firefox-esr vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the firefox-esr package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Read

*
  • H
Out-of-Bounds

*
  • H
Use After Free

*
  • M
Improper Certificate Validation

*
  • H
Use After Free

*
  • H
Out-of-Bounds

<68.9.0esr-1~deb8u2
  • H
Insufficient Verification of Data Authenticity

<68.9.0esr-1~deb8u2
  • M
Use After Free

<68.9.0esr-1~deb8u2
  • M
Information Exposure

<68.9.0esr-1~deb8u2
  • H
Race Condition

<68.8.0esr-1~deb8u1
  • C
Buffer Overflow

<68.8.0esr-1~deb8u1
  • M
Information Exposure

<68.8.0esr-1~deb8u1
  • C
Out-of-Bounds

<68.8.0esr-1~deb8u1
  • H
Out-of-Bounds

<68.7.0esr-1~deb8u1
  • C
Out-of-Bounds

<68.7.0esr-1~deb8u1
  • H
Out-of-bounds Write

<68.7.0esr-1~deb8u1
  • H
Use After Free

<68.7.0esr-1~deb8u1
  • H
Double Free

<68.7.0esr-1~deb8u1
  • M
Information Exposure

<68.6.0esr-1~deb8u1
  • H
Use After Free

<68.6.0esr-1~deb8u1
  • H
Use After Free

<68.6.0esr-1~deb8u1
  • H
Arbitrary Code Injection

<68.6.0esr-1~deb8u1
  • H
Out-of-bounds Read

<68.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<68.6.0esr-1~deb8u1
  • M
Out-of-bounds Read

<68.6.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<68.5.0esr-1~deb8u1
  • H
Out-of-Bounds

<68.5.0esr-1~deb8u1
  • H
Out-of-bounds Write

<68.5.0esr-1~deb8u1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<68.4.1esr-1~deb8u1
  • H
Buffer Overflow

<68.4.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<68.4.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<68.4.0esr-1~deb8u1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<68.4.0esr-1~deb8u1
  • H
Use After Free

<68.3.0esr-1~deb8u1
  • H
Use After Free

<68.3.0esr-1~deb8u1
  • H
Use After Free

<68.3.0esr-1~deb8u1
  • H
Buffer Overflow

<68.3.0esr-1~deb8u1
  • H
Buffer Overflow

<68.3.0esr-1~deb8u1
  • M
Origin Validation Error

<68.2.0esr-1~deb8u1
  • M
Race Condition

<68.2.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<68.2.0esr-1~deb8u1
  • H
Use After Free

<68.2.0esr-1~deb8u1
  • H
Out-of-bounds Write

<68.2.0esr-1~deb8u1
  • H
Use After Free

<68.2.0esr-1~deb8u1
  • H
Buffer Overflow

<68.2.0esr-1~deb8u1
  • H
Out-of-bounds Read

<68.2.0esr-1~deb8u1
  • L
Information Exposure

<60.9.0esr-1~deb8u1
  • H
Out-of-Bounds

<60.9.0esr-1~deb8u1
  • H
Use After Free

<60.9.0esr-1~deb8u1
  • H
Use After Free

<60.9.0esr-1~deb8u1
  • C
Improper Input Validation

<60.9.0esr-1~deb8u1
  • M
Inclusion of Functionality from Untrusted Control Sphere

<60.9.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<60.9.0esr-1~deb8u1
  • H
Arbitrary Code Injection

<60.8.0esr-1~deb8u1
  • H
Out-of-Bounds

<60.8.0esr-1
  • C
Use After Free

<60.8.0esr-1~deb8u1
  • H
Cross-site Request Forgery (CSRF)

<60.8.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<60.8.0esr-1~deb8u1
  • M
CVE-2019-11730

<60.8.0esr-1~deb8u1
  • M
Improper Encoding or Escaping of Output

<60.8.0esr-1~deb8u1
  • H
Out-of-bounds Read

<60.8.0esr-1
  • C
Out-of-Bounds

<60.8.0esr-1~deb8u1
  • H
CVE-2019-11711

<60.8.0esr-1~deb8u1
  • M
Information Exposure

<68.2.0esr-1
  • C
Improper Input Validation

<60.7.2esr-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<60.7.1esr-1~deb8u1
  • M
Information Exposure

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<60.7.0esr-1~deb8u1
  • M
Origin Validation Error

<60.7.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.7.0esr-1~deb8u1
  • C
Use After Free

<60.7.0esr-1~deb8u1
  • C
Use After Free

<60.7.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.7.0esr-1~deb8u1
  • C
Improper Input Validation

<60.7.0esr-1~deb8u1
  • C
Use After Free

<60.7.0esr-1~deb8u1
  • M
Improper Input Validation

<60.7.0esr-1~deb8u1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<60.6.1esr-1~deb8u1
  • H
Out-of-Bounds

<60.6.1esr-1~deb8u1
  • C
Out-of-Bounds

<60.6.0esr-1~deb8u1
  • C
Reachable Assertion

<60.6.0esr-1~deb8u1
  • M
Out-of-Bounds

<60.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.6.0esr-1~deb8u1
  • C
Use After Free

<60.6.0esr-1~deb8u1
  • C
Use After Free

<60.6.0esr-1~deb8u1
  • C
Improper Input Validation

<60.6.0esr-1~deb8u1
  • M
Origin Validation Error

<60.7.0esr-1~deb8u1
  • M
Out-of-bounds Read

<60.7.0esr-1~deb8u1
  • M
Origin Validation Error

<60.3.0esr-1~deb8u1
  • M
Information Exposure

<60.7.0esr-1~deb8u1
  • M
Out-of-bounds Write

<60.5.1esr-1~deb8u1
  • M
Use After Free

<60.7.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.5.0esr-1~deb8u1
  • C
Improper Authentication

<60.5.0esr-1~deb8u1
  • C
Use After Free

<60.5.0esr-1~deb8u1
  • M
CVE-2018-18506

<60.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.4.0esr-1~deb8u1
  • C
Use After Free

<60.4.0esr-1~deb8u1
  • C
Out-of-bounds Write

<60.4.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.4.0esr-1~deb8u1
  • M
Origin Validation Error

<60.4.0esr-1~deb8u1
  • H
Out-of-bounds Write

<60.5.1esr-1~deb8u1
  • M
Incorrect Permission Assignment for Critical Resource

<60.3.0esr-1~deb8u1
  • H
CVE-2018-12395

<60.3.0esr-1~deb8u1
  • H
Information Exposure

<60.3.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.3.0esr-1~deb8u1
  • H
Out-of-Bounds

<60.3.0esr-1~deb8u1
  • H
Out-of-bounds Write

<60.3.0esr-1~deb8u1
  • C
CVE-2018-12392

<60.3.0esr-1~deb8u1
  • H
Out-of-bounds Read

<60.4.0esr-1~deb8u1
  • H
Improper Input Validation

<60.2.1esr-1
  • C
Improper Input Validation

<60.2.2esr-1
  • H
Incorrect Type Conversion or Cast

<60.2.2esr-1
  • M
Insufficiently Protected Credentials

<60.2.1esr-1
  • C
Use After Free

<60.2.0esr-1
  • H
Out-of-bounds Write

<60.2.0esr-1
  • C
Out-of-Bounds

<60.2.0esr-1
  • C
Use After Free

<60.2.0esr-1
  • H
Cross-site Request Forgery (CSRF)

<52.9.0esr-1~deb8u1
  • H
Use After Free

<52.9.0esr-1~deb8u1
  • H
Use After Free

<52.9.0esr-1~deb8u1
  • M
Out-of-bounds Read

<52.9.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.9.0esr-1~deb8u1
  • H
Integer Overflow or Wraparound

<52.9.0esr-1~deb8u1
  • M
Information Exposure

<52.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.9.0esr-1~deb8u1
  • C
Improper Input Validation

<52.9.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.2.0esr-1~deb8u1
  • L
CVE-2017-7775

<52.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.2.0esr-1~deb8u1
  • H
Out-of-bounds Read

<52.2.0esr-1~deb8u1
  • C
Out-of-bounds Read

<52.2.0esr-1~deb8u1
  • H
Out-of-bounds Write

<52.8.1esr-1~deb8u1
  • H
Out-of-bounds Read

<52.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.2.0esr-1~deb8u1
  • H
Improper Input Validation

<52.7.1esr-1~deb8u1
  • C
Out-of-bounds Write

<52.7.2esr-1~deb8u1
  • C
Use After Free

<52.7.3esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Use After Free

<45.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.4.0esr-1~deb8u1
  • C
Use After Free

<45.6.0esr-1~deb8u1
  • C
Improper Input Validation

<45.6.0esr-1~deb8u1
  • M
Security Features

<45.6.0esr-1~deb8u1
  • C
Out-of-bounds Write

<52.8.0esr-1~deb8u1
  • H
Improper Input Validation

<52.4.0esr-1~deb8u1
  • H
Out-of-bounds Read

<52.2.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.5.0esr-1~deb8u1
  • H
Use After Free

<45.5.1esr-1~deb8u1
  • C
Out-of-Bounds

<45.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.3.0esr-1~deb8u2
  • M
DEPRECATED: Use of Uninitialized Resource

<45.8.0esr-1~deb8u1
  • H
CVE-2017-5386

<45.7.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
CVE-2017-5390

<45.7.0esr-1~deb8u1
  • C
Use After Free

<45.7.0esr-1~deb8u1
  • M
Information Exposure

<52.7.1esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • M
CVE-2018-5117

<52.6.0esr-1~deb8u1
  • C
Use After Free

<52.4.0esr-1~deb8u1
  • H
Origin Validation Error

<45.6.0esr-1~deb8u1
  • H
Out-of-bounds Write

<52.7.1esr-1~deb8u1
  • C
Integer Overflow or Wraparound

<52.6.0esr-1~deb8u1
  • H
Improper Access Control

<45.6.0esr-1~deb8u1
  • C
Use After Free

<45.7.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Out-of-bounds Read

<45.9.0esr-1~deb8u1
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • H
Improper Validation of Array Index

<45.9.0esr-1~deb8u1
  • H
Information Exposure

<45.7.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.8.0esr-1~deb8u1
  • C
Out-of-bounds Write

<45.9.0esr-1~deb8u1
  • C
Use After Free

<45.7.0esr-1~deb8u1
  • M
Improper Input Validation

<52.2.0esr-1~deb8u1
  • H
Arbitrary Code Injection

<52.3.0esr-1~deb8u2
  • C
Use After Free

<52.5.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.7.1esr-1~deb8u1
  • C
Error Handling

<45.8.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • H
Out-of-bounds Write

<52.7.2esr-1~deb8u1
  • M
Improper Certificate Validation

<45.5.0esr-1~deb8u1
  • M
Information Exposure

<45.8.0esr-1~deb8u1
  • M
Incorrect Calculation

<45.9.0esr-1~deb8u1
  • M
Improper Input Validation

<45.7.0esr-1~deb8u1
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • C
Use After Free

<52.4.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.8.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.5.0esr-1~deb8u1
  • M
Improper Input Validation

<52.3.0esr-1~deb8u2
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.3.0esr-1~deb8u2
  • C
Out-of-bounds Read

<45.9.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<52.4.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.2.0esr-1~deb8u1
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.5.0esr-1~deb8u1
  • H
Information Exposure

<52.3.0esr-1~deb8u2
  • C
Out-of-Bounds

<52.2.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • M
Information Exposure

<45.8.0esr-1~deb8u1
  • H
Out-of-bounds Write

<45.9.0esr-1~deb8u1
  • M
CVE-2017-7830

<52.5.0esr-1~deb8u1
  • C
Use After Free

<52.3.0esr-1~deb8u2
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • C
Use After Free

<52.3.0esr-1~deb8u2
  • M
Improper Input Validation

<45.5.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • H
Out-of-bounds Write

<45.9.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.8.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.9.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.4.0esr-1~deb8u1
  • H
Information Exposure

<52.5.2esr-1~deb8u1
  • C
Out-of-bounds Read

<52.2.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.3.0esr-1~deb8u2
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • H
Use After Free

<52.2.0esr-1~deb8u1
  • M
Information Exposure

<45.5.0esr-1~deb8u1
  • M
CVE-2018-5168

<52.8.0esr-1~deb8u1
  • C
Integer Overflow or Wraparound

<45.5.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.6.0esr-1~deb8u1
  • C
Out-of-bounds Read

<52.3.0esr-1~deb8u2
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.8.0esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • H
Improper Privilege Management

<52.3.0esr-1~deb8u2
  • C
Out-of-Bounds

<52.6.0esr-1~deb8u1
  • H
Security Features

<45.6.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.8.0esr-1~deb8u1
  • H
Use After Free

<52.4.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.5.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.6.0esr-1~deb8u1
  • C
Use After Free

<52.3.0esr-1~deb8u2
  • C
Out-of-Bounds

<45.7.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Use After Free

<52.3.0esr-1~deb8u2
  • C
Use After Free

<52.4.0esr-1~deb8u1
  • H
Integer Overflow or Wraparound

<52.7.1esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • H
Improper Input Validation

<52.3.0esr-1~deb8u2
  • C
Out-of-Bounds

<45.8.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.9.0esr-1~deb8u1
  • C
Use After Free

<52.8.0esr-1~deb8u1
  • C
Use After Free

<52.8.0esr-1~deb8u1
  • H
Information Exposure

<45.6.0esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • C
Use After Free

<52.3.0esr-1~deb8u2
  • C
Out-of-Bounds

<52.3.0esr-1~deb8u2
  • H
Information Exposure

<52.8.0esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • C
Use After Free

<45.8.0esr-1~deb8u1
  • H
Arbitrary Code Injection

<52.8.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.7.1esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.7.1esr-1~deb8u1
  • C
Use After Free

<45.8.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.7.0esr-1~deb8u1
  • M
Information Exposure

<60.2.0esr-1
  • C
Out-of-bounds Write

<45.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.4.0esr-1~deb8u2
  • C
Use After Free

<45.4.0esr-1~deb8u2
  • C
Use After Free

<45.4.0esr-1~deb8u2
  • H
Out-of-Bounds

<45.4.0esr-1~deb8u2
  • C
Use After Free

<45.4.0esr-1~deb8u2
  • H
Improper Input Validation

<45.4.0esr-1~deb8u2
  • C
Use After Free

<45.4.0esr-1~deb8u2
  • C
Use After Free

<45.4.0esr-1~deb8u2
  • C
Out-of-Bounds

<45.4.0esr-1~deb8u2
  • H
Improper Input Validation

<45.4.0esr-1~deb8u2
  • H
Integer Overflow or Wraparound

<45.0esr-1
  • M
Cross-site Scripting (XSS)

<45.3.0esr-1~deb8u1
  • M
Information Exposure

<45.4.0esr-1~deb8u2
  • M
Cross-site Scripting (XSS)

<45.3.0esr-1~deb8u1
  • C
Use After Free

<45.3.0esr-1~deb8u1
  • H
Integer Overflow or Wraparound

<45.4.0esr-1~deb8u2
  • M
Out-of-Bounds

<45.3.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.3.0esr-1~deb8u1
  • H
Use After Free

<45.3.0esr-1~deb8u1
  • H
Incorrect Type Conversion or Cast

<45.3.0esr-1~deb8u1
  • H
Use After Free

<45.3.0esr-1~deb8u1
  • H
Use After Free

<45.3.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.3.0esr-1~deb8u1
  • M
Information Exposure

<45.3.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.3.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.2.0esr-1~deb8u1
  • M
Improper Access Control

<45.2.0esr-1~deb8u1
  • H
Security Features

<45.2.0esr-1~deb8u1
  • H
CVE-2016-2828

<45.2.0esr-1~deb8u1
  • H
CVE-2016-2821

<45.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.1.0esr-1
  • H
Out-of-Bounds

<45.1.0esr-1
  • H
Out-of-Bounds

<45.1.0esr-1
  • H
Out-of-Bounds

<45.1.0esr-1
  • M
Security Features

<45.0esr-1
  • H
CVE-2016-1973

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
CVE-2016-1961

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
CVE-2016-1960

<45.0esr-1
  • H
Access Restriction Bypass

<45.0esr-1
  • H
CVE-2016-1964

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • M
Out-of-Bounds

<45.0esr-1
  • M
Security Features

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • M
Resource Management Errors

<45.0esr-1
  • H
Improper Data Handling

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • C
CVE-2016-1962

<45.0esr-1
  • M
Information Exposure

<45.0esr-1
  • M
Information Exposure

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Access Restriction Bypass

<45.0esr-1
  • H
Numeric Errors

<45.0esr-1
  • H
CVE-2016-1979

<45.0esr-1
  • H
CVE-2016-1966

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Improper Data Handling

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Access Restriction Bypass

<45.0esr-1
  • M
CVE-2007-0801

<45.0esr-1
  • M
CVE-2006-6502

<45.0esr-1
  • M
Security Features

<45.0esr-1
  • M
Access Restriction Bypass

<45.0esr-1
  • M
CVE-2006-6499

<45.0esr-1
  • H
Arbitrary Code Injection

<45.0esr-1
  • M
CVE-2006-6497

<45.0esr-1
  • M
CVE-2006-6498

<45.0esr-1
  • M
CVE-2006-6585

<45.0esr-1
  • H
CVE-2006-5463

<45.0esr-1
  • M
CVE-2006-5462

<45.0esr-1
  • H
CVE-2006-5747

<45.0esr-1
  • M
CVE-2006-5464

<45.0esr-1
  • M
CVE-2006-5748

<45.0esr-1
  • M
CVE-2006-5633

<45.0esr-1
  • M
Improper Input Validation

<45.0esr-1
  • M
CVE-2006-2723

<45.0esr-1