microsoft.chakracore vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the microsoft.chakracore package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.1)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Arbitrary Code Execution

[,1.2.2)
  • H
Out-of-bounds Write

[,1.11.10)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Denial of Service (DoS)

[,1.2.1)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Out-of-Bounds

[,1.3.0)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Out-of-Bounds

[,1.2.1)
  • H
Out-of-Bounds

[,1.4.4)
  • M
Information Exposure

[,1.4.3)
  • H
Out-of-Bounds

[,1.4.4)
  • C
Out-of-Bounds

[,1.4.4)
  • M
Information Exposure

[,1.6.1)
  • H
Out-of-bounds Write

[,1.10.1)
  • M
Information Exposure

[,1.11.6)
  • M
Out-of-bounds Write

[,1.11.23)
  • M
Out-of-bounds Write

[,1.11.23)
  • H
Out-of-bounds Write

[,1.11.17)
  • H
Out-of-bounds Write

[,1.11.17)
  • M
Memory Corruption

[,1.11.24)
  • M
Remote Code Execution (RCE)

[,1.11.22)
  • M
Remote Code Execution (RCE)

[,1.11.22)
  • M
Remote Code Execution (RCE)

[,1.11.22)
  • M
Remote Code Execution (RCE)

[,1.11.22)
  • H
Remote Code Execution (RCE)

[,1.11.21)
  • C
Remote Code Execution (RCE)

[,1.11.21)
  • M
Remote Code Execution (RCE)

[,1.11.19)
  • M
Remote Code Execution (RCE)

[,1.11.19)
  • M
Remote Code Execution (RCE)

[,1.11.18)
  • M
Remote Code Execution (RCE)

[,1.11.18)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Information Exposure

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.17)
  • M
Remote Code Execution (RCE)

[,1.11.16)
  • M
Remote Code Execution (RCE)

[,1.11.16)
  • M
Remote Code Execution (RCE)

[,1.11.16)
  • M
Remote Code Execution (RCE)

[,1.11.16)
  • M
Remote Code Execution (RCE)

[,1.11.16)
  • M
Arbitrary Code Execution

[,1.7.6)
  • H
Arbitrary Code Execution

[,1.11.15)
  • H
Arbitrary Code Execution

[,1.11.15)
  • H
Information Exposure

[,1.8.4)
  • M
Arbitrary Code Execution

[,1.8.2)
  • M
Arbitrary Code Execution

[,1.7.6)
  • M
Arbitrary Code Execution

[,1.7.6)
  • H
Arbitrary Code Execution

[,1.11.15)
  • M
Remote Code Execution (RCE)

[,1.11.14)
  • M
Remote Code Execution (RCE)

[,1.11.13)
  • M
Remote Code Execution (RCE)

[,1.11.12)
  • M
Remote Code Execution (RCE)

[,1.11.11)
  • M
Remote Code Execution (RCE)

[,1.11.10)
  • H
Remote Code Execution (RCE)

[,1.11.9)
  • H
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Remote Code Execution (RCE)

[,1.11.9)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Information Exposure

[,1.11.10)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Information Exposure

[,1.11.10)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Arbitrary Code Execution

[,1.11.10)
  • M
Memory Corruption

[,1.11.9)
  • M
Memory Corruption

[,1.11.9)
  • H
Arbitrary Code Execution

[,1.8.4)
  • C
Remote Code Execution (RCE)

[1.2.0,1.4.2)
  • H
Remote Code Execution (RCE)

[1.4.1,1.4.4)
  • C
Remote Code Execution (RCE)

[1.2.0,1.4.4)
  • H
Remote Code Execution (RCE)

[1.2.0,1.11.4)
  • M
Information Exposure

[1.2.0,1.4.2)
  • H
Remote Code Execution (RCE)

[1.2.0,1.4.4)
  • H
Remote Code Execution (RCE)

[1.2.0,1.4.2)
  • H
Remote Code Execution (RCE)

[1.4.0,1.5.2)
  • H
Remote Code Execution (RCE)

[1.2.0,1.4.3)
  • H
Remote Code Execution (RCE)

[1.2.0,1.5.2)
  • H
Remote Code Execution (RCE)

[1.2.0,1.5.2)
  • M
Information Exposure

[1.2.0,1.11.1)
  • H
Privilege Escalation

[1.2.0,1.7.5)
  • H
Remote Code Execution (RCE)

[1.2.0.0,1.4.4)
  • H
Remote Code Execution (RCE)

[1.2.0,1.4.4)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.8.5)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.11.4)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.8.5)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • M
Information Exposure

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • M
Information Exposure

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.11.5)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.11.4)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.8.5)
  • L
Information Exposure

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • C
Remote Code Execution (RCE)

[,1.7.2)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • M
Information Exposure

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • H
Remode Code Execution (RCE)

[,1.11.8)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • H
Remote Code Execution (RCE)

[,1.11.8)
  • M
Information Exposure

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • M
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.11.5)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.8.2)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • C
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.11.4)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.7.5)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • L
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • H
Privilege Escalation

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.4)
  • H
Remote Code Execution (RCE)

[,1.11.5)
  • H
Remote Code Execution (RCE)

[,1.7.4)
  • H
Remote Code Execution (RCE)

[,1.11.2)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.11.6)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.10.2)
  • H
Remote Code Execution (RCE)

[,1.11.3)
  • H
Remote Code Execution (RCE)

[,1.11.1)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • H
Remote Code Execution (RCE)

[,1.10.1)
  • H
Remote Code Execution (RCE)

[,1.8.3)
  • C
Remote Code Execution (RCE)

[,1.7.1)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • M
Remote Code Execution (RCE)

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.8.4)
  • H
Remote Code Execution (RCE)

[,1.7.6)
  • M
Information Exposure

[,1.11.7)
  • H
Remote Code Execution (RCE)

[,1.7.3)
  • H
Remote Code Execution (RCE)

[,1.8.0)
  • H
Remote Code Execution (RCE)

[,1.7.8)
  • H
Remote Code Execution (RCE)

[,1.7.5)