webkit vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://webkit.org|webkit package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Allocation of Resources Without Limits or Throttling

[,2.47.4)
  • H
Arbitrary Command Injection

[,2.47.4)
  • M
Missing Authorization

[,2.47.4)
  • H
Arbitrary Code Injection

[,7619.1.24)
  • M
Improper Authentication

[,2.44.2)
  • H
Improper Input Validation

[,7617.1.4)
  • H
Arbitrary Code Execution

[0,)
  • C
Arbitrary Code Execution

[,7616.1.2)
  • H
Out-of-Bounds

[0,)
  • M
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Resource Management Errors

[0,)
  • M
Cross-site Scripting (XSS)

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Cryptographic Issues

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Remote Code Execution (RCE)

[0,)
  • H
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Improper Input Validation

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Information Exposure

[0,)
  • H
Resource Management Errors

[0,)
  • H
Remote Code Execution (RCE)

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • M
CVE-2010-1421

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Access Restriction Bypass

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Authentication Bypass

[0,)
  • H
Resource Management Errors

[0,)
  • M
Cross-site Scripting (XSS)

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Cross-site Scripting (XSS)

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Cross-site Scripting (XSS)

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Information Exposure

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Access Restriction Bypass

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Remote Code Execution (RCE)

[0,)
  • M
CVE-2010-1422

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Information Exposure

[,254245)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Improper Access Control

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Directory Traversal

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Resource Management Errors

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Resource Management Errors

[0,)
  • C
Access Restriction Bypass

[,254245)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • M
Information Exposure

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Information Exposure

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Improper Input Validation

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Information Exposure

[0,)
  • M
Cross-site Scripting (XSS)

[0,)
  • H
Resource Management Errors

[0,)
  • M
Information Exposure

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • M
Information Exposure

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Resource Management Errors

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Cryptographic Issues

[0,)
  • M
Access Restriction Bypass

[0,1.2.17)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Cross-site Scripting (XSS)

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Resource Management Errors

[0,)
  • M
Cross-site Scripting (XSS)

[0,)
  • H
Remote Code Execution (RCE)

[,254245)
  • H
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[,254245)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Access Restriction Bypass

[0,)
  • M
Improper Input Validation

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Resource Management Errors

[0,)
  • L
Information Exposure

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Access Restriction Bypass

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Improper Input Validation

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Information Exposure

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Cross-site Scripting (XSS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Remote Code Execution (RCE)

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • C
Insufficiently Protected Credentials

[,254245)
  • H
Out-of-Bounds

[0,)
  • M
Access Restriction Bypass

[0,)
  • H
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Access Restriction Bypass

[0,)
  • H
Out-of-Bounds

[0,)
  • L
Cross-site Scripting (XSS)

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Access Restriction Bypass

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Access Restriction Bypass

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Remote Code Execution (RCE)

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Access Restriction Bypass

[0,)
  • C
Denial of Service (DoS)

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Cross-site Scripting (XSS)

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Information Exposure

[,254245)
  • M
Cross-site Scripting (XSS)

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Cross-site Scripting (XSS)

[0,)
  • H
Use After Free

[0,)
  • C
Use After Free

[0,)
  • M
Cross-site Scripting (XSS)

[0,)