yelp vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the yelp package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Out-of-bounds Write

<0:2.16.0-30.el5_9
  • C
CVE-2013-0783

<0:2.16.0-30.el5_9
  • C
Use After Free

<0:2.16.0-30.el5_9
  • C
Use After Free

<0:2.16.0-30.el5_9
  • C
Improper Certificate Validation

<0:2.16.0-30.el5_9
  • C
CVE-2010-1202

<0:2.16.0-26.el5
  • C
CVE-2010-1200

<0:2.16.0-26.el5
  • C
Cross-site Scripting (XSS)

<0:2.16.0-26.el5
  • C
CVE-2010-1203

<0:2.16.0-26.el5
  • C
CVE-2008-5913

<0:2.16.0-26.el5
  • C
Information Exposure

<0:2.16.0-26.el5
  • C
Improper Input Validation

<0:2.16.0-26.el5
  • C
Numeric Errors

<0:2.16.0-26.el5
  • C
Cross-site Scripting (XSS)

<0:2.16.0-26.el5
  • C
Arbitrary Code Injection

<0:2.16.0-26.el5
  • C
Resource Management Errors

<0:2.16.0-26.el5
  • C
Numeric Errors

<0:2.16.0-26.el5
  • C
Improper Input Validation

<0:2.16.0-19.el5
  • C
Access Restriction Bypass

<0:2.16.0-19.el5
  • C
Improper Input Validation

<0:2.16.0-22.el5
  • C
Resource Management Errors

<0:2.16.0-22.el5
  • C
Race Condition

<0:2.16.0-22.el5
  • C
Arbitrary Code Injection

<0:2.16.0-22.el5
  • C
Improper Authentication

<0:2.16.0-22.el5
  • C
Resource Management Errors

<0:2.16.0-22.el5
  • C
Out-of-Bounds

<0:2.16.0-22.el5
  • C
Resource Management Errors

<0:2.16.0-22.el5
  • C
XML Injection

<0:2.16.0-22.el5
  • C
Cross-site Scripting (XSS)

<0:2.16.0-22.el5
  • C
Numeric Errors

<0:2.16.0-22.el5
  • C
Improper Input Validation

<0:2.16.0-22.el5
  • C
CVE-2008-4063

<0:2.16.0-21.el5
  • C
Directory Traversal

<0:2.16.0-21.el5
  • C
Cross-site Scripting (XSS)

<0:2.16.0-21.el5
  • C
CVE-2008-3837

<0:2.16.0-21.el5
  • C
Resource Management Errors

<0:2.16.0-21.el5
  • C
Access Restriction Bypass

<0:2.16.0-19.el5
  • C
Access Restriction Bypass

<0:2.16.0-21.el5
  • C
Numeric Errors

<0:2.16.0-21.el5
  • C
Improper Input Validation

<0:2.16.0-19.el5
  • C
Resource Management Errors

<0:2.16.0-21.el5
  • C
Directory Traversal

<0:2.16.0-21.el5
  • C
Arbitrary Code Injection

<0:2.16.0-20.el5
  • C
Improper Authentication

<0:2.16.0-19.el5
  • C
Improper Input Validation

<0:2.16.0-20.el5
  • C
Access Restriction Bypass

<0:2.16.0-19.el5
  • C
Access Restriction Bypass

<0:2.16.0-21.el5
  • C
Cross-site Scripting (XSS)

<0:2.16.0-19.el5
  • C
Numeric Errors

<0:2.16.0-20.el5
  • C
Resource Management Errors

<0:2.16.0-19.el5
  • C
Resource Management Errors

<0:2.16.0-19.el5
  • C
Information Exposure

<0:2.16.0-19.el5
  • C
Resource Management Errors

<0:2.16.0-19.el5
  • C
Cross-site Scripting (XSS)

<0:2.16.0-19.el5
  • C
CVE-2007-2869

<0:2.16.0-15.el5
  • C
Arbitrary Code Injection

<0:2.16.0-15.el5
  • C
Improper Input Validation

<0:2.16.0-15.el5
  • C
CVE-2007-2870

<0:2.16.0-15.el5
  • C
CVE-2007-2871

<0:2.16.0-15.el5
  • C
Information Exposure

<0:2.16.0-15.el5
  • C
Out-of-Bounds

<0:2.16.0-15.el5