xulrunner-devel-unstable vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xulrunner-devel-unstable package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Access Restriction Bypass

<0:1.9.0.11-3.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.19-1.0.1.el5_5
  • C
Arbitrary Code Injection

<0:1.9.0.19-1.0.1.el5_5
  • C
Resource Management Errors

<0:1.9.0.19-1.0.1.el5_5
  • C
Resource Management Errors

<0:1.9.0.19-1.0.1.el5_5
  • C
CVE-2010-0174

<0:1.9.0.19-1.0.1.el5_5
  • C
Arbitrary Code Injection

<0:1.9.0.19-1.0.1.el5_5
  • C
Access Restriction Bypass

<0:1.9.0.18-1.0.1.el5_4
  • C
Cross-site Scripting (XSS)

<0:1.9.0.18-1.0.1.el5_4
  • C
Arbitrary Code Injection

<0:1.9.0.18-1.0.1.el5_4
  • C
CVE-2010-0169

<0:1.9.0.18-1.0.1.el5_4
  • C
Resource Management Errors

<0:1.9.0.18-1.0.1.el5_4
  • C
Cross-site Scripting (XSS)

<0:1.9.0.18-1.0.1.el5_4
  • C
Out-of-Bounds

<0:1.9.0.18-1.0.1.el5_4
  • C
CVE-2010-0159

<0:1.9.0.18-1.0.1.el5_4
  • C
CVE-2009-3984

<0:1.9.0.16-2.0.1.el5_4
  • C
CVE-2009-3979

<0:1.9.0.16-2.0.1.el5_4
  • C
CVE-2009-3985

<0:1.9.0.16-2.0.1.el5_4
  • C
Arbitrary Code Injection

<0:1.9.0.16-2.0.1.el5_4
  • C
CVE-2009-3983

<0:1.9.0.16-2.0.1.el5_4
  • C
CVE-2009-3981

<0:1.9.0.16-2.0.1.el5_4
  • C
CVE-2009-3274

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3372

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3370

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3382

<0:1.9.0.15-3.0.1.el5_4
  • C
Access Restriction Bypass

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3076

<0:1.9.0.14-1.0.1.el5_4
  • C
Access Restriction Bypass

<0:1.9.0.15-3.0.1.el5_4
  • C
Arbitrary Code Injection

<0:1.9.0.14-1.0.1.el5_4
  • C
CVE-2009-3380

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3384

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-1563

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3075

<0:1.9.0.14-1.0.1.el5_4
  • C
Out-of-Bounds

<0:1.9.0.15-3.0.1.el5_4
  • C
CVE-2009-3074

<0:1.9.0.14-1.0.1.el5_4
  • C
Arbitrary Code Injection

<0:1.9.0.14-1.0.1.el5_4
  • C
CVE-2009-3071

<0:1.9.0.14-1.0.1.el5_4
  • C
Improper Input Validation

<0:1.9.0.14-1.0.1.el5_4
  • C
CVE-2009-3070

<0:1.9.0.14-1.0.1.el5_4
  • C
Configuration

<0:1.9.0.15-3.0.1.el5_4
  • C
Improper Input Validation

<0:1.9.0.14-1.0.1.el5_4
  • C
CVE-2009-3072

<0:1.9.0.14-1.0.1.el5_4
  • C
Resource Management Errors

<0:1.9.0.7-1.0.1.el5
  • C
Access of Uninitialized Pointer

<0:1.9.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
CVE-2009-2467

<0:1.9.0.12-1.0.1.el5_3
  • C
Numeric Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Improper Input Validation

<0:1.9.0.12-1.0.1.el5_3
  • C
CVE-2009-2471

<0:1.9.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.12-1.0.1.el5_3
  • C
Improper Input Validation

<0:1.9.0.11-3.0.1.el5_3
  • C
Arbitrary Code Injection

<0:1.9.0.11-3.0.1.el5_3
  • C
Access Restriction Bypass

<0:1.9.0.11-3.0.1.el5_3
  • C
Arbitrary Code Injection

<0:1.9.0.11-3.0.1.el5_3
  • C
Arbitrary Code Injection

<0:1.9.0.11-3.0.1.el5_3
  • C
Cross-site Scripting (XSS)

<0:1.9.0.12-1.0.1.el5_3
  • C
Race Condition

<0:1.9.0.11-3.0.1.el5_3
  • C
Information Exposure

<0:1.9.0.11-3.0.1.el5_3
  • C
Arbitrary Code Injection

<0:1.9.0.11-3.0.1.el5_3
  • C
Arbitrary Code Injection

<0:1.9.0.11-3.0.1.el5_3
  • C
Improper Input Validation

<0:1.9.0.9-1.0.1.el5
  • C
Configuration

<0:1.9.0.9-1.0.1.el5
  • C
Configuration

<0:1.9.0.9-1.0.1.el5
  • C
Improper Authentication

<0:1.9.0.11-3.0.1.el5_3
  • C
Resource Management Errors

<0:1.9.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.10-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.9-1.0.1.el5
  • C
CVE-2009-0652

<0:1.9.0.9-1.0.1.el5
  • C
Configuration

<0:1.9.0.9-1.0.1.el5
  • C
Information Exposure

<0:1.9.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.9-1.0.1.el5
  • C
Configuration

<0:1.9.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-3.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-3.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-1.0.1.el5
  • C
Improper Input Validation

<0:1.9.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-1.0.1.el5
  • C
Information Exposure

<0:1.9.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.7-1.0.1.el5
  • C
Improper Input Validation

<0:1.9-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9-1.0.1.el5
  • C
Link Following

<0:1.9.0.6-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.0.6-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.6-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.6-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.6-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.0.6-1.0.1.el5
  • C
CVE-2008-5501

<0:1.9.0.5-1.0.1.el5_2
  • C
Information Exposure

<0:1.9.0.6-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.5-1.0.1.el5_2
  • C
Information Exposure

<0:1.9.0.5-1.0.1.el5_2
  • C
CVE-2008-5510

<0:1.9.0.5-1.0.1.el5_2
  • C
Access Restriction Bypass

<0:1.9.0.5-1.0.1.el5_2
  • C
Access Restriction Bypass

<0:1.9.0.5-1.0.1.el5_2
  • C
Improper Input Validation

<0:1.9.0.5-1.0.1.el5_2
  • C
Access Restriction Bypass

<0:1.9.0.5-1.0.1.el5_2
  • C
Cross-site Scripting (XSS)

<0:1.9.0.5-1.0.1.el5_2
  • C
Resource Management Errors

<0:1.9.0.5-1.0.1.el5_2
  • C
Improper Input Validation

<0:1.9.0.4-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.4-1.0.1.el5
  • C
Race Condition

<0:1.9.0.4-1.0.1.el5
  • C
Arbitrary Code Injection

<0:1.9.0.4-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.5-1.0.1.el5_2
  • C
Improper Authentication

<0:1.9.0.4-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.4-1.0.1.el5
  • C
Out-of-Bounds

<0:1.9.0.4-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.4-1.0.1.el5
  • C
XML Injection

<0:1.9.0.4-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.4-1.0.1.el5
  • C
Numeric Errors

<0:1.9.0.4-1.0.1.el5
  • C
Improper Input Validation

<0:1.9.0.4-1.0.1.el5
  • C
CVE-2008-4063

<0:1.9.0.2-5.0.1.el5
  • C
Directory Traversal

<0:1.9.0.2-5.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9.0.2-5.0.1.el5
  • C
CVE-2008-3837

<0:1.9.0.2-5.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.2-5.0.1.el5
  • C
Access Restriction Bypass

<0:1.9-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.0.2-5.0.1.el5
  • C
Numeric Errors

<0:1.9.0.2-5.0.1.el5
  • C
Improper Input Validation

<0:1.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9.0.2-5.0.1.el5
  • C
Directory Traversal

<0:1.9.0.2-5.0.1.el5
  • C
Arbitrary Code Injection

<0:1.9.0.1-1.0.1.el5
  • C
Improper Authentication

<0:1.9-1.0.1.el5
  • C
Improper Input Validation

<0:1.9.0.1-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9-1.0.1.el5
  • C
Access Restriction Bypass

<0:1.9.0.2-5.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9-1.0.1.el5
  • C
Numeric Errors

<0:1.9.0.1-1.0.1.el5
  • C
Resource Management Errors

<0:1.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9-1.0.1.el5
  • C
Information Exposure

<0:1.9-1.0.1.el5
  • C
Resource Management Errors

<0:1.9-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:1.9-1.0.1.el5