imagemagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the imagemagick package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

<8:6.9.10.23+dfsg-2.1+deb10u6
  • H
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u5
  • H
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u7
  • M
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u6
  • L
OS Command Injection

*
  • M
Improper Input Validation

<8:6.9.10.23+dfsg-2.1+deb10u6
  • M
CVE-2022-44268

<8:6.9.10.23+dfsg-2.1+deb10u2
  • M
Improper Resource Shutdown or Release

<8:6.9.10.23+dfsg-2.1+deb10u2
  • M
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u2
  • H
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u5
  • H
Incorrect Type Conversion or Cast

<8:6.9.10.23+dfsg-2.1+deb10u5
  • H
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u5
  • H
Buffer Overflow

<8:6.9.10.23+dfsg-2.1+deb10u5
  • M
NULL Pointer Dereference

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Exposure of Resource to Wrong Sphere

<8:6.9.10.23+dfsg-2.1+deb10u5
  • L
Divide By Zero

*
  • H
Information Exposure

<8:6.9.10.23+dfsg-2.1+deb10u5
  • H
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u5
  • H
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u5
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u5
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u5
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u5
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u5
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u5
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u5
  • H
XML Injection

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • H
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Out-of-bounds Write

*
  • M
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u2
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u2
  • M
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Out-of-bounds Write

*
  • L
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u2
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u2
  • M
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • M
Out-of-bounds Read

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Memory Leak

*
  • L
Memory Leak

*
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Integer Overflow or Wraparound

<8:6.9.10.23+dfsg-2.1+deb10u2
  • M
Out-of-bounds Read

<8:6.9.10.23+dfsg-2.1+deb10u2
  • H
Out-of-bounds Write

<8:6.9.10.23+dfsg-2.1+deb10u2
  • L
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u2
  • C
Out-of-bounds Read

<8:6.9.10.23+dfsg-2.1+deb10u1
  • C
Out-of-bounds Write

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Use After Free

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Out-of-bounds Read

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.10.23+dfsg-2.1+deb10u1
  • L
Missing Release of Resource after Effective Lifetime

*
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Out-of-bounds Write

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Out-of-bounds Read

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u1
  • L
Memory Leak

*
  • H
Out-of-bounds Write

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Out-of-bounds Write

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Out-of-bounds Write

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Out-of-bounds Read

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Out-of-bounds Read

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Out-of-bounds Write

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Out-of-bounds Write

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Use of Uninitialized Resource

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
NULL Pointer Dereference

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Improper Initialization

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Improper Initialization

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Improper Initialization

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • H
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • H
Out-of-Bounds

<8:6.9.10.2+dfsg-2
  • H
Out-of-bounds Read

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Out-of-bounds Read

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Divide By Zero

<8:6.9.10.23+dfsg-2.1+deb10u1
  • M
Resource Exhaustion

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Out-of-bounds Read

<8:6.9.10.23+dfsg-2.1
  • M
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Out-of-bounds Write

<8:6.9.10.23+dfsg-2.1
  • H
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • H
Memory Leak

<8:6.9.10.23+dfsg-2.1+deb10u1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.10.23+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.14+dfsg-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.10.14+dfsg-1
  • M
Out-of-bounds Read

<8:6.9.10.14+dfsg-1
  • L
Out-of-bounds Read

<8:6.9.10.14+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.14+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.14+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.14+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.14+dfsg-1
  • L
NULL Pointer Dereference

<8:6.9.10.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.2+dfsg-2
  • M
Out-of-Bounds

<8:6.9.10.14+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • M
Information Exposure

<8:6.9.10.14+dfsg-1
  • M
Out-of-bounds Write

<8:6.9.10.2+dfsg-2
  • L
Unchecked Return Value

<8:6.9.10.8+dfsg-1
  • M
Allocation of Resources Without Limits or Throttling

<8:6.9.10.14+dfsg-1
  • L
Resource Exhaustion

*
  • C
NULL Pointer Dereference

<8:6.9.10.8+dfsg-1
  • H
Out-of-bounds Read

<8:6.9.10.14+dfsg-1
  • H
Out-of-bounds Read

<8:6.9.10.14+dfsg-1
  • C
Out-of-bounds Write

<8:6.9.10.8+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.8.9.9-1
  • H
Out-of-bounds Write

<8:6.7.7.10+dfsg-1
  • H
Buffer Overflow

<8:6.7.7.10+dfsg-1
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Out-of-bounds Write

<8:6.7.7.10+dfsg-1
  • H
Out-of-bounds Write

<8:6.9.10.2+dfsg-2
  • H
Out-of-bounds Write

<8:6.9.10.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Use After Free

<8:6.9.10.2+dfsg-2
  • H
Out-of-bounds Read

<8:6.9.10.2+dfsg-2
  • M
Use After Free

<8:6.9.9.34+dfsg-3
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.9.34+dfsg-3
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.9.34+dfsg-3
  • M
Out-of-bounds Read

<8:6.9.9.39+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.2+dfsg-2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.10.2+dfsg-2
  • L
Out-of-bounds Read

<8:6.9.10.8+dfsg-1
  • L
Excessive Iteration

<8:6.9.10.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Reachable Assertion

<8:6.9.9.34+dfsg-3
  • L
Out-of-bounds Read

<8:6.9.9.39+dfsg-1
  • L
Double Free

<8:6.9.9.39+dfsg-1
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Out-of-Bounds

<8:6.9.9.39+dfsg-1
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.39+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • M
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Excessive Iteration

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Out-of-bounds Read

<8:6.9.9.39+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • C
Use After Free

<8:6.9.9.34+dfsg-3
  • M
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • H
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • L
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • M
Information Exposure

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • M
Use After Free

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • C
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • M
Use After Free

<8:6.9.10.2+dfsg-2
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • L
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Divide By Zero

<8:6.9.9.34+dfsg-3
  • H
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • L
Excessive Iteration

<8:6.9.9.34+dfsg-3
  • L
Integer Overflow or Wraparound

<8:6.9.9.34+dfsg-3
  • L
Excessive Iteration

<8:6.9.9.34+dfsg-3
  • L
Excessive Iteration

<8:6.9.9.34+dfsg-3
  • L
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • M
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • M
Use After Free

<8:6.9.9.34+dfsg-3
  • L
Reachable Assertion

<8:6.9.7.4+dfsg-14
  • H
Information Exposure

<8:6.9.7.4+dfsg-14
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-13
  • L
Improper Check for Unusual or Exceptional Conditions

<8:6.9.7.4+dfsg-15
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-15
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • M
Out-of-Bounds

<8:6.9.7.4+dfsg-15
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-13
  • C
Out-of-bounds Read

<8:6.9.7.4+dfsg-15
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Improper Input Validation

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • L
Excessive Iteration

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Use After Free

<8:6.9.7.4+dfsg-15
  • L
Improper Input Validation

<8:6.9.7.4+dfsg-14
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-15
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Improper Input Validation

<8:6.9.7.4+dfsg-15
  • H
Improper Access Control

<8:6.8.9.9-4
  • H
Improper Access Control

<8:6.8.9.9-4
  • H
Improper Access Control

<8:6.8.9.9-4
  • H
Improper Access Control

<8:6.8.9.9-4
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-15
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Out-of-bounds Read

<8:6.9.7.4+dfsg-15
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-15
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • H
Excessive Iteration

<8:6.9.7.4+dfsg-16
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-15
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-16
  • M
Use After Free

<8:6.9.7.4+dfsg-13
  • M
Reachable Assertion

<8:6.9.7.4+dfsg-14
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-13
  • H
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-13
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

*
  • M
NULL Pointer Dereference

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • M
Out-of-bounds Read

<8:6.9.7.4+dfsg-15
  • M
Out-of-Bounds

<8:6.9.7.4+dfsg-15
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • H
Resource Management Errors

<8:6.9.6.2+dfsg-2
  • L
Incorrect Calculation

<8:6.9.7.4+dfsg-13
  • M
Reachable Assertion

<8:6.9.7.4+dfsg-12
  • M
Resource Exhaustion

<8:6.9.7.4+dfsg-12
  • M
Resource Exhaustion

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • M
Resource Exhaustion

<8:6.9.7.4+dfsg-12
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • M
Out-of-bounds Read

<8:6.9.7.4+dfsg-13
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-15
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • M
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • M
Out-of-bounds Read

<8:6.9.7.4+dfsg-13
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.7.4+dfsg-14
  • M
Excessive Iteration

<8:6.9.7.4+dfsg-12
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.7.4+dfsg-12
  • M
Information Exposure

<8:6.9.7.4+dfsg-12
  • H
CVE-2017-11450

<8:6.9.7.4+dfsg-12
  • H
CVE-2017-11449

<8:6.9.7.4+dfsg-12
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.7.4+dfsg-13
  • M
CVE-2017-11352

<8:6.9.7.4+dfsg-12
  • M
Excessive Iteration

<8:6.9.7.4+dfsg-12
  • H
Excessive Iteration

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Out-of-bounds Read

<8:6.9.7.4+dfsg-12
  • L
Reachable Assertion

<8:6.9.7.4+dfsg-12
  • L
Reachable Assertion

<8:6.9.7.4+dfsg-13
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-11
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-11
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-11
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-10
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-10
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-9
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-9
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-9
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-9
  • H
Use of Uninitialized Resource

<8:6.9.7.4+dfsg-9
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Resource Management Errors

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Improper Data Handling

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Divide By Zero

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Write

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Write

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Write

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • M
Numeric Errors

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Write

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-6
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-6
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-6
  • M
Out-of-bounds Read

<8:6.8.9.9-4
  • M
Out-of-bounds Read

<8:6.8.9.9-1
  • M
Out-of-bounds Read

<8:6.8.9.9-1
  • M
Out-of-bounds Read

<8:6.8.9.9-3
  • M
Out-of-bounds Read

<8:6.8.9.9-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.7.4+dfsg-4
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-4
  • M
Out-of-bounds Read

<8:6.8.9.9-4
  • M
NULL Pointer Dereference

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • C
Error Handling

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • M
Out-of-bounds Read

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
NULL Pointer Dereference

<8:6.8.9.9-4
  • M
Double Free

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • M
Out-of-bounds Read

<8:6.8.9.9-4
  • H
CVE-2014-9804

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • L
Out-of-Bounds

*
  • H
Resource Management Errors

<8:6.9.7.0+dfsg-2
  • C
Numeric Errors

<8:6.9.7.4+dfsg-1
  • C
Improper Access Control

<8:6.9.7.4+dfsg-1
  • H
Double Free

<8:6.9.7.4+dfsg-1
  • H
Out-of-bounds Write

<8:6.9.7.4+dfsg-1
  • C
Out-of-Bounds

<8:6.9.7.4+dfsg-1
  • M
Out-of-Bounds

<8:6.9.7.4+dfsg-1
  • H
Out-of-bounds Write

<8:6.9.7.4+dfsg-1
  • H
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-1
  • M
Out-of-Bounds

<8:6.9.6.5+dfsg-1
  • M
Numeric Errors

<8:6.8.9.9-1
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Resource Exhaustion

<8:6.9.6.5+dfsg-1
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Divide By Zero

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Directory Traversal

<8:6.9.5.7+dfsg-1
  • M
Resource Exhaustion

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Use After Free

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
CVE-2014-9838

<8:6.8.9.9-4
  • M
Out-of-Bounds

<8:6.8.9.9-4
  • M
Out-of-Bounds

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • C
Out-of-Bounds

<8:6.8.9.9-4
  • H
Resource Management Errors

<8:6.8.9.9-4
  • M
Out-of-Bounds

<8:6.8.9.9-4
  • H
Improper Input Validation

<8:6.8.9.9-4
  • H
Resource Exhaustion

<8:6.8.9.9-4
  • M
Out-of-bounds Read

<8:6.8.9.9-4
  • C
Out-of-Bounds

<8:6.8.9.9-4
  • H
Resource Management Errors

<8:6.8.9.9-4
  • C
Error Handling

<8:6.8.9.9-4
  • H
Resource Exhaustion

<8:6.8.9.9-4
  • C
Out-of-Bounds

<8:6.8.9.9-4
  • M
Resource Management Errors

<8:6.8.9.9-4
  • C
Improper Control of Dynamically-Managed Code Resources

<8:6.8.9.9-4
  • H
Resource Management Errors

<8:6.8.9.9-4
  • M
CVE-2015-8896

<8:6.8.9.9-7
  • H
Integer Overflow or Wraparound

<8:6.8.9.9-7
  • M
NULL Pointer Dereference

<8:6.8.9.9-7
  • M
Out-of-bounds Read

<8:6.8.9.9-7
  • M
Double Free

<8:6.8.9.9-6
  • C
Improper Access Control

<8:6.9.6.2+dfsg-2
  • H
Resource Management Errors

<8:6.9.6.2+dfsg-2
  • L
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • M
Out-of-bounds Read

<8:6.9.7.4+dfsg-2
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-2
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-2
  • H
NULL Pointer Dereference

<8:6.9.7.4+dfsg-2
  • M
NULL Pointer Dereference

<8:6.9.7.4+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Unchecked Return Value

<8:6.9.6.2+dfsg-2
  • H
Improper Access Control

<8:6.9.6.2+dfsg-2
  • M
Buffer Overflow

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Error Handling

<8:6.9.7.4+dfsg-1
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Unchecked Return Value

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Improper Input Validation

<8:6.9.6.5+dfsg-1
  • M
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • M
NULL Pointer Dereference

<8:6.9.6.5+dfsg-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.8.9.9-6
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.8.9.9-6
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.8.9.9-6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.8.9.9-6
  • L
Out-of-bounds Read

*
  • H
CVE-2016-8677

<8:6.9.6.2+dfsg-1
  • H
Out-of-Bounds

<8:6.9.6.6+dfsg-1
  • M
Out-of-Bounds

<8:6.9.6.5+dfsg-1
  • M
Use After Free

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Integer Overflow or Wraparound

<8:6.9.6.2+dfsg-2
  • H
Out-of-bounds Write

<8:6.9.7.0+dfsg-2
  • C
NULL Pointer Dereference

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • C
NULL Pointer Dereference

<8:6.9.6.2+dfsg-2
  • C
Integer Overflow or Wraparound

<8:6.9.6.2+dfsg-2
  • C
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • C
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • H
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • C
Improper Access Control

<8:6.8.9.9-7.1
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • C
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Information Exposure

<8:6.9.6.2+dfsg-2
  • M
Improper Access Control

<8:6.9.6.2+dfsg-2
  • L
Access Restriction Bypass

<8:6.9.6.2+dfsg-2
  • H
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • M
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • M
Out-of-Bounds

<8:6.7.7.10-6
  • L
CVE-2012-3437

<8:6.7.7.10-3
  • H
Integer Overflow or Wraparound

<8:6.7.4.0-4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.6.9.7-7
  • M
Resource Exhaustion

<8:6.7.4.0-4
  • H
Integer Overflow or Wraparound

<8:6.6.9.7-7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.6.9.7-6
  • M
Out-of-bounds Read

<8:6.7.4.0-4
  • H
Improper Input Validation

<8:6.6.9.7-6
  • M
Out-of-bounds Read

<8:6.7.4.0-4
  • L
CVE-2010-4167

<8:6.6.0.4-3
  • L
CVE-2009-3736

<6:6.2.3.1-1
  • M
Numeric Errors

<7:6.5.1.0-1.1
  • L
Resource Management Errors

*
  • M
Resource Management Errors

<7:6.2.4.5.dfsg1-1
  • M
Out-of-Bounds

<7:6.3.7.9.dfsg1-2.1
  • M
Out-of-Bounds

<7:6.2.4.5.dfsg1-2
  • M
Numeric Errors

<7:6.2.4.5.dfsg1-2
  • M
Resource Management Errors

<7:6.2.4.5.dfsg1-2
  • M
Numeric Errors

<7:6.2.4.5.dfsg1-2
  • M
Numeric Errors

<7:6.2.4.5.dfsg1-1
  • M
Numeric Errors

<7:6.2.4.5.dfsg1-1
  • H
CVE-2007-0770

<7:6.2.4.5.dfsg1-0.14
  • H
CVE-2006-5868

<7:6.2.4.5.dfsg1-0.11
  • M
Out-of-Bounds

<7:6.2.4.5.dfsg1-0.11
  • M
CVE-2006-3743

<7:6.2.4.5.dfsg1-0.10
  • M
Numeric Errors

<7:6.2.4.5.dfsg1-0.10
  • M
CVE-2006-4144

<7:6.2.4.5.dfsg1-0.10
  • H
CVE-2006-2440

<6:6.2.4.5-0.6
  • M
Use of Externally-Controlled Format String

<6:6.2.4.5-0.6
  • M
CVE-2005-4601

<6:6.2.4.5-0.6
  • M
CVE-2005-1739

<6:6.0.6.2-2.4
  • H
CVE-2005-0762

<5:6.0.0-1
  • M
CVE-2005-0760

<5:6.0.0-1
  • H
CVE-2005-0005

<6:6.0.6.2-2.1
  • H
CVE-2005-0397

<6:6.0.6.2-2.2
  • M
CVE-2005-1275

<6:6.0.6.2-2.3
  • M
CVE-2005-0761

<5:6.0.2.5
  • M
CVE-2005-0759

<5:6.0.0-1
  • L
CVE-2005-0406

*
  • C
CVE-2004-0981

<6:6.0.6.2-1.5
  • H
CVE-2004-0827

<5:6.0.7.1-1
  • M
CVE-2003-0455

<4:5.5.7-1