microsoft.chakracore vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the microsoft.chakracore package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.1)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Out-of-bounds Write

[,1.11.10)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Denial of Service (DoS)

[,1.2.1)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Out-of-Bounds

[,1.3.0)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Out-of-Bounds

[,1.4.4)
  • M
Information Exposure

[,1.4.3)
  • H
Out-of-Bounds

[,1.4.4)
  • C
Out-of-Bounds

[,1.4.4)
  • M
Information Exposure

[,1.6.1)
  • H
Out-of-bounds Write

[,1.10.1)
  • M
Information Exposure

[,1.11.6)
  • M
Out-of-bounds Write

[,1.11.23)
  • M
Out-of-bounds Write

[,1.11.23)
  • H
Out-of-bounds Write

[,1.11.17)
  • H
Out-of-bounds Write

[,1.11.17)
  • M
Memory Corruption

[,1.11.24)
  • M
Remote Code Execution (RCE)

[,1.11.22)
  • M
Remote Code Execution (RCE)

[,1.11.22)
  • M
Remote Code Execution (RCE)

[,1.11.22)
  • M
Remote Code Execution (RCE)

[,1.11.22)
  • H
Remote Code Execution (RCE)

[,1.11.21)
  • C
Remote Code Execution (RCE)

[,1.11.21)
  • M
Remote Code Execution (RCE)

[,1.11.19)
  • M
Remote Code Execution (RCE)

[,1.11.19)
  • M
Remote Code Execution (RCE)

[,1.11.18)
  • M
Remote Code Execution (RCE)

[,1.11.18)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Information Exposure

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.16)
  • M
Remote Code Execution (RCE)

[,1.11.16)
  • M
Remote Code Execution (RCE)

[,1.11.16)
  • M
Remote Code Execution (RCE)

[,1.11.16)
  • M
Remote Code Execution (RCE)

[,1.11.16)
  • M
Arbitrary Code Execution

[,1.7.6)
  • H
Arbitrary Code Execution

[,1.11.15)
  • H
Arbitrary Code Execution

[,1.11.15)
  • H
Information Exposure

[,1.8.4)
  • M
Arbitrary Code Execution

[,1.8.2)
  • M
Arbitrary Code Execution

[,1.7.6)
  • M
Arbitrary Code Execution

[,1.7.6)
  • H
Arbitrary Code Execution

[,1.11.15)
  • M
Remote Code Execution (RCE)

[,1.11.14)
  • M
Remote Code Execution (RCE)

[,1.11.13)
  • M
Remote Code Execution (RCE)

[,1.11.12)
  • M
Remote Code Execution (RCE)

[,1.11.11)
  • M
Remote Code Execution (RCE)

[,1.11.10)
  • H
Remote Code Execution (RCE)

[,1.11.9)
  • H
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Information Exposure

[,1.11.10)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Information Exposure

[,1.11.10)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Memory Corruption

[,1.11.9)
  • M
Memory Corruption

[,1.11.9)
  • H
Arbitrary Code Execution

[,1.8.4)
  • C
Remote Code Execution (RCE)

[1.2.0,1.4.2)
  • H
Remote Code Execution (RCE)

[1.4.1,1.4.4)
  • C
Remote Code Execution (RCE)

[1.2.0,1.4.4)
  • H
Remote Code Execution (RCE)

[1.2.0,1.11.4)
  • M
Information Exposure

[1.2.0,1.4.2)
  • H
Remote Code Execution (RCE)

[1.2.0,1.4.4)
  • H
Remote Code Execution (RCE)

[1.2.0,1.4.2)
  • H
Remote Code Execution (RCE)

[1.4.0,1.5.2)
  • H
Remote Code Execution (RCE)

[1.2.0,1.4.3)
  • H
Remote Code Execution (RCE)

[1.2.0,1.5.2)
  • H
Remote Code Execution (RCE)

[1.2.0,1.5.2)
  • M
Information Exposure

[1.2.0,1.11.1)
  • H
Privilege Escalation

[1.2.0,1.7.5)
  • H
Remote Code Execution (RCE)

[1.2.0.0,1.4.4)
  • H
Remote Code Execution (RCE)

[1.2.0,1.4.4)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.11.4)
  • H
Remote Code Execution (RCE)

[,1.11.4)
  • L
Information Exposure

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.11.5)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • M
Information Exposure

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.8.5)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.8.5)
  • H
Remote Code Execution (RCE)

[,1.8.5)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • M
Information Exposure

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • C
Remote Code Execution (RCE)

[,1.7.2)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • M
Information Exposure

[,1.11.1)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remode Code Execution (RCE)

[,1.11.8)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • M
Information Exposure

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • M
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.11.5)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • C
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.11.4)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • L
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Privilege Escalation

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.4)
  • H
Remote Code Execution (RCE)

[,1.11.5)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • C
Remote Code Execution (RCE)

[,1.7.1)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • M
Information Exposure

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.8.0)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.5)