0:3.22.30-3.el7
  • M
NULL Pointer Dereference

<0:3.22.30-3.el7
  • M
NULL Pointer Dereference

<0:3.22.30-3.el7
  • M
NULL Pointer Dereference

<0:3.22.30-3.el7
  • M
NULL Pointer Dereference

<0:3.22.30-3.el7
  • M
NULL Pointer Dereference

<0:3.22.30-3.el7
  • M
NULL Pointer Dereference

<0:3.22.30-3.el7
  • M
NULL Pointer Dereference

<0:3.22.30-3.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Heap-based Buffer Overflow

<0:3.22.10-4.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:3.14.13-16.el7
  • M
Improper Authorization

<0:3.22.30-5.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-Bounds

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Information Exposure

<0:3.22.30-3.el7
  • M
Information Exposure

<0:3.22.30-3.el7
  • M
Information Exposure

<0:3.22.30-3.el7
  • M
Information Exposure

<0:3.22.30-3.el7
  • M
Information Exposure

<0:3.22.30-3.el7
  • M
Information Exposure

<0:3.22.30-3.el7
  • M
Information Exposure

<0:3.22.30-3.el7
  • M
Information Exposure

<0:3.22.30-3.el7
  • M
Information Exposure

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Out-of-bounds Read

<0:3.22.30-3.el7
  • M
Improper Certificate Validation

<0:3.22.30-3.el7
  • M
Improper Certificate Validation

<0:3.22.30-3.el7
  • M
Improper Certificate Validation

<0:3.22.30-3.el7
  • M
Improper Certificate Validation

<0:3.22.30-3.el7
  • M
Improper Certificate Validation

<0:3.22.30-3.el7
  • M
Improper Certificate Validation

<0:3.22.30-3.el7
  • M
Improper Certificate Validation

<0:3.22.30-3.el7
  • M
Improper Certificate Validation

<0:3.22.30-3.el7
  • M
Improper Certificate Validation

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Buffer Overflow

<0:3.22.30-3.el7
  • M
Uncontrolled Recursion

<0:3.22.30-3.el7
  • M
Uncontrolled Recursion

<0:3.22.30-3.el7
  • M
Uncontrolled Recursion

<0:3.22.30-3.el7
  • M
Uncontrolled Recursion

<0:3.22.30-3.el7
  • M
Uncontrolled Recursion

<0:3.22.30-3.el7
  • M
Uncontrolled Recursion

<0:3.22.30-3.el7
  • M
Uncontrolled Recursion

<0:3.22.30-3.el7
  • M
Uncontrolled Recursion

<0:3.22.30-3.el7
  • M
Uncontrolled Recursion

<0:3.22.30-3.el7