Search for packages
Package details: pkg:alpm/archlinux/webkit2gtk@2.28.2-2
purl pkg:alpm/archlinux/webkit2gtk@2.28.2-2
Next non-vulnerable version 2.28.3-1
Latest non-vulnerable version 2.49.1-1
Risk 10.0
Vulnerabilities affecting this package (9)
Vulnerability Summary Fixed by
VCID-5fen-5h16-zba4
Aliases:
CVE-2020-9805
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.
2.28.3-1
Affected by 0 other vulnerabilities.
VCID-78r7-76db-4ugx
Aliases:
CVE-2020-9803
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
2.28.3-1
Affected by 0 other vulnerabilities.
VCID-g1xh-4y74-3bbm
Aliases:
CVE-2020-9802
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
2.28.3-1
Affected by 0 other vulnerabilities.
VCID-jf8v-5kq7-kffy
Aliases:
CVE-2020-9806
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
2.28.3-1
Affected by 0 other vulnerabilities.
VCID-mfnb-qtnt-x3c8
Aliases:
CVE-2020-9850
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. A remote attacker may be able to cause arbitrary code execution.
2.28.3-1
Affected by 0 other vulnerabilities.
VCID-s5m3-9381-23ac
Aliases:
CVE-2020-9807
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
2.28.3-1
Affected by 0 other vulnerabilities.
VCID-uj6g-a4th-gqax
Aliases:
CVE-2020-9952
An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.
2.28.3-1
Affected by 0 other vulnerabilities.
VCID-xqtx-ayrg-8qaw
Aliases:
CVE-2020-13753
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
2.28.3-1
Affected by 0 other vulnerabilities.
VCID-yvkp-pyf9-4be4
Aliases:
CVE-2020-9843
An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.
2.28.3-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-31T11:38:10.091565+00:00 Arch Linux Importer Affected by VCID-uj6g-a4th-gqax https://security.archlinux.org/AVG-1292 37.0.0
2025-07-31T11:35:06.355973+00:00 Arch Linux Importer Affected by VCID-xqtx-ayrg-8qaw https://security.archlinux.org/AVG-1203 37.0.0
2025-07-31T11:35:06.327468+00:00 Arch Linux Importer Affected by VCID-g1xh-4y74-3bbm https://security.archlinux.org/AVG-1203 37.0.0
2025-07-31T11:35:06.292380+00:00 Arch Linux Importer Affected by VCID-78r7-76db-4ugx https://security.archlinux.org/AVG-1203 37.0.0
2025-07-31T11:35:06.264148+00:00 Arch Linux Importer Affected by VCID-5fen-5h16-zba4 https://security.archlinux.org/AVG-1203 37.0.0
2025-07-31T11:35:06.235658+00:00 Arch Linux Importer Affected by VCID-jf8v-5kq7-kffy https://security.archlinux.org/AVG-1203 37.0.0
2025-07-31T11:35:06.205104+00:00 Arch Linux Importer Affected by VCID-s5m3-9381-23ac https://security.archlinux.org/AVG-1203 37.0.0
2025-07-31T11:35:06.174283+00:00 Arch Linux Importer Affected by VCID-yvkp-pyf9-4be4 https://security.archlinux.org/AVG-1203 37.0.0
2025-07-31T11:35:06.144620+00:00 Arch Linux Importer Affected by VCID-mfnb-qtnt-x3c8 https://security.archlinux.org/AVG-1203 37.0.0