xulrunner-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xulrunner-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
ELSA-2011-1268

<0:1.9.2.22-1.0.1.el5_7
  • H
ELSA-2011-1242

<0:1.9.2.20-3.0.1.el5_7
  • H
ELSA-2011-0373

<0:1.9.2.15-2.0.1.el5_6
  • C
CVE-2013-5597

<0:17.0.10-1.0.1.el5_10
  • C
CVE-2013-5590

<0:17.0.10-1.0.1.el5_10
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el5_10
  • C
CVE-2013-5599

<0:17.0.10-1.0.1.el5_10
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el5_10
  • C
CVE-2013-5601

<0:17.0.10-1.0.1.el5_10
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el5_10
  • C
CVE-2013-5600

<0:17.0.10-1.0.1.el5_10
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el5_9
  • C
Improper Input Validation

<0:17.0.9-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.9-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.9-1.0.1.el5_9
  • C
CVE-2013-1701

<0:17.0.8-3.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.8-3.0.1.el5_9
  • C
Cross-site Scripting (XSS)

<0:17.0.8-3.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.8-3.0.1.el5_9
  • C
Improper Input Validation

<0:17.0.8-3.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.8-3.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el5_9
  • C
CVE-2013-1682

<0:17.0.7-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el5_9
  • C
Improper Input Validation

<0:17.0.7-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.7-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.6-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.6-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el5_9
  • C
Cross-site Scripting (XSS)

<0:17.0.6-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.6-1.0.1.el5_9
  • C
Improper Initialization

<0:17.0.6-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el5_9
  • C
CVE-2013-0801

<0:17.0.6-1.0.1.el5_9
  • C
CVE-2013-0796

<0:17.0.5-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.5-1.0.1.el5_9
  • C
CVE-2013-0800

<0:17.0.5-1.0.1.el5_9
  • C
CVE-2013-0788

<0:17.0.5-1.0.1.el5_9
  • C
Cross-site Scripting (XSS)

<0:17.0.5-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.3-2.0.1.el5_9
  • C
Out-of-bounds Write

<0:17.0.3-1.0.1.el5_9
  • C
CVE-2013-0783

<0:17.0.3-1.0.1.el5_9
  • C
Use After Free

<0:17.0.3-1.0.1.el5_9
  • C
Use After Free

<0:17.0.3-1.0.1.el5_9
  • C
Improper Certificate Validation

<0:17.0.3-1.0.1.el5_9
  • C
CVE-2013-0746

<0:10.0.12-1.0.1.el5_9
  • C
Information Exposure

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.12-1.0.1.el5_9
  • C
Arbitrary Code Injection

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.12-1.0.1.el5_9
  • C
CVE-2013-0769

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.8-1.0.1.el5_8
  • C
Integer Overflow or Wraparound

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.8-1.0.1.el5_8
  • C
Improper Authentication

<0:10.0.12-1.0.1.el5_9
  • C
Out-of-bounds Read

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.12-1.0.1.el5_9
  • C
Out-of-Bounds

<0:10.0.11-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el5_8
  • C
Use After Free

<0:10.0.11-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el5_8
  • C
Integer Overflow or Wraparound

<0:10.0.11-1.0.1.el5_8
  • C
Use After Free

<0:10.0.11-1.0.1.el5_8
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el5_8
  • C
Use After Free

<0:10.0.11-1.0.1.el5_8
  • C
CVE-2012-5842

<0:10.0.11-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el5_8
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el5_8
  • C
Use After Free

<0:10.0.11-1.0.1.el5_8
  • C
Use After Free

<0:10.0.11-1.0.1.el5_8
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.11-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.10-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.10-1.0.1.el5_8
  • C
Arbitrary Code Injection

<0:10.0.10-1.0.1.el5_8
  • C
Use After Free

<0:10.0.8-1.0.1.el5_8
  • C
Out-of-bounds Read

<0:10.0.8-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el5_8
  • C
Origin Validation Error

<0:10.0.8-2.0.1.el5_8
  • C
Improper Privilege Management

<0:10.0.8-1.0.1.el5_8
  • C
CVE-2012-3982

<0:10.0.8-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el5_8
  • C
Use After Free

<0:10.0.8-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el5_8
  • C
Improper Input Validation

<0:10.0.8-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el5_8
  • C
Use After Free

<0:10.0.8-1.0.1.el5_8
  • C
Use After Free

<0:10.0.8-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.8-1.0.1.el5_8
  • C
Use After Free

<0:10.0.7-2.0.1.el5_8
  • C
Use After Free

<0:10.0.7-2.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.7-2.0.1.el5_8
  • C
Use After Free

<0:10.0.7-2.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.7-2.0.1.el5_8
  • C
Out-of-bounds Write

<0:10.0.7-2.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.7-2.0.1.el5_8
  • C
Use After Free

<0:10.0.7-2.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.7-2.0.1.el5_8
  • C
Use After Free

<0:10.0.7-2.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.7-2.0.1.el5_8
  • C
CVE-2012-3962

<0:10.0.7-2.0.1.el5_8
  • C
Numeric Errors

<0:10.0.7-2.0.1.el5_8
  • C
Arbitrary Code Injection

<0:10.0.7-2.0.1.el5_8
  • C
Information Exposure

<0:10.0.7-2.0.1.el5_8
  • C
Use After Free

<0:10.0.7-2.0.1.el5_8
  • C
Information Exposure

<0:10.0.7-2.0.1.el5_8
  • C
Use After Free

<0:10.0.7-2.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.7-2.0.1.el5_8
  • C
Use After Free

<0:10.0.7-2.0.1.el5_8
  • C
Use After Free

<0:10.0.7-2.0.1.el5_8
  • C
Use After Free

<0:10.0.7-2.0.1.el5_8
  • C
Out-of-bounds Write

<0:10.0.7-2.0.1.el5_8
  • C
Use After Free

<0:10.0.7-2.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.6-2.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.6-2.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.6-2.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.6-2.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.6-2.0.1.el5_8
  • C
CVE-2012-1955

<0:10.0.6-2.0.1.el5_8
  • C
CVE-2012-1967

<0:10.0.6-2.0.1.el5_8
  • C
CVE-2012-1964

<0:10.0.6-2.0.1.el5_8
  • C
CVE-2012-1948

<0:10.0.6-2.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.6-2.0.1.el5_8
  • C
Improper Input Validation

<0:10.0.6-2.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.6-2.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.6-2.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.6-2.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.6-2.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.6-2.0.1.el5_8
  • C
CVE-2012-1950

<0:10.0.6-2.0.1.el5_8
  • C
CVE-2011-3101

<0:10.0.5-1.0.1.el5_8
  • C
CVE-2012-1938

<0:10.0.5-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.5-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.5-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.5-1.0.1.el5_8
  • C
Information Exposure

<0:10.0.5-1.0.1.el5_8
  • C
CVE-2012-1937

<0:10.0.5-1.0.1.el5_8
  • C
CVE-2012-0479

<0:10.0.4-1.0.1.el5_8
  • C
Incorrect Calculation

<0:10.0.4-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.4-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.4-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el5_8
  • C
Numeric Errors

<0:10.0.4-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el5_8
  • C
CVE-2012-0467

<0:10.0.4-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.3-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.3-1.0.1.el5_8
  • C
Information Exposure

<0:10.0.3-1.0.1.el5_8
  • C
Arbitrary Code Injection

<0:10.0.3-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el5_8
  • C
CVE-2012-0461

<0:10.0.3-1.0.1.el5_8
  • C
CVE-2012-0462

<0:10.0.3-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.3-1.0.1.el5_8
  • C
Integer Overflow or Wraparound

<0:1.9.2.26-2.0.1.el5_7
  • C
Out-of-Bounds

<0:1.9.2.26-1.0.1.el5_7
  • C
CVE-2012-0442

<0:1.9.2.26-1.0.1.el5_7
  • C
Use After Free

<0:1.9.2.26-1.0.1.el5_7
  • C
Information Exposure

<0:1.9.2.26-1.0.1.el5_7
  • C
Out-of-Bounds

<0:1.9.2.26-1.0.1.el5_7
  • C
Cross-site Scripting (XSS)

<0:1.9.2.24-2.0.1.el5_7
  • C
Out-of-Bounds

<0:1.9.2.24-2.0.1.el5_7
  • C
Improper Input Validation

<0:1.9.2.24-2.0.1.el5_7
  • C
Arbitrary Code Injection

<0:1.9.2.20-2.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.2.23-1.0.1.el5_7
  • C
Numeric Errors

<0:1.9.2.23-1.0.1.el5_7
  • C
Arbitrary Code Injection

<0:1.9.2.23-1.0.1.el5_7
  • C
Access Restriction Bypass

<0:1.9.2.23-1.0.1.el5_7
  • C
Information Exposure

<0:1.9.2.20-2.0.1.el5
  • C
CVE-2011-2995

<0:1.9.2.23-1.0.1.el5_7
  • C
Configuration

<0:1.9.2.20-2.0.1.el5
  • C
CVE-2011-2982

<0:1.9.2.20-2.0.1.el5
  • C
Arbitrary Code Injection

<0:1.9.2.20-2.0.1.el5
  • C
Arbitrary Code Injection

<0:1.9.2.20-2.0.1.el5
  • C
Arbitrary Code Injection

<0:1.9.2.18-2.0.1.el5_6
  • C
CVE-2011-0074

<0:1.9.2.17-3.0.1.el5_6
  • C
Resource Management Errors

<0:1.9.2.18-2.0.1.el5_6
  • C
Resource Management Errors

<0:1.9.2.18-2.0.1.el5_6
  • C
Resource Management Errors

<0:1.9.2.18-2.0.1.el5_6
  • C
CVE-2011-2375

<0:1.9.2.18-2.0.1.el5_6
  • C
Resource Management Errors

<0:1.9.2.18-2.0.1.el5_6
  • C
Numeric Errors

<0:1.9.2.18-2.0.1.el5_6
  • C
Access Restriction Bypass

<0:1.9.2.18-2.0.1.el5_6
  • C
Out-of-Bounds

<0:1.9.2.18-2.0.1.el5_6
  • C
CVE-2011-2376

<0:1.9.2.18-2.0.1.el5_6
  • C
CVE-2011-2374

<0:1.9.2.18-2.0.1.el5_6
  • C
CVE-2011-2364

<0:1.9.2.18-2.0.1.el5_6
  • C
CVE-2011-2365

<0:1.9.2.18-2.0.1.el5_6
  • C
Resource Management Errors

<0:1.9.2.17-3.0.1.el5_6
  • C
CVE-2011-0080

<0:1.9.2.17-3.0.1.el5_6
  • C
CVE-2011-0075

<0:1.9.2.17-3.0.1.el5_6
  • C
Directory Traversal

<0:1.9.2.17-3.0.1.el5_6
  • C
Improper Input Validation

<0:1.9.2.17-3.0.1.el5_6
  • C
Improper Input Validation

<0:1.9.2.14-4.0.1.el5_6
  • C
CVE-2011-0070

<0:1.9.2.17-3.0.1.el5_6
  • C
Improper Input Validation

<0:1.9.2.17-3.0.1.el5_6
  • C
Improper Input Validation

<0:1.9.2.14-4.0.1.el5_6
  • C
CVE-2011-0069

<0:1.9.2.17-3.0.1.el5_6
  • C
CVE-2011-0081

<0:1.9.2.17-3.0.1.el5_6
  • C
CVE-2011-0072

<0:1.9.2.17-3.0.1.el5_6
  • C
CVE-2011-0078

<0:1.9.2.17-3.0.1.el5_6
  • C
CVE-2011-0077

<0:1.9.2.17-3.0.1.el5_6
  • C
Resource Management Errors

<0:1.9.2.17-3.0.1.el5_6
  • C
Information Exposure

<0:1.9.2.17-3.0.1.el5_6
  • C
Cross-site Request Forgery (CSRF)

<0:1.9.2.14-4.0.1.el5_6
  • C
Resource Management Errors

<0:1.9.2.14-4.0.1.el5_6
  • C
Out-of-Bounds

<0:1.9.2.14-4.0.1.el5_6
  • C
Out-of-Bounds

<0:1.9.2.14-4.0.1.el5_6
  • C
CVE-2011-0062

<0:1.9.2.14-4.0.1.el5_6
  • C
Out-of-Bounds

<0:1.9.2.14-4.0.1.el5_6
  • C
Resource Management Errors

<0:1.9.2.14-4.0.1.el5_6
  • C
Out-of-Bounds

<0:1.9.2.14-4.0.1.el5_6
  • C
CVE-2011-0053

<0:1.9.2.14-4.0.1.el5_6
  • C
Access Restriction Bypass

<0:1.9.2.7-2.0.1.el5
  • C
Buffer Overflow

<0:1.9.2.7-2.0.1.el5
  • C
CVE-2010-3771

<0:1.9.2.13-3.0.1.el5
  • C
Numeric Errors

<0:1.9.2.13-3.0.1.el5
  • C
CVE-2010-3773

<0:1.9.2.13-3.0.1.el5
  • C
Numeric Errors

<0:1.9.2.7-2.0.1.el5
  • C
Improper Input Validation

<0:1.9.2.7-2.0.1.el5
  • C
Out-of-Bounds

<0:1.9.2.13-3.0.1.el5
  • C
Improper Input Validation

<0:1.9.2.13-3.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.2.13-3.0.1.el5
  • C
Numeric Errors

<0:1.9.2.13-3.0.1.el5
  • C
Resource Management Errors

<0:1.9.2.13-3.0.1.el5
  • C
CVE-2010-3775

<0:1.9.2.13-3.0.1.el5
  • C
Out-of-Bounds

<0:1.9.2.13-3.0.1.el5
  • C
Improper Input Validation

<0:1.9.2.13-3.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.2.11-2.0.1.el5
  • C
CVE-2010-3176

<0:1.9.2.11-2.0.1.el5
  • C
Out-of-Bounds

<0:1.9.2.11-4.0.1.el5_5
  • C
Out-of-Bounds

<0:1.9.2.11-2.0.1.el5
  • C
Out-of-Bounds

<0:1.9.2.9-1.0.1.el5
  • C
Out-of-Bounds

<0:1.9.2.9-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.2.11-2.0.1.el5
  • C
CVE-2010-3182

<0:1.9.2.11-2.0.1.el5
  • C
Resource Management Errors

<0:1.9.2.11-2.0.1.el5
  • C
Out-of-Bounds

<0:1.9.2.11-2.0.1.el5
  • C
Cryptographic Issues

<0:1.9.2.11-2.0.1.el5
  • C
Cryptographic Issues

<0:1.9.2.11-2.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.2.9-1.0.1.el5
  • C
Numeric Errors

<0:1.9.2.9-1.0.1.el5
  • C
CVE-2010-3175

<0:1.9.2.11-2.0.1.el5
  • C
CVE-2010-3169

<0:1.9.2.9-1.0.1.el5
  • C
Out-of-Bounds

<0:1.9.2.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.2.9-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.2.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.2.9-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.2.9-1.0.1.el5
  • C
Use After Free

<0:1.9.2.7-2.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.2.7-2.0.1.el5
  • C
Improper Input Validation

<0:1.9.2.7-2.0.1.el5
  • C
Resource Management Errors

<0:1.9.2.7-2.0.1.el5
  • C
Resource Management Errors

<0:1.9.2.7-3.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.2.7-2.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.2.9-1.0.1.el5
  • C
Arbitrary Code Injection

<0:1.9.2.7-2.0.1.el5
  • C
CVE-2010-1211

<0:1.9.2.7-2.0.1.el5
  • C
Arbitrary Code Injection

<0:1.9.2.9-1.0.1.el5
  • C
Out-of-Bounds

<0:1.9.2.7-2.0.1.el5
  • C
Information Exposure

<0:1.9.2.7-2.0.1.el5
  • C
Information Exposure

<0:1.9.2.7-2.0.1.el5
  • C
Integer Overflow or Wraparound

<0:1.9.2.7-2.0.1.el5
  • C
Numeric Errors

<0:1.9.2.7-2.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.0.11-3.0.1.el5_3
  • C
CVE-2010-1202

<0:1.9.2.4-9.0.1.el5
  • C
CVE-2010-1200

<0:1.9.2.4-9.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.2.4-9.0.1.el5
  • C
CVE-2010-1203

<0:1.9.2.4-9.0.1.el5
  • C
CVE-2008-5913

<0:1.9.2.4-9.0.1.el5
  • C
Information Exposure

<0:1.9.2.4-9.0.1.el5
  • C
Improper Input Validation

<0:1.9.2.4-9.0.1.el5
  • C
Numeric Errors

<0:1.9.2.4-9.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.2.4-9.0.1.el5
  • C
Arbitrary Code Injection

<0:1.9.2.4-9.0.1.el5
  • C
Resource Management Errors

<0:1.9.2.4-9.0.1.el5
  • C
Numeric Errors

<0:1.9.2.4-9.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.19-1.0.1.el5_5
  • C
Arbitrary Code Injection

<0:1.9.0.19-1.0.1.el5_5
  • C
Resource Management Errors

<0:1.9.0.19-1.0.1.el5_5
  • C
Resource Management Errors

<0:1.9.0.19-1.0.1.el5_5
  • C
CVE-2010-0174

<0:1.9.0.19-1.0.1.el5_5
  • C
Arbitrary Code Injection

<0:1.9.0.19-1.0.1.el5_5
  • C
Access Restriction Bypass

<0:1.9.0.18-1.0.1.el5_4
  • C
Cross-site Scripting (XSS)

<0:1.9.0.18-1.0.1.el5_4
  • C
Arbitrary Code Injection

<0:1.9.0.18-1.0.1.el5_4
  • C
CVE-2010-0169

<0:1.9.0.18-1.0.1.el5_4
  • C
Resource Management Errors

<0:1.9.0.18-1.0.1.el5_4
  • C
Cross-site Scripting (XSS)

<0:1.9.0.18-1.0.1.el5_4
  • C
Out-of-Bounds

<0:1.9.0.18-1.0.1.el5_4
  • C
CVE-2010-0159

<0:1.9.0.18-1.0.1.el5_4
  • C
CVE-2009-3984

<0:1.9.0.16-2.0.1.el5_4
  • C
CVE-2009-3979

<0:1.9.0.16-2.0.1.el5_4
  • C
CVE-2009-3985

<0:1.9.0.16-2.0.1.el5_4
  • C
Arbitrary Code Injection

<0:1.9.0.16-2.0.1.el5_4
  • C
CVE-2009-3983

<0:1.9.0.16-2.0.1.el5_4
  • C
CVE-2009-3981

<0:1.9.0.16-2.0.1.el5_4
  • C
CVE-2009-3274

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3372

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3370

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3382

<0:1.9.0.15-3.0.1.el5_4
  • C
Access Restriction Bypass

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3076

<0:1.9.0.14-1.0.1.el5_4
  • C
Access Restriction Bypass

<0:1.9.0.15-3.0.1.el5_4
  • C
Arbitrary Code Injection

<0:1.9.0.14-1.0.1.el5_4
  • C
CVE-2009-3380

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3384

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-1563

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3075

<0:1.9.0.14-1.0.1.el5_4
  • C
Out-of-Bounds

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3074

<0:1.9.0.14-1.0.1.el5_4
  • C
Arbitrary Code Injection

<0:1.9.0.14-1.0.1.el5_4
  • C
CVE-2009-3071

<0:1.9.0.14-1.0.1.el5_4
  • C
Improper Input Validation

<0:1.9.0.14-1.0.1.el5_4
  • C
CVE-2009-3070

<0:1.9.0.14-1.0.1.el5_4
  • C
Configuration

<0:1.9.0.15-3.0.1.el5_4
  • C
Improper Input Validation

<0:1.9.0.14-1.0.1.el5_4
  • C
CVE-2009-3072

<0:1.9.0.14-1.0.1.el5_4
  • C
Resource Management Errors

<0:1.9.0.7-1.0.1.el5
  • C
Access of Uninitialized Pointer

<0:1.9.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
CVE-2009-2467

<0:1.9.0.12-1.0.1.el5_3
  • C
Numeric Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Improper Input Validation

<0:1.9.0.12-1.0.1.el5_3
  • C
CVE-2009-2471

<0:1.9.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Improper Input Validation

<0:1.9.0.11-3.0.1.el5_3
  • C
Arbitrary Code Injection

<0:1.9.0.11-3.0.1.el5_3
  • C
Access Restriction Bypass

<0:1.9.0.11-3.0.1.el5_3
  • C
Arbitrary Code Injection

<0:1.9.0.11-3.0.1.el5_3
  • C
Arbitrary Code Injection

<0:1.9.0.11-3.0.1.el5_3
  • C
Cross-site Scripting (XSS)

<0:1.9.0.12-1.0.1.el5_3
  • C
Race Condition

<0:1.9.0.11-3.0.1.el5_3
  • C
Information Exposure

<0:1.9.0.11-3.0.1.el5_3
  • C
Arbitrary Code Injection

<0:1.9.0.11-3.0.1.el5_3
  • C
Arbitrary Code Injection

<0:1.9.0.11-3.0.1.el5_3
  • C
Improper Input Validation

<0:1.9.0.9-1.0.1.el5
  • C
Configuration

<0:1.9.0.9-1.0.1.el5
  • C
Configuration

<0:1.9.0.9-1.0.1.el5
  • C
Improper Authentication

<0:1.9.0.11-3.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.10-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.9-1.0.1.el5
  • C
CVE-2009-0652

<0:1.9.0.9-1.0.1.el5
  • C
Configuration

<0:1.9.0.9-1.0.1.el5
  • C
Information Exposure

<0:1.9.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.9-1.0.1.el5
  • C
Configuration

<0:1.9.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-3.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-3.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-1.0.1.el5
  • C
Improper Input Validation

<0:1.9.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-1.0.1.el5
  • C
Information Exposure

<0:1.9.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-1.0.1.el5
  • C
Improper Input Validation

<0:1.9-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9-1.0.1.el5
  • C
Link Following

<0:1.9.0.6-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.0.6-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.6-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.6-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.6-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.0.6-1.0.1.el5
  • C
CVE-2008-5501

<0:1.9.0.5-1.0.1.el5_2
  • C
Information Exposure

<0:1.9.0.6-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.5-1.0.1.el5_2
  • C
Information Exposure

<0:1.9.0.5-1.0.1.el5_2
  • C
CVE-2008-5510

<0:1.9.0.5-1.0.1.el5_2
  • C
Access Restriction Bypass

<0:1.9.0.5-1.0.1.el5_2
  • C
Access Restriction Bypass

<0:1.9.0.5-1.0.1.el5_2
  • C
Improper Input Validation

<0:1.9.0.5-1.0.1.el5_2
  • C
Access Restriction Bypass

<0:1.9.0.5-1.0.1.el5_2
  • C
Cross-site Scripting (XSS)

<0:1.9.0.5-1.0.1.el5_2
  • C
Resource Management Errors

<0:1.9.0.5-1.0.1.el5_2
  • C
Improper Input Validation

<0:1.9.0.4-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.4-1.0.1.el5
  • C
Race Condition

<0:1.9.0.4-1.0.1.el5
  • C
Arbitrary Code Injection

<0:1.9.0.4-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.5-1.0.1.el5_2
  • C
Improper Authentication

<0:1.9.0.4-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.4-1.0.1.el5
  • C
Out-of-Bounds

<0:1.9.0.4-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.4-1.0.1.el5
  • C
XML Injection

<0:1.9.0.4-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.4-1.0.1.el5
  • C
Numeric Errors

<0:1.9.0.4-1.0.1.el5
  • C
Improper Input Validation

<0:1.9.0.4-1.0.1.el5
  • C
CVE-2008-4063

<0:1.9.0.2-5.0.1.el5
  • C
Directory Traversal

<0:1.9.0.2-5.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.2-5.0.1.el5
  • C
CVE-2008-3837

<0:1.9.0.2-5.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.2-5.0.1.el5
  • C
Access Restriction Bypass

<0:1.9-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.0.2-5.0.1.el5
  • C
Numeric Errors

<0:1.9.0.2-5.0.1.el5
  • C
Improper Input Validation

<0:1.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.2-5.0.1.el5
  • C
Directory Traversal

<0:1.9.0.2-5.0.1.el5
  • C
Arbitrary Code Injection

<0:1.9.0.1-1.0.1.el5
  • C
Improper Authentication

<0:1.9-1.0.1.el5
  • C
Improper Input Validation

<0:1.9.0.1-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.0.2-5.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9-1.0.1.el5
  • C
Numeric Errors

<0:1.9.0.1-1.0.1.el5
  • C
Resource Management Errors

<0:1.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9-1.0.1.el5
  • C
Information Exposure

<0:1.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9-1.0.1.el5