Search for packages
| purl | pkg:alpm/archlinux/webkit2gtk@2.28.2-2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-5fen-5h16-zba4
Aliases: CVE-2020-9805 |
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting. |
Affected by 0 other vulnerabilities. |
|
VCID-78r7-76db-4ugx
Aliases: CVE-2020-9803 |
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-g1xh-4y74-3bbm
Aliases: CVE-2020-9802 |
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-jf8v-5kq7-kffy
Aliases: CVE-2020-9806 |
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-mfnb-qtnt-x3c8
Aliases: CVE-2020-9850 |
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. A remote attacker may be able to cause arbitrary code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-s5m3-9381-23ac
Aliases: CVE-2020-9807 |
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-uj6g-a4th-gqax
Aliases: CVE-2020-9952 |
An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack. |
Affected by 0 other vulnerabilities. |
|
VCID-xqtx-ayrg-8qaw
Aliases: CVE-2020-13753 |
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226. |
Affected by 0 other vulnerabilities. |
|
VCID-yvkp-pyf9-4be4
Aliases: CVE-2020-9843 |
An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2025-07-31T11:38:10.091565+00:00 | Arch Linux Importer | Affected by | VCID-uj6g-a4th-gqax | https://security.archlinux.org/AVG-1292 | 37.0.0 |
| 2025-07-31T11:35:06.355973+00:00 | Arch Linux Importer | Affected by | VCID-xqtx-ayrg-8qaw | https://security.archlinux.org/AVG-1203 | 37.0.0 |
| 2025-07-31T11:35:06.327468+00:00 | Arch Linux Importer | Affected by | VCID-g1xh-4y74-3bbm | https://security.archlinux.org/AVG-1203 | 37.0.0 |
| 2025-07-31T11:35:06.292380+00:00 | Arch Linux Importer | Affected by | VCID-78r7-76db-4ugx | https://security.archlinux.org/AVG-1203 | 37.0.0 |
| 2025-07-31T11:35:06.264148+00:00 | Arch Linux Importer | Affected by | VCID-5fen-5h16-zba4 | https://security.archlinux.org/AVG-1203 | 37.0.0 |
| 2025-07-31T11:35:06.235658+00:00 | Arch Linux Importer | Affected by | VCID-jf8v-5kq7-kffy | https://security.archlinux.org/AVG-1203 | 37.0.0 |
| 2025-07-31T11:35:06.205104+00:00 | Arch Linux Importer | Affected by | VCID-s5m3-9381-23ac | https://security.archlinux.org/AVG-1203 | 37.0.0 |
| 2025-07-31T11:35:06.174283+00:00 | Arch Linux Importer | Affected by | VCID-yvkp-pyf9-4be4 | https://security.archlinux.org/AVG-1203 | 37.0.0 |
| 2025-07-31T11:35:06.144620+00:00 | Arch Linux Importer | Affected by | VCID-mfnb-qtnt-x3c8 | https://security.archlinux.org/AVG-1203 | 37.0.0 |