gjs-devel

Direct Vulnerabilities

Known vulnerabilities in the gjs-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Inefficient Regular Expression Complexity

*
  • M
Unchecked Input for Loop Condition

*
  • H
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Unchecked Input for Loop Condition

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Cross-site Scripting (XSS)

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Directory Traversal

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Unchecked Input for Loop Condition

*
  • M
Incorrect Behavior Order: Early Validation

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Cross-site Scripting (XSS)

*
  • M
Directory Traversal

*
  • M
CVE-2026-23865

*
  • L
Server-Side Request Forgery (SSRF)

*
  • L
Server-Side Request Forgery (SSRF)

*
  • H
Link Following

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Directory Traversal

*
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Use of a Risky Cryptographic Primitive

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improper Verification of Source of a Communication Channel

*
  • H
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • L
Link Following

*
  • M
Buffer Over-read

*
  • L
Improper Encoding or Escaping of Output

*
  • L
Improper Input Validation

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Improper Validation of Unsafe Equivalence in Input

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Incomplete Filtering of Special Elements

*
  • L
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

*
  • L
Use After Free

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Cross-site Scripting (XSS)

*
  • M
Missing Required Cryptographic Step

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Resource Exhaustion

*
  • L
Incorrect Regular Expression

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Open Redirect

*
  • L
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*