webkit2gtk3-jsc-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the webkit2gtk3-jsc-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-bounds Write

*
  • H
Improper Resource Shutdown or Release

*
  • M
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Use After Free

<0:2.46.1-2.el9_4
  • H
Access of Memory Location After End of Buffer

<0:2.46.1-2.el9_4
  • H
Cross-site Scripting (XSS)

<0:2.46.3-2.el9_5
  • M
Improperly Implemented Security Check for Standard

<0:2.46.3-1.el9_4
  • M
Access of Memory Location After End of Buffer

<0:2.46.3-1.el9_4
  • H
Access of Memory Location After End of Buffer

<0:2.46.3-1.el9_2
  • H
Access of Memory Location After End of Buffer

<0:2.46.3-1.el9_2
  • H
Access of Memory Location After End of Buffer

<0:2.46.3-1.el9_2
  • H
Access of Memory Location After End of Buffer

<0:2.46.3-1.el9_2
  • H
Access of Memory Location After End of Buffer

<0:2.46.3-1.el9_2
  • H
Access of Memory Location After End of Buffer

<0:2.46.3-1.el9_2
  • H
Access of Memory Location After End of Buffer

<0:2.46.3-1.el9_0
  • H
Access of Memory Location After End of Buffer

<0:2.46.3-1.el9_0
  • H
Access of Memory Location After End of Buffer

<0:2.46.3-1.el9_5
  • H
Improperly Implemented Security Check for Standard

<0:2.46.3-1.el9_5
  • H
Access of Memory Location After End of Buffer

<0:2.46.1-2.el9_4
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.3
  • H
Use After Free

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_2
  • H
Use After Free

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_2
  • H
Use After Free

<0:2.46.1-1.el9_2
  • H
Out-of-Bounds

<0:2.46.1-1.el9_2
  • H
Out-of-Bounds

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Write

<0:2.46.1-1.el9_2
  • H
Out-of-Bounds

<0:2.46.1-1.el9_2
  • H
Static Code Injection

<0:2.46.1-1.el9_2
  • H
Use After Free

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_2
  • H
Use After Free

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_2
  • H
Use After Free

<0:2.46.1-1.el9_2
  • H
Out-of-Bounds

<0:2.46.1-1.el9_2
  • H
Out-of-Bounds

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Write

<0:2.46.1-1.el9_2
  • H
Out-of-Bounds

<0:2.46.1-1.el9_2
  • H
Static Code Injection

<0:2.46.1-1.el9_2
  • H
Use After Free

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_2
  • H
Use After Free

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_2
  • H
Use After Free

<0:2.46.1-1.el9_2
  • H
Out-of-Bounds

<0:2.46.1-1.el9_2
  • H
Out-of-Bounds

<0:2.46.1-1.el9_2
  • H
Out-of-bounds Write

<0:2.46.1-1.el9_2
  • H
Out-of-Bounds

<0:2.46.1-1.el9_2
  • H
Static Code Injection

<0:2.46.1-1.el9_2
  • H
Use After Free

<0:2.46.1-1.el9_0
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_0
  • H
Use After Free

<0:2.46.1-1.el9_0
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_0
  • H
Out-of-bounds Read

<0:2.46.1-1.el9_0
  • H
Use After Free

<0:2.46.1-1.el9_0
  • H
Out-of-Bounds

<0:2.46.1-1.el9_0
  • H
Out-of-Bounds

<0:2.46.1-1.el9_0
  • H
Out-of-Bounds

<0:2.46.1-1.el9_0
  • H
Out-of-Bounds

<0:2.46.1-1.el9_0
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.46.1-1.el9_0
  • H
Out-of-bounds Write

<0:2.46.1-1.el9_0
  • H
Out-of-Bounds

<0:2.46.1-1.el9_0
  • H
Static Code Injection

<0:2.46.1-1.el9_0
  • H
Improper Input Validation

<0:2.46.1-1.el9_0
  • H
Improper Authorization

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.46.3-1.el9_2
  • H
CVE-2024-23252

<0:2.38.5-1.el9_2.3
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.3
  • H
CVE-2023-41074

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
CVE-2023-35074

<0:2.38.5-1.el9_2.3
  • H
Use After Free

<0:2.38.5-1.el9_2.3
  • H
Improper Input Validation

<0:2.46.1-1.el9_2
  • H
Improper Authorization

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.46.3-1.el9_2
  • H
CVE-2024-23252

<0:2.38.5-1.el9_2.3
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.3
  • H
CVE-2023-41074

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
CVE-2023-35074

<0:2.38.5-1.el9_2.3
  • H
Use After Free

<0:2.38.5-1.el9_2.3
  • H
Improper Input Validation

<0:2.46.1-1.el9_2
  • H
Improper Authorization

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.46.3-1.el9_2
  • H
CVE-2024-23252

<0:2.38.5-1.el9_2.3
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.3
  • H
CVE-2023-41074

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
CVE-2023-35074

<0:2.38.5-1.el9_2.3
  • H
Use After Free

<0:2.38.5-1.el9_2.3
  • H
Improper Input Validation

<0:2.46.1-1.el9_2
  • H
Improper Authorization

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
CVE-2024-23252

<0:2.38.5-1.el9_2.3
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.3
  • H
CVE-2023-41074

<0:2.38.5-1.el9_2.3
  • H
CVE-2023-35074

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.46.3-1.el9_2
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.46.3-1.el9_2
  • H
Out-of-Bounds

<0:2.46.3-1.el9_2
  • H
Use After Free

<0:2.46.1-2.el9_4
  • H
Origin Validation Error

<0:2.46.1-2.el9_4
  • H
CVE-2024-40866

<0:2.46.1-2.el9_4
  • H
Out-of-bounds Read

<0:2.46.1-2.el9_4
  • H
Use After Free

<0:2.46.1-2.el9_4
  • H
Out-of-bounds Read

<0:2.46.1-2.el9_4
  • H
Out-of-bounds Read

<0:2.46.1-2.el9_4
  • H
Use After Free

<0:2.46.1-2.el9_4
  • H
Out-of-Bounds

<0:2.46.1-2.el9_4
  • H
Information Exposure

<0:2.46.1-2.el9_4
  • H
Out-of-Bounds

<0:2.46.1-2.el9_4
  • H
Overly Permissive Cross-domain Whitelist

<0:2.46.1-2.el9_4
  • H
Origin Validation Error

<0:2.46.1-2.el9_4
  • H
CVE-2024-40866

<0:2.46.1-2.el9_4
  • H
Out-of-Bounds

<0:2.46.1-2.el9_4
  • H
Information Exposure

<0:2.46.1-2.el9_4
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.46.1-2.el9_4
  • H
Overly Permissive Cross-domain Whitelist

<0:2.46.1-2.el9_4
  • H
CVE-2024-23213

<0:2.42.5-1.el9
  • H
CVE-2024-23206

<0:2.42.5-1.el9
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
Use After Free

<0:2.42.5-1.el9
  • H
Use After Free

<0:2.42.5-1.el9
  • H
CVE-2023-32359

<0:2.42.5-1.el9
  • H
Resource Exhaustion

<0:2.42.5-1.el9
  • H
Out-of-bounds Write

<0:2.42.5-1.el9
  • H
CVE-2023-42833

<0:2.40.5-1.el9
  • H
CVE-2023-40451

<0:2.40.5-1.el9
  • H
Static Code Injection

<0:2.40.5-1.el9
  • H
Use After Free

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Information Exposure

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Overly Permissive Cross-domain Whitelist

<0:2.40.5-1.el9
  • H
Information Exposure

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
CVE-2023-32370

<0:2.40.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9_2.3
  • H
Information Exposure

<0:2.40.5-1.el9
  • H
Overly Permissive Cross-domain Whitelist

<0:2.40.5-1.el9
  • H
Improper Input Validation

<0:2.40.5-1.el9
  • H
Improper Input Validation

<0:2.40.5-1.el9
  • H
Improper Enforcement of Behavioral Workflow

<0:2.40.5-1.el9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.40.5-1.el9
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.3
  • H
Use After Free

<0:2.38.5-1.el9_2.2
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9_2.3
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Use After Free

<0:2.38.5-1.el9_2.1
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Information Exposure

<0:2.38.5-1.el9
  • H
CVE-2022-46692

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
CVE-2022-42852

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
CVE-2022-42824

<0:2.38.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.36.7-1.el9_1.1
  • H
Use After Free

<0:2.36.7-1.el9_1.3
  • H
Out-of-Bounds

<0:2.36.7-1.el9_1.2
  • M
Buffer Overflow

<0:2.36.7-1.el9
  • M
CVE-2022-32816

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Information Exposure

<0:2.36.7-1.el9
  • M
Buffer Overflow

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Improper Input Validation

<0:2.36.7-1.el9_0
  • H
Use After Free

<0:2.46.1-2.el9_4
  • H
Out-of-bounds Read

<0:2.46.1-2.el9_4
  • H
Out-of-bounds Read

<0:2.46.1-2.el9_4
  • H
Use After Free

<0:2.46.1-2.el9_4
  • H
Out-of-bounds Read

<0:2.46.1-2.el9_4
  • H
Improper Authorization

<0:2.38.5-1.el9_2.3
  • H
Authentication Bypass

<0:2.44.3-2.el9
  • H
CVE-2023-42956

<0:2.44.3-2.el9
  • H
Use After Free

<0:2.44.3-2.el9
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
CVE-2023-32359

<0:2.42.5-1.el9
  • H
Improper Input Validation

<0:2.40.5-1.el9
  • H
Improper Input Validation

<0:2.40.5-1.el9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.40.5-1.el9
  • H
Improper Enforcement of Behavioral Workflow

<0:2.40.5-1.el9
  • M
CVE-2024-23263

*
  • H
CVE-2024-23252

<0:2.38.5-1.el9_2.3
  • H
CVE-2024-23226

*
  • M
CVE-2024-23284

*
  • M
Arbitrary Code Injection

*
  • M
CVE-2024-23254

*
  • H
CVE-2024-23213

<0:2.42.5-1.el9
  • H
CVE-2023-42833

<0:2.40.5-1.el9
  • H
Use After Free

<0:2.42.5-1.el9
  • H
Resource Exhaustion

<0:2.42.5-1.el9
  • H
CVE-2024-23206

<0:2.42.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.46.3-1.el9_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.46.3-1.el9_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.46.3-1.el9_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9_2.3
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
Out-of-bounds Write

<0:2.40.5-1.el9_3.1
  • H
CVE-2023-40451

<0:2.40.5-1.el9
  • H
CVE-2023-41074

<0:2.38.5-1.el9_2.3
  • H
Use After Free

<0:2.40.5-1.el9
  • H
Use After Free

<0:2.42.5-1.el9
  • H
CVE-2023-35074

<0:2.38.5-1.el9_2.3
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.38.5-1.el9_2.3
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.38.5-1.el9_2.3
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.38.5-1.el9_2.3
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.38.5-1.el9_2.3
  • H
Static Code Injection

<0:2.40.5-1.el9
  • H
CVE-2023-32370

<0:2.40.5-1.el9
  • H
Use After Free

<0:2.40.5-1.el9
  • M
CVE-2022-32816

<0:2.36.7-1.el9
  • M
CVE-2022-32816

<0:2.36.7-1.el9
  • M
CVE-2022-32816

<0:2.36.7-1.el9
  • M
CVE-2022-32816

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • H
Overly Permissive Cross-domain Whitelist

<0:2.40.5-1.el9
  • H
Information Exposure

<0:2.40.5-1.el9
  • H
Improper Input Validation

<0:2.40.5-1.el9
  • H
Information Exposure

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Overly Permissive Cross-domain Whitelist

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Information Exposure

<0:2.40.5-1.el9
  • H
Out-of-Bounds

<0:2.40.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9_2.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9_2.2
  • H
Use After Free

<0:2.38.5-1.el9_2.2
  • H
Use After Free

<0:2.38.5-1.el9_2.2
  • H
Use After Free

<0:2.38.5-1.el9_2.2
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.2
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.2
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.2
  • H
Improper Input Validation

<0:2.38.5-1.el9_2.2
  • H
Use After Free

<0:2.38.5-1.el9_2.1
  • H
Use After Free

<0:2.38.5-1.el9_2.1
  • H
Use After Free

<0:2.38.5-1.el9_2.1
  • H
Use After Free

<0:2.38.5-1.el9_2.1
  • H
Use After Free

<0:2.36.7-1.el9_1.3
  • H
Use After Free

<0:2.36.7-1.el9_1.3
  • H
Use After Free

<0:2.36.7-1.el9_1.3
  • H
Use After Free

<0:2.36.7-1.el9_1.3
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Arbitrary Code Injection

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.36.7-1.el9_1.2
  • H
Out-of-Bounds

<0:2.36.7-1.el9_1.2
  • H
Out-of-Bounds

<0:2.36.7-1.el9_1.2
  • H
Out-of-Bounds

<0:2.36.7-1.el9_1.2
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Information Exposure

<0:2.38.5-1.el9
  • H
Information Exposure

<0:2.38.5-1.el9
  • H
Information Exposure

<0:2.38.5-1.el9
  • H
Information Exposure

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
CVE-2022-46692

<0:2.38.5-1.el9
  • H
CVE-2022-46692

<0:2.38.5-1.el9
  • H
CVE-2022-46692

<0:2.38.5-1.el9
  • H
CVE-2022-46692

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
CVE-2022-42852

<0:2.38.5-1.el9
  • H
CVE-2022-42852

<0:2.38.5-1.el9
  • H
CVE-2022-42852

<0:2.38.5-1.el9
  • H
CVE-2022-42852

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.36.7-1.el9_1.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.36.7-1.el9_1.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.36.7-1.el9_1.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.36.7-1.el9_1.1
  • H
CVE-2022-42824

<0:2.38.5-1.el9
  • H
CVE-2022-42824

<0:2.38.5-1.el9
  • H
CVE-2022-42824

<0:2.38.5-1.el9
  • H
CVE-2022-42824

<0:2.38.5-1.el9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.38.5-1.el9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.38.5-1.el9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.38.5-1.el9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.38.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • M
Buffer Overflow

<0:2.36.7-1.el9
  • M
Buffer Overflow

<0:2.36.7-1.el9
  • M
Buffer Overflow

<0:2.36.7-1.el9
  • M
Buffer Overflow

<0:2.36.7-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • H
Out-of-Bounds

<0:2.38.5-1.el9
  • M
Improper Input Validation

<0:2.36.7-1.el9_0
  • M
Improper Input Validation

<0:2.36.7-1.el9_0
  • M
Improper Input Validation

<0:2.36.7-1.el9_0
  • M
Improper Input Validation

<0:2.36.7-1.el9_0
  • M
Improper Input Validation

<0:2.36.7-1.el9_0
  • M
Improper Input Validation

<0:2.36.7-1.el9_0
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Information Exposure

<0:2.36.7-1.el9
  • M
Information Exposure

<0:2.36.7-1.el9
  • M
Information Exposure

<0:2.36.7-1.el9
  • M
Information Exposure

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Improper Use of Validation Framework

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Buffer Overflow

<0:2.36.7-1.el9
  • M
Buffer Overflow

<0:2.36.7-1.el9
  • M
Buffer Overflow

<0:2.36.7-1.el9
  • M
Buffer Overflow

<0:2.36.7-1.el9