webkitgtk4-plugin-process-gtk2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the webkitgtk4-plugin-process-gtk2 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Use After Free

*
  • M
CVE-2023-42843

*
  • M
CVE-2023-42956

*
  • M
Out-of-Bounds

*
  • M
CVE-2023-32359

*
  • M
Improper Enforcement of Behavioral Workflow

*
  • H
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Restriction of Rendered UI Layers or Frames

*
  • M
CVE-2024-23280

*
  • M
CVE-2024-23263

*
  • M
CVE-2024-23252

*
  • M
CVE-2024-23254

*
  • M
CVE-2024-23284

*
  • H
CVE-2023-42833

*
  • H
CVE-2024-23213

*
  • H
CVE-2024-23226

*
  • H
Use After Free

*
  • M
Resource Exhaustion

*
  • M
CVE-2024-23206

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • H
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • M
CVE-2023-40451

*
  • M
CVE-2023-41074

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
CVE-2023-35074

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
Static Code Injection

*
  • M
CVE-2023-32370

*
  • M
Use After Free

*
  • M
CVE-2022-32816

*
  • M
Out-of-bounds Write

*
  • M
Overly Permissive Cross-domain Whitelist

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • H
Overly Permissive Cross-domain Whitelist

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • M
Information Exposure

*
  • H
Out-of-Bounds

*
  • H
Arbitrary Code Injection

*
  • H
Arbitrary Code Injection

*
  • H
Arbitrary Code Injection

*
  • H
Arbitrary Code Injection

*
  • H
Use After Free

*
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • H
Use After Free

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • M
CVE-2022-46692

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
CVE-2022-42852

*
  • M
Use After Free

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
CVE-2022-42824

*
  • M
Improper Restriction of Rendered UI Layers or Frames

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Write

*
  • M
Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Improper Use of Validation Framework

*
  • M
Improper Use of Validation Framework

*
  • M
Improper Use of Validation Framework

*
  • M
Use After Free

*
  • M
CVE-2022-22637

*
  • M
Use After Free

*
  • M
Buffer Overflow

*
  • M
Improper Restriction of Rendered UI Layers or Frames

*
  • M
Use After Free

*
  • M
Improper Use of Validation Framework

*
  • M
Origin Validation Error

*
  • M
Use After Free

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Buffer Overflow

*
  • M
Memory Leak

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
Open Redirect

*
  • M
CVE-2021-30887

*
  • L
Out-of-bounds Read

*
  • M
CVE-2021-30823

*
  • M
Cross-site Scripting (XSS)

*
  • M
Buffer Overflow

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Input Validation

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Directory Traversal

<0:2.20.5-1.el7
  • M
Directory Traversal

<0:2.20.5-1.el7
  • M
Directory Traversal

<0:2.20.5-1.el7
  • M
Directory Traversal

<0:2.20.5-1.el7
  • M
Directory Traversal

<0:2.20.5-1.el7
  • M
Directory Traversal

<0:2.20.5-1.el7
  • M
Directory Traversal

<0:2.20.5-1.el7
  • M
Directory Traversal

<0:2.20.5-1.el7
  • M
Directory Traversal

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Stack-based Buffer Overflow

<0:2.20.5-1.el7
  • M
Stack-based Buffer Overflow

<0:2.20.5-1.el7
  • M
Stack-based Buffer Overflow

<0:2.20.5-1.el7
  • M
Stack-based Buffer Overflow

<0:2.20.5-1.el7
  • M
Stack-based Buffer Overflow

<0:2.20.5-1.el7
  • M
Stack-based Buffer Overflow

<0:2.20.5-1.el7
  • M
Stack-based Buffer Overflow

<0:2.20.5-1.el7
  • M
Stack-based Buffer Overflow

<0:2.20.5-1.el7
  • M
Stack-based Buffer Overflow

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
NULL Pointer Dereference

<0:2.20.5-1.el7
  • M
NULL Pointer Dereference

<0:2.20.5-1.el7
  • M
NULL Pointer Dereference

<0:2.20.5-1.el7
  • M
NULL Pointer Dereference

<0:2.20.5-1.el7
  • M
NULL Pointer Dereference

<0:2.20.5-1.el7
  • M
NULL Pointer Dereference

<0:2.20.5-1.el7
  • M
NULL Pointer Dereference

<0:2.20.5-1.el7
  • M
NULL Pointer Dereference

<0:2.20.5-1.el7
  • M
NULL Pointer Dereference

<0:2.20.5-1.el7
  • M
Improper Enforcement of Behavioral Workflow

*
  • M
Out-of-bounds Write

*
  • M
Arbitrary Command Injection

*
  • M
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
Improper Enforcement of Behavioral Workflow

*
  • M
Use After Free

*
  • M
Improper Enforcement of Behavioral Workflow

*
  • M
Use After Free

*
  • M
Improper Access Control

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Improper Enforcement of Behavioral Workflow

*
  • M
Improper Input Validation

*
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Information Exposure

<0:2.22.7-2.el7
  • M
Information Exposure

<0:2.22.7-2.el7
  • M
Information Exposure

<0:2.22.7-2.el7
  • M
Information Exposure

<0:2.22.7-2.el7
  • M
Information Exposure

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Arbitrary Code Injection

<0:2.22.7-2.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-Bounds

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Information Exposure

<0:2.20.5-1.el7
  • M
Information Exposure

<0:2.20.5-1.el7
  • M
Information Exposure

<0:2.20.5-1.el7
  • M
Information Exposure

<0:2.20.5-1.el7
  • M
Information Exposure

<0:2.20.5-1.el7
  • M
Information Exposure

<0:2.20.5-1.el7
  • M
Information Exposure

<0:2.20.5-1.el7
  • M
Information Exposure

<0:2.20.5-1.el7
  • M
Information Exposure

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Out-of-bounds Read

<0:2.20.5-1.el7
  • M
Improper Certificate Validation

<0:2.20.5-1.el7
  • M
Improper Certificate Validation

<0:2.20.5-1.el7
  • M
Improper Certificate Validation

<0:2.20.5-1.el7
  • M
Improper Certificate Validation

<0:2.20.5-1.el7
  • M
Improper Certificate Validation

<0:2.20.5-1.el7
  • M
Improper Certificate Validation

<0:2.20.5-1.el7
  • M
Improper Certificate Validation

<0:2.20.5-1.el7
  • M
Improper Certificate Validation

<0:2.20.5-1.el7
  • M
Improper Certificate Validation

<0:2.20.5-1.el7
  • M
Out-of-Bounds

*
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Buffer Overflow

<0:2.20.5-1.el7
  • M
Out-of-Bounds

*
  • M
Uncontrolled Recursion

<0:2.20.5-1.el7
  • M
Uncontrolled Recursion

<0:2.20.5-1.el7
  • M
Uncontrolled Recursion

<0:2.20.5-1.el7
  • M
Uncontrolled Recursion

<0:2.20.5-1.el7
  • M
Uncontrolled Recursion

<0:2.20.5-1.el7
  • M
Uncontrolled Recursion

<0:2.20.5-1.el7
  • M
Uncontrolled Recursion

<0:2.20.5-1.el7
  • M
Uncontrolled Recursion

<0:2.20.5-1.el7
  • M
Uncontrolled Recursion

<0:2.20.5-1.el7
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Information Exposure

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Use After Free

*
  • L
Incomplete Cleanup

*
  • M
Use After Free

*
  • M
Use After Free

*