Known Vulnerabilities for products from Webkitgtk
Listed below are 20 of the newest known vulnerabilities associated with the vendor "Webkitgtk".
These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.
Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.
|CVE||Shortened Description||Severity||Publish Date||Last Modified|
|CVE-2022-30293||In WebKitGTK through 2.36.0 (and WPE WebKit), there is a heap-based buffer overflow in WebCore::TextureMapperLayer::setConten...||7.5 - HIGH||2022-05-06||2022-06-02|
|CVE-2021-42762||BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed proc...||5.3 - MEDIUM||2021-10-20||2021-11-26|
|CVE-2021-21806||An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page...||8.8 - HIGH||2021-07-08||2022-04-19|
|CVE-2021-21779||A use-after-free vulnerability exists in the way Webkit’s GraphicsContext handles certain events in WebKitGTK 2.30.4. A spe...||8.8 - HIGH||2021-07-08||2022-04-28|
|CVE-2021-21775||A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.3...||8.8 - HIGH||2021-07-07||2022-04-28|
|CVE-2021-1870||A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 C...||9.8 - CRITICAL||2021-04-02||2021-06-02|
|CVE-2021-1801||This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update...||6.5 - MEDIUM||2021-04-02||2021-06-02|
|CVE-2021-1799||A port redirection issue was addressed with additional port validation. This issue is fixed in macOS Big Sur 11.2, Security U...||6.5 - MEDIUM||2021-04-02||2021-06-02|
|CVE-2021-1789||A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update...||8.8 - HIGH||2021-04-02||2021-06-02|
|CVE-2021-1765||This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update...||6.5 - MEDIUM||2021-04-02||2021-06-02|
|CVE-2020-29623||"Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion. This issue i...||3.3 - LOW||2021-04-02||2021-06-02|
|CVE-2020-13753||The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the...||10 - CRITICAL||2020-07-14||2020-07-27|
|CVE-2020-13584||An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page...||8.8 - HIGH||2020-12-03||2022-04-19|
|CVE-2020-13558||A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A special...||8.8 - HIGH||2021-03-03||2022-04-28|
|CVE-2020-13543||A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page...||8.8 - HIGH||2020-12-03||2022-05-10|
|CVE-2020-11793||A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web content that allows rem...||8.8 - HIGH||2020-04-17||2020-06-13|
|CVE-2020-10018||WebKitGTK through 2.26.4 and WPE WebKit through 2.26.4 (which are the versions right before 2.28.0) contains a memory corrupt...||9.8 - CRITICAL||2020-03-02||2022-04-22|
|CVE-2020-3867||A logic issue was addressed with improved state management. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1,...||6.1 - MEDIUM||2020-02-27||2021-12-22|
|CVE-2019-11070||WebKitGTK and WPE WebKit prior to version 2.24.1 failed to properly apply configured HTTP proxy settings when downloading liv...||5.3 - MEDIUM||2019-04-10||2019-05-13|
|CVE-2019-8375||The UIProcess subsystem in WebKit, as used in WebKitGTK through 2.23.90 and WebKitGTK+ through 2.22.6 and other products, doe...||9.8 - CRITICAL||2019-02-24||2019-05-09|
Known software with vulnerabilities from Webkitgtk
Popular searches for "Webkitgtk"
The WebKitGTK Project Web content rendering. WebKitGTK WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers. Since adding support for WebKit2, its possible to build applications that use the web platform with increased security and responsiveness. WebKitGTK i g e also uses process separation to seamlessly support GTK 2 plugins like Flash in GTK 3 applications.WebKit Application software GTK World Wide Web Web browser Rendering (computer graphics) Computing platform Web content Integrated development environment Web colors Process (computing) Plug-in (computing) Responsiveness Adobe Flash Browser engine 3D computer graphics HTML GNOME Cascading Style Sheets Canvas element
F BWebKitGTK Security Advisory WSA-2015-0002 - The WebKitGTK Project Advisory ID: WSA-2015-0002. WebKit in Apple iOS before 8 makes it easier for remote attackers to track users during private browsing via a crafted web site that reads HTML5 application-cache data that had been stored during normal browsing. WebKit, as used in Apple iOS before 8 and Apple TV before 7, allows remote attackers to execute arbitrary code or cause a denial of service memory corruption and application crash via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-09-17-1 and APPLE-SA-2014-09-17-2. WebKit, as used in Apple iOS before 8 and Apple TV before 7, allows remote attackers to execute arbitrary code or cause a denial of service memory corruption and application crash via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-09-17-1 and APPLE-SA-2014-09-17-2.WebKit Apple Inc. Common Vulnerabilities and Exposures Website Denial-of-service attack Vulnerability (computing) Arbitrary code execution Crash (computing) IOS Memory corruption Security hacker Apple TV Safari (web browser) Windows 8 Private browsing HTML5 Google Chrome Web browser Application software User (computing)