wpe_webkit vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://wpewebkit.org|wpe_webkit package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,2.46.5)
  • H
Denial of Service (DoS)

[,2.46.5)
  • H
Out-of-bounds Read

[,2.46.5)
  • M
Out-of-bounds Write

[,2.46.0)
  • M
Improper Resource Shutdown or Release

[,2.46.5)
  • L
Improperly Implemented Security Check for Standard

[,2.46.3)
  • H
Access of Memory Location After End of Buffer

[,2.46.0)
  • H
Origin Validation Error

[0,)
  • M
Information Exposure

[,2.45.3)
  • C
Cross-site Scripting (XSS)

[,2.45.1)
  • C
Arbitrary Code Injection

[,2.45.3)
  • M
Information Exposure

[,2.45.3)
  • H
User Interface (UI) Misrepresentation of Critical Information

[0,)
  • M
Information Exposure

[,2.45.3)
  • C
Out-of-bounds Write

[,2.45.3)
  • C
Arbitrary Code Injection

[,2.45.3)
  • C
Code Injection

[,2.45.3)
  • C
Origin Validation Error

[,2.44.0)
  • H
Use After Free

[,2.45.3)
  • H
Use After Free

[,2.44.0)
  • M
Resource Exhaustion

[,2.44.0)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,2.44.0)
  • H
Use After Free

[,2.42.0)
  • H
Code Injection

[,2.38.0)
  • H
Code Injection

[,2.42.5)
  • H
Use After Free

[,2.42.1)
  • M
Information Exposure

[,2.42.5)
  • H
Arbitrary Code Execution

[,2.42.3)
  • M
Out-of-bounds Read

[,2.42.3)
  • M
Information Exposure

[,2.40.5)
  • H
Out-of-Bounds

[,2.40.5)
  • M
Information Exposure

[,2.40.5)
  • H
Out-of-Bounds

[,2.40.5)
  • H
Out-of-Bounds

[,2.40.5)
  • H
Out-of-Bounds

[,2.40.5)
  • H
Out-of-Bounds

[,2.40.5)
  • H
Permissive Cross-domain Policy with Untrusted Domains

[,2.40.5)
  • H
Out-of-Bounds

[,2.40.5)
  • H
Arbitrary Code Execution

[,2.40.0)
  • H
Arbitrary Code Execution

[,2.38.0)
  • C
Arbitrary Code Execution

[,2.39.90)
  • H
Out-of-Bounds

[,2.26.0)
  • H
Out-of-bounds Write

[,2.38.3)
  • M
Information Exposure

[,2.38.3)
  • H
Out-of-bounds Write

[,2.38.1)
  • H
Use After Free

[,2.38.3)
  • H
Out-of-bounds Write

[,2.38.0)
  • M
Information Exposure

[,2.38.3)
  • H
Out-of-bounds Write

[,2.38.3)
  • M
Information Exposure

[,2.38.3)
  • M
Permissive Cross-domain Policy with Untrusted Domains

[,2.34.4)
  • H
Use After Free

[,2.34.7)
  • H
Buffer Overflow

[,2.34.7)
  • H
Use After Free

[,2.34.7)
  • H
Out-of-bounds Write

[,2.20.1)
  • H
Improper Input Validation

[,2.27.1)
  • C
Improper Input Validation

[,2.28.3)
  • H
Use After Free

[,2.28.1)
  • M
Improper Data Handling

[,2.24.1)
  • H
Improper Input Validation

[,2.24.1)