CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
76.3%
Severity: High
Date : 2021-07-27
CVE-ID : CVE-2021-21775 CVE-2021-21779 CVE-2021-30663 CVE-2021-30665
CVE-2021-30689 CVE-2021-30720 CVE-2021-30734 CVE-2021-30744
CVE-2021-30749 CVE-2021-30795 CVE-2021-30797 CVE-2021-30799
Package : wpewebkit
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-2221
The package wpewebkit before version 2.32.3-1 is vulnerable to multiple
issues including arbitrary code execution, access restriction bypass,
cross-site scripting and information disclosure.
Upgrade to 2.32.3-1.
The problems have been fixed upstream in version 2.32.3.
None.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. A use-after-free vulnerability exists in the way certain events
are processed for ImageLoader objects of WebKit. A specially crafted
web page can lead to a potential information leak and further memory
corruption. In order to trigger the vulnerability, a victim must be
tricked into visiting a malicious webpage.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. A use-after-free vulnerability exists in the way that WebKit
GraphicsContext handles certain events. A specially crafted web page
can lead to a potential information leak and further memory corruption.
A victim must be tricked into visiting a malicious web page to trigger
this vulnerability.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution. Apple is aware of a report that this issue
may have been actively exploited.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
universal cross site scripting.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. A malicious website may be able to access restricted ports on
arbitrary servers.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
universal cross site scripting.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to code
execution.
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution.
A remote attacker could execute arbitrary code or disclose sensitive
information through crafted web content. Apple is aware of a report
that one of the arbitrary code execution issues may have been actively
exploited.
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-21775
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1229
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-21779
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1238
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30663
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30665
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30689
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30720
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30734
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30744
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30749
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30795
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30797
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30799
https://security.archlinux.org/CVE-2021-21775
https://security.archlinux.org/CVE-2021-21779
https://security.archlinux.org/CVE-2021-30663
https://security.archlinux.org/CVE-2021-30665
https://security.archlinux.org/CVE-2021-30689
https://security.archlinux.org/CVE-2021-30720
https://security.archlinux.org/CVE-2021-30734
https://security.archlinux.org/CVE-2021-30744
https://security.archlinux.org/CVE-2021-30749
https://security.archlinux.org/CVE-2021-30795
https://security.archlinux.org/CVE-2021-30797
https://security.archlinux.org/CVE-2021-30799
security.archlinux.org/AVG-2221
security.archlinux.org/CVE-2021-21775
security.archlinux.org/CVE-2021-21779
security.archlinux.org/CVE-2021-30663
security.archlinux.org/CVE-2021-30665
security.archlinux.org/CVE-2021-30689
security.archlinux.org/CVE-2021-30720
security.archlinux.org/CVE-2021-30734
security.archlinux.org/CVE-2021-30744
security.archlinux.org/CVE-2021-30749
security.archlinux.org/CVE-2021-30795
security.archlinux.org/CVE-2021-30797
security.archlinux.org/CVE-2021-30799
talosintelligence.com/vulnerability_reports/TALOS-2021-1229
talosintelligence.com/vulnerability_reports/TALOS-2021-1238
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-21775
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-21779
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30663
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30665
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30689
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30720
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30734
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30744
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30749
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30795
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30797
webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30799
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
76.3%