Search for packages
purl | pkg:alpm/archlinux/webkit2gtk@2.32.2-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1441-p8y8-aaag
Aliases: CVE-2021-30797 |
This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution. |
Affected by 3 other vulnerabilities. |
VCID-4pcq-442y-aaab
Aliases: CVE-2021-30665 |
A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. |
Affected by 3 other vulnerabilities. |
VCID-8ryr-x1f9-aaag
Aliases: CVE-2021-30734 |
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution. |
Affected by 3 other vulnerabilities. |
VCID-fjj9-tkgy-aaar
Aliases: CVE-2021-21779 |
A use-after-free vulnerability exists in the way Webkit’s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. |
Affected by 3 other vulnerabilities. |
VCID-j1vk-9vc7-aaad
Aliases: CVE-2021-30689 |
A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting. |
Affected by 3 other vulnerabilities. |
VCID-jenk-m47u-aaaa
Aliases: CVE-2021-30744 |
Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting. |
Affected by 3 other vulnerabilities. |
VCID-jype-tp6b-aaas
Aliases: CVE-2021-30799 |
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution. |
Affected by 3 other vulnerabilities. |
VCID-kgv2-t3zj-aaak
Aliases: CVE-2021-30663 |
An integer overflow was addressed with improved input validation. This issue is fixed in iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, Safari 14.1.1, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. |
Affected by 3 other vulnerabilities. |
VCID-kmcn-9wcq-aaan
Aliases: CVE-2021-30749 |
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution. |
Affected by 3 other vulnerabilities. |
VCID-n558-qr82-aaah
Aliases: CVE-2021-30720 |
A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers. |
Affected by 3 other vulnerabilities. |
VCID-rtcd-32d6-aaae
Aliases: CVE-2021-30795 |
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution. |
Affected by 3 other vulnerabilities. |
VCID-t9rq-pb4h-aaaa
Aliases: CVE-2021-21775 |
A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage. |
Affected by 3 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-m9zu-zj1n-aaag | A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution. |
CVE-2021-30758
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:46:31.328687+00:00 | Arch Linux Importer | Fixing | VCID-m9zu-zj1n-aaag | https://security.archlinux.org/AVG-2218 | 36.0.0 |
2025-03-28T07:45:32.637834+00:00 | Arch Linux Importer | Affected by | VCID-t9rq-pb4h-aaaa | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2025-03-28T07:45:32.616988+00:00 | Arch Linux Importer | Affected by | VCID-fjj9-tkgy-aaar | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2025-03-28T07:45:32.596443+00:00 | Arch Linux Importer | Affected by | VCID-kgv2-t3zj-aaak | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2025-03-28T07:45:32.575788+00:00 | Arch Linux Importer | Affected by | VCID-4pcq-442y-aaab | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2025-03-28T07:45:32.555196+00:00 | Arch Linux Importer | Affected by | VCID-j1vk-9vc7-aaad | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2025-03-28T07:45:32.534236+00:00 | Arch Linux Importer | Affected by | VCID-n558-qr82-aaah | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2025-03-28T07:45:32.513831+00:00 | Arch Linux Importer | Affected by | VCID-8ryr-x1f9-aaag | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2025-03-28T07:45:32.493425+00:00 | Arch Linux Importer | Affected by | VCID-jenk-m47u-aaaa | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2025-03-28T07:45:32.472911+00:00 | Arch Linux Importer | Affected by | VCID-kmcn-9wcq-aaan | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2025-03-28T07:45:32.452430+00:00 | Arch Linux Importer | Affected by | VCID-rtcd-32d6-aaae | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2025-03-28T07:45:32.431700+00:00 | Arch Linux Importer | Affected by | VCID-1441-p8y8-aaag | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2025-03-28T07:45:32.411292+00:00 | Arch Linux Importer | Affected by | VCID-jype-tp6b-aaas | https://security.archlinux.org/AVG-2220 | 36.0.0 |
2024-09-18T02:01:48.986367+00:00 | Arch Linux Importer | Fixing | VCID-m9zu-zj1n-aaag | https://security.archlinux.org/AVG-2218 | 34.0.1 |
2024-09-18T02:00:29.600655+00:00 | Arch Linux Importer | Affected by | VCID-t9rq-pb4h-aaaa | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-09-18T02:00:29.571919+00:00 | Arch Linux Importer | Affected by | VCID-fjj9-tkgy-aaar | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-09-18T02:00:29.548300+00:00 | Arch Linux Importer | Affected by | VCID-kgv2-t3zj-aaak | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-09-18T02:00:29.523911+00:00 | Arch Linux Importer | Affected by | VCID-4pcq-442y-aaab | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-09-18T02:00:29.500022+00:00 | Arch Linux Importer | Affected by | VCID-j1vk-9vc7-aaad | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-09-18T02:00:29.475877+00:00 | Arch Linux Importer | Affected by | VCID-n558-qr82-aaah | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-09-18T02:00:29.451975+00:00 | Arch Linux Importer | Affected by | VCID-8ryr-x1f9-aaag | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-09-18T02:00:29.427996+00:00 | Arch Linux Importer | Affected by | VCID-jenk-m47u-aaaa | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-09-18T02:00:29.403562+00:00 | Arch Linux Importer | Affected by | VCID-kmcn-9wcq-aaan | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-09-18T02:00:29.374930+00:00 | Arch Linux Importer | Affected by | VCID-rtcd-32d6-aaae | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-09-18T02:00:29.340105+00:00 | Arch Linux Importer | Affected by | VCID-1441-p8y8-aaag | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-09-18T02:00:29.304582+00:00 | Arch Linux Importer | Affected by | VCID-jype-tp6b-aaas | https://security.archlinux.org/AVG-2220 | 34.0.1 |
2024-01-17T17:36:50.617597+00:00 | Arch Linux Importer | Affected by | VCID-t9rq-pb4h-aaaa | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-17T17:36:50.595342+00:00 | Arch Linux Importer | Affected by | VCID-fjj9-tkgy-aaar | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-17T17:36:50.573498+00:00 | Arch Linux Importer | Affected by | VCID-kgv2-t3zj-aaak | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-17T17:36:50.551308+00:00 | Arch Linux Importer | Affected by | VCID-4pcq-442y-aaab | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-17T17:36:50.529359+00:00 | Arch Linux Importer | Affected by | VCID-j1vk-9vc7-aaad | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-17T17:36:50.507339+00:00 | Arch Linux Importer | Affected by | VCID-n558-qr82-aaah | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-17T17:36:50.485391+00:00 | Arch Linux Importer | Affected by | VCID-8ryr-x1f9-aaag | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-17T17:36:50.463425+00:00 | Arch Linux Importer | Affected by | VCID-jenk-m47u-aaaa | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-17T17:36:50.441634+00:00 | Arch Linux Importer | Affected by | VCID-kmcn-9wcq-aaan | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-17T17:36:50.419364+00:00 | Arch Linux Importer | Affected by | VCID-rtcd-32d6-aaae | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-17T17:36:50.397536+00:00 | Arch Linux Importer | Affected by | VCID-1441-p8y8-aaag | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-17T17:36:50.374995+00:00 | Arch Linux Importer | Affected by | VCID-jype-tp6b-aaas | https://security.archlinux.org/AVG-2220 | 34.0.0rc2 |
2024-01-03T22:27:54.074519+00:00 | Arch Linux Importer | Fixing | VCID-m9zu-zj1n-aaag | https://security.archlinux.org/AVG-2218 | 34.0.0rc1 |
2024-01-03T22:26:45.854872+00:00 | Arch Linux Importer | Affected by | VCID-t9rq-pb4h-aaaa | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |
2024-01-03T22:26:45.833503+00:00 | Arch Linux Importer | Affected by | VCID-fjj9-tkgy-aaar | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |
2024-01-03T22:26:45.811874+00:00 | Arch Linux Importer | Affected by | VCID-kgv2-t3zj-aaak | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |
2024-01-03T22:26:45.790356+00:00 | Arch Linux Importer | Affected by | VCID-4pcq-442y-aaab | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |
2024-01-03T22:26:45.766455+00:00 | Arch Linux Importer | Affected by | VCID-j1vk-9vc7-aaad | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |
2024-01-03T22:26:45.740689+00:00 | Arch Linux Importer | Affected by | VCID-n558-qr82-aaah | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |
2024-01-03T22:26:45.716963+00:00 | Arch Linux Importer | Affected by | VCID-8ryr-x1f9-aaag | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |
2024-01-03T22:26:45.692732+00:00 | Arch Linux Importer | Affected by | VCID-jenk-m47u-aaaa | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |
2024-01-03T22:26:45.666478+00:00 | Arch Linux Importer | Affected by | VCID-kmcn-9wcq-aaan | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |
2024-01-03T22:26:45.639677+00:00 | Arch Linux Importer | Affected by | VCID-rtcd-32d6-aaae | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |
2024-01-03T22:26:45.613234+00:00 | Arch Linux Importer | Affected by | VCID-1441-p8y8-aaag | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |
2024-01-03T22:26:45.588842+00:00 | Arch Linux Importer | Affected by | VCID-jype-tp6b-aaas | https://security.archlinux.org/AVG-2220 | 34.0.0rc1 |