xulrunner vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xulrunner package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
ELSA-2011-1268

<0:1.9.2.22-1.0.1.el6_1
  • H
ELSA-2011-1242

<0:1.9.2.20-3.0.1.el6_1
  • H
ELSA-2011-0373

<0:1.9.2.15-2.0.1.el6_0
  • C
CVE-2013-5597

<0:17.0.10-1.0.1.el6_4
  • C
CVE-2013-5590

<0:17.0.10-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el6_4
  • C
CVE-2013-5599

<0:17.0.10-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el6_4
  • C
CVE-2013-5601

<0:17.0.10-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el6_4
  • C
CVE-2013-5600

<0:17.0.10-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • C
Improper Input Validation

<0:17.0.9-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.9-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.9-1.0.1.el6_4
  • C
CVE-2013-1701

<0:17.0.8-3.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.8-3.0.1.el6_4
  • C
Cross-site Scripting (XSS)

<0:17.0.8-3.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.8-3.0.1.el6_4
  • C
Improper Input Validation

<0:17.0.8-3.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.8-3.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • C
CVE-2013-1682

<0:17.0.7-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el6_4
  • C
Improper Input Validation

<0:17.0.7-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.7-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.6-2.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.6-2.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.6-2.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.6-2.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.6-2.0.1.el6_4
  • C
Cross-site Scripting (XSS)

<0:17.0.6-2.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.6-2.0.1.el6_4
  • C
Improper Initialization

<0:17.0.6-2.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.6-2.0.1.el6_4
  • C
CVE-2013-0801

<0:17.0.6-2.0.1.el6_4
  • C
CVE-2013-0796

<0:17.0.5-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.5-1.0.1.el6_4
  • C
CVE-2013-0800

<0:17.0.5-1.0.1.el6_4
  • C
CVE-2013-0788

<0:17.0.5-1.0.1.el6_4
  • C
Cross-site Scripting (XSS)

<0:17.0.5-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.3-2.0.1.el6_4
  • C
Out-of-bounds Write

<0:17.0.3-1.0.2.el6_3
  • C
CVE-2013-0783

<0:17.0.3-1.0.2.el6_3
  • C
Use After Free

<0:17.0.3-1.0.2.el6_3
  • C
Use After Free

<0:17.0.3-1.0.2.el6_3
  • C
Improper Certificate Validation

<0:17.0.3-1.0.2.el6_3
  • C
CVE-2013-0746

<0:10.0.12-1.0.1.el6_3
  • C
Information Exposure

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.12-1.0.1.el6_3
  • C
Arbitrary Code Injection

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.12-1.0.1.el6_3
  • C
CVE-2013-0769

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Integer Overflow or Wraparound

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Improper Authentication

<0:10.0.12-1.0.1.el6_3
  • C
Out-of-bounds Read

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.12-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Integer Overflow or Wraparound

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
CVE-2012-5842

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.10-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.10-1.0.1.el6_3
  • C
Arbitrary Code Injection

<0:10.0.10-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-bounds Read

<0:10.0.8-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el6_3
  • C
Origin Validation Error

<0:10.0.8-2.0.1.el6_3
  • C
Improper Privilege Management

<0:10.0.8-1.0.1.el6_3
  • C
CVE-2012-3982

<0:10.0.8-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el6_3
  • C
Improper Input Validation

<0:10.0.8-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.8-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el6_3
  • C
CVE-2012-3962

<0:10.0.7-1.0.1.el6_3
  • C
Numeric Errors

<0:10.0.7-1.0.1.el6_3
  • C
Arbitrary Code Injection

<0:10.0.7-1.0.1.el6_3
  • C
Information Exposure

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Information Exposure

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.6-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1955

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1967

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1964

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1948

<0:10.0.6-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.6-1.0.1.el6_3
  • C
Improper Input Validation

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.6-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1950

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2011-3101

<0:10.0.5-1.0.1.el6_2
  • C
CVE-2012-1938

<0:10.0.5-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.5-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.5-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.5-1.0.1.el6_2
  • C
Information Exposure

<0:10.0.5-1.0.1.el6_2
  • C
CVE-2012-1937

<0:10.0.5-1.0.1.el6_2
  • C
CVE-2012-0479

<0:10.0.4-1.0.1.el6_2
  • C
Incorrect Calculation

<0:10.0.4-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.4-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el6_2
  • C
Numeric Errors

<0:10.0.4-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el6_2
  • C
CVE-2012-0467

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.3-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.3-1.0.1.el6_2
  • C
Information Exposure

<0:10.0.3-1.0.1.el6_2
  • C
Arbitrary Code Injection

<0:10.0.3-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el6_2
  • C
CVE-2012-0461

<0:10.0.3-1.0.1.el6_2
  • C
CVE-2012-0462

<0:10.0.3-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.3-1.0.1.el6_2
  • C
Integer Overflow or Wraparound

<0:1.9.2.26-2.0.1.el6_2
  • C
Out-of-Bounds

<0:1.9.2.26-1.0.1.el6_2
  • C
CVE-2012-0442

<0:1.9.2.26-1.0.1.el6_2
  • C
Use After Free

<0:1.9.2.26-1.0.1.el6_2
  • C
Information Exposure

<0:1.9.2.26-1.0.1.el6_2
  • C
Out-of-Bounds

<0:1.9.2.26-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:1.9.2.24-2.0.1.el6_1.1
  • C
Out-of-Bounds

<0:1.9.2.24-2.0.1.el6_1.1
  • C
Improper Input Validation

<0:1.9.2.24-2.0.1.el6_1.1
  • C
Arbitrary Code Injection

<0:1.9.2.20-2.0.1.el6_1
  • C
Access Restriction Bypass

<0:1.9.2.23-1.0.1.el6_1.1
  • C
Numeric Errors

<0:1.9.2.23-1.0.1.el6_1.1
  • C
Arbitrary Code Injection

<0:1.9.2.23-1.0.1.el6_1.1
  • C
Access Restriction Bypass

<0:1.9.2.23-1.0.1.el6_1.1
  • C
Information Exposure

<0:1.9.2.20-2.0.1.el6_1
  • C
CVE-2011-2995

<0:1.9.2.23-1.0.1.el6_1.1
  • C
Configuration

<0:1.9.2.20-2.0.1.el6_1
  • C
CVE-2011-2982

<0:1.9.2.20-2.0.1.el6_1
  • C
Arbitrary Code Injection

<0:1.9.2.20-2.0.1.el6_1
  • C
Arbitrary Code Injection

<0:1.9.2.20-2.0.1.el6_1
  • C
Arbitrary Code Injection

<0:1.9.2.18-2.0.1.el6_1
  • C
CVE-2011-0074

<0:1.9.2.17-4.0.1.el6_0
  • C
Resource Management Errors

<0:1.9.2.18-2.0.1.el6_1
  • C
Resource Management Errors

<0:1.9.2.18-2.0.1.el6_1
  • C
Resource Management Errors

<0:1.9.2.18-2.0.1.el6_1
  • C
CVE-2011-2375

<0:1.9.2.18-2.0.1.el6_1
  • C
Resource Management Errors

<0:1.9.2.18-2.0.1.el6_1
  • C
Numeric Errors

<0:1.9.2.18-2.0.1.el6_1
  • C
Access Restriction Bypass

<0:1.9.2.18-2.0.1.el6_1
  • C
Out-of-Bounds

<0:1.9.2.18-2.0.1.el6_1
  • C
CVE-2011-2376

<0:1.9.2.18-2.0.1.el6_1
  • C
CVE-2011-2374

<0:1.9.2.18-2.0.1.el6_1
  • C
CVE-2011-2364

<0:1.9.2.18-2.0.1.el6_1
  • C
CVE-2011-2365

<0:1.9.2.18-2.0.1.el6_1
  • C
Resource Management Errors

<0:1.9.2.17-4.0.1.el6_0
  • C
CVE-2011-0080

<0:1.9.2.17-4.0.1.el6_0
  • C
CVE-2011-0075

<0:1.9.2.17-4.0.1.el6_0
  • C
Directory Traversal

<0:1.9.2.17-4.0.1.el6_0
  • C
Improper Input Validation

<0:1.9.2.17-4.0.1.el6_0
  • C
Improper Input Validation

<0:1.9.2.14-3.0.1.el6_0
  • C
CVE-2011-0070

<0:1.9.2.17-4.0.1.el6_0
  • C
Improper Input Validation

<0:1.9.2.17-4.0.1.el6_0
  • C
Improper Input Validation

<0:1.9.2.14-3.0.1.el6_0
  • C
CVE-2011-0069

<0:1.9.2.17-4.0.1.el6_0
  • C
CVE-2011-0081

<0:1.9.2.17-4.0.1.el6_0
  • C
CVE-2011-0072

<0:1.9.2.17-4.0.1.el6_0
  • C
CVE-2011-0078

<0:1.9.2.17-4.0.1.el6_0
  • C
CVE-2011-0077

<0:1.9.2.17-4.0.1.el6_0
  • C
Resource Management Errors

<0:1.9.2.17-4.0.1.el6_0
  • C
Information Exposure

<0:1.9.2.17-4.0.1.el6_0
  • C
Cross-site Request Forgery (CSRF)

<0:1.9.2.14-3.0.1.el6_0
  • C
Resource Management Errors

<0:1.9.2.14-3.0.1.el6_0
  • C
Out-of-Bounds

<0:1.9.2.14-3.0.1.el6_0
  • C
Out-of-Bounds

<0:1.9.2.14-3.0.1.el6_0
  • C
CVE-2011-0062

<0:1.9.2.14-3.0.1.el6_0
  • C
Out-of-Bounds

<0:1.9.2.14-3.0.1.el6_0
  • C
Resource Management Errors

<0:1.9.2.14-3.0.1.el6_0
  • C
Out-of-Bounds

<0:1.9.2.14-3.0.1.el6_0
  • C
CVE-2011-0053

<0:1.9.2.14-3.0.1.el6_0
  • C
CVE-2010-3771

<0:1.9.2.13-3.0.1.el6_0
  • C
Numeric Errors

<0:1.9.2.13-3.0.1.el6_0
  • C
CVE-2010-3773

<0:1.9.2.13-3.0.1.el6_0
  • C
Out-of-Bounds

<0:1.9.2.13-3.0.1.el6_0
  • C
Improper Input Validation

<0:1.9.2.13-3.0.1.el6_0
  • C
Cross-site Scripting (XSS)

<0:1.9.2.13-3.0.1.el6_0
  • C
Numeric Errors

<0:1.9.2.13-3.0.1.el6_0
  • C
Resource Management Errors

<0:1.9.2.13-3.0.1.el6_0
  • C
CVE-2010-3775

<0:1.9.2.13-3.0.1.el6_0
  • C
Out-of-Bounds

<0:1.9.2.13-3.0.1.el6_0
  • C
Improper Input Validation

<0:1.9.2.13-3.0.1.el6_0