pidgin-perl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the pidgin-perl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

*
  • M
Integer Overflow or Wraparound

<0:2.7.9-27.el6
  • M
Authentication Bypass

<0:2.7.9-27.el6
  • M
Integer Overflow or Wraparound

<0:2.7.9-27.el6
  • M
Integer Overflow or Wraparound

<0:2.7.9-27.el6
  • M
Encoding Error

<0:2.7.9-27.el6
  • M
Allocation of Resources Without Limits or Throttling

<0:2.7.9-27.el6
  • M
Resource Management Errors

<0:2.7.9-27.el6
  • M
Function Call with Incorrectly Specified Arguments

<0:2.7.9-27.el6
  • M
Integer Overflow or Wraparound

<0:2.7.9-27.el6
  • M
Improper Handling of Length Parameter Inconsistency

<0:2.7.9-27.el6
  • M
Heap-based Buffer Overflow

<0:2.7.9-27.el6
  • M
Integer Overflow or Wraparound

<0:2.7.9-27.el6
  • M
NULL Pointer Dereference

<0:2.7.9-27.el6
  • L
Insufficient Comparison

<0:2.7.9-11.el6
  • M
CVE-2013-0274

<0:2.7.9-10.el6_4.1
  • M
Stack-based Buffer Overflow

<0:2.7.9-10.el6_4.1
  • M
CVE-2013-0273

<0:2.7.9-10.el6_4.1
  • M
Out-of-Bounds

<0:2.7.9-5.el6.2
  • M
Improper Input Validation

<0:2.7.9-5.el6.2
  • M
Resource Management Errors

<0:2.7.9-5.el6.2
  • M
Improper Input Validation

<0:2.7.9-3.el6.2
  • M
Improper Input Validation

<0:2.7.9-3.el6.2
  • L
NULL Pointer Dereference

<0:2.7.9-3.el6
  • L
Information Exposure

<0:2.7.9-3.el6
  • M
Improper Input Validation

<0:2.6.6-6.el6_0
  • M
Out-of-bounds Write

*
  • M
Directory Traversal

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • M
Improper Authentication

*
  • M
Heap-based Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • M
Heap-based Buffer Overflow

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Heap-based Buffer Overflow

*
  • M
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Heap-based Buffer Overflow

*
  • L
Improper Certificate Validation

*
  • M
Information Exposure

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-Bounds

*
  • L
Cleartext Transmission of Sensitive Information

*
  • L
CVE-2011-2485

*
  • M
Improper Input Validation

*
  • L
NULL Pointer Dereference

*