icedove vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the icedove package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • L
CVE-2017-7775

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • C
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • M
Improper Input Validation

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • C
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • C
Integer Overflow or Wraparound

<1:45.5.1-1~deb8u1
  • M
DEPRECATED: Use of Uninitialized Resource

<1:45.8.0-3~deb8u1
  • C
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • M
Improper Input Validation

<1:52.2.1-4~deb8u1
  • H
Information Exposure

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • M
Improper Input Validation

<1:45.5.1-1~deb8u1
  • H
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • M
Information Exposure

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:45.6.0-1~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
CVE-2017-5390

<1:45.8.0-3~deb8u1
  • M
Information Exposure

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • M
Security Features

<1:45.6.0-1~deb8u1
  • C
Out-of-bounds Read

<1:52.3.0-4~deb8u2
  • H
Improper Input Validation

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:45.6.0-1~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • H
Improper Privilege Management

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • H
Out-of-Bounds

<1:45.6.0-1~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • H
Use After Free

<1:52.2.1-4~deb8u1
  • H
Information Exposure

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • H
Improper Access Control

<1:45.6.0-1~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:45.6.0-1~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • H
Use After Free

<1:45.5.1-1~deb8u1
  • H
Security Features

<1:45.6.0-1~deb8u1
  • H
Information Exposure

<1:45.6.0-1~deb8u1
  • M
Information Exposure

<1:45.5.1-1~deb8u1
  • C
Error Handling

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • H
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • M
Improper Input Validation

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.4.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.3.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.2.0-1~deb8u1
  • H
Out-of-Bounds

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.1.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1961

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1960

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1966

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Improper Data Handling

<38.7.0-1~deb8u1
  • C
CVE-2016-1962

<38.7.0-1~deb8u1
  • H
CVE-2016-1964

<38.7.0-1~deb8u1
  • M
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Improper Data Handling

<38.7.0-1~deb8u1
  • H
CVE-2016-1979

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Access Restriction Bypass

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.6.0-1~deb8u1
  • M
CVE-2016-1523

<38.6.0-1~deb8u1
  • C
Out-of-Bounds

<38.6.0-1~deb8u1
  • H
Out-of-Bounds

<38.6.0-1~deb8u1
  • M
Improper Data Handling

<38.6.0-1~deb8u1
  • H
Numeric Errors

<38.5.0-1~deb8u1
  • C
Out-of-Bounds

<38.5.0-1~deb8u1
  • M
Information Exposure

<38.5.0-1~deb8u1
  • M
Numeric Errors

<38.5.0-1~deb8u1
  • C
Numeric Errors

<38.5.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<31.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • M
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • M
Access Restriction Bypass

<38.4.0-1~deb8u1
  • C
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Security Features

<38.4.0-1~deb8u1
  • H
Security Features

<38.4.0-1~deb8u1
  • H
Code

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • C
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
CVE-2015-4488

<38.4.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • H
Code

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • H
Code

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • M
Cryptographic Issues

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • L
Cryptographic Issues

<31.8.0-1~deb8u1
  • M
CVE-2015-2713

<31.7.0-1~deb8u1
  • H
CVE-2015-2708

<31.7.0-1~deb8u1
  • H
Out-of-Bounds

<31.7.0-1~deb8u1
  • M
CVE-2015-0797

<31.7.0-1~deb8u1
  • M
Out-of-Bounds

<31.7.0-1~deb8u1
  • M
CVE-2015-0813

<31.6.0-1
  • M
Access Restriction Bypass

<31.6.0-1
  • H
Access Restriction Bypass

<31.6.0-1
  • M
Cross-site Request Forgery (CSRF)

<31.6.0-1
  • H
CVE-2015-0815

<31.6.0-1
  • H
CVE-2015-0836

<31.5.0-1
  • M
CVE-2015-0831

<31.5.0-1
  • M
Out-of-Bounds

<31.5.0-1
  • M
Information Exposure

<31.5.0-1
  • M
CVE-2014-8639

<31.4.0-1
  • M
Cross-site Request Forgery (CSRF)

<31.4.0-1
  • H
CVE-2014-8634

<31.4.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
CVE-2014-1592

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
Out-of-Bounds

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • H
CVE-2014-1581

<31.2.0-1
  • H
Out-of-Bounds

<31.2.0-1
  • M
CVE-2014-1585

<31.2.0-1
  • M
CVE-2014-1586

<31.2.0-1
  • H
Out-of-Bounds

<31.2.0-1
  • M
CVE-2014-1577

<31.2.0-1
  • H
CVE-2014-1574

<31.2.0-1
  • L
Cryptographic Issues

<31.3.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • H
CVE-2014-1567

<31.2.0-1
  • C
Use After Free

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • M
Access of Uninitialized Pointer

<31.2.0-1
  • M
Out-of-Bounds

<31.2.0-1
  • M
CVE-2014-1559

<31.0-1
  • H
CVE-2014-1555

<31.0-1
  • H
Arbitrary Code Injection

<31.0-1
  • C
CVE-2014-1547

<31.0-1
  • C
CVE-2014-1550

<31.0-1
  • M
Access Restriction Bypass

<31.0-1
  • C
CVE-2014-1544

<31.2.0-1
  • M
CVE-2014-1558

<31.0-1
  • H
Arbitrary Code Injection

<31.0-1
  • M
CVE-2014-1560

<31.0-1
  • H
Out-of-Bounds

<31.0-1
  • C
CVE-2014-1537

<31.0~b1-1
  • C
CVE-2014-1545

<31.0~b1-1
  • M
Out-of-Bounds

<31.0~b1-1
  • C
CVE-2014-1541

<31.0~b1-1
  • C
CVE-2014-1538

<31.0~b1-1
  • C
CVE-2014-1536

<31.0~b1-1
  • C
Out-of-Bounds

<31.0~b1-1
  • C
CVE-2014-1533

<31.0~b1-1
  • H
CVE-2014-1540

<31.0~b1-1
  • M
Out-of-bounds Write

<24.5.0-1
  • H
CVE-2014-1518

<24.5.0-1
  • M
Cross-site Scripting (XSS)

<24.5.0-1
  • C
Use After Free

<24.5.0-1
  • C
Buffer Overflow

<24.5.0-1
  • H
Use After Free

<24.5.0-1
  • H
Improper Privilege Management

<24.5.0-1
  • H
Out-of-bounds Write

<24.4.0-1
  • C
Improper Privilege Management

<24.4.0-1
  • C
Out-of-bounds Read

<24.4.0-1
  • H
Information Exposure

<24.4.0-1
  • C
Out-of-Bounds

<24.4.0-1
  • H
Out-of-bounds Read

<24.4.0-1
  • C
Out-of-bounds Write

<24.4.0-1
  • H
Buffer Overflow

<24.4.0-1
  • C
Use After Free

<24.4.0-1
  • C
Improper Privilege Management

<24.4.0-1
  • M
Cross-site Scripting (XSS)

<24.2.0-1
  • M
Cross-site Scripting (XSS)

<24.2.0-1
  • C
Use After Free

<24.3.0-1
  • M
Inadequate Encryption Strength

<24.3.0-1
  • H
Out-of-bounds Write

<24.3.0-1
  • H
Origin Validation Error

<24.3.0-1
  • H
Race Condition

<24.3.0-1
  • H
CVE-2014-1481

<24.3.0-1
  • H
CVE-2014-1479

<24.3.0-1
  • C
CVE-2014-1477

<24.3.0-1
  • C
Use After Free

<24.2.0-1
  • C
Arbitrary Code Injection

<24.2.0-1
  • C
CVE-2013-5609

<24.2.0-1
  • M
Cryptographic Issues

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • C
CVE-2013-5615

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • M
Numeric Errors

<24.2.0-1
  • M
Information Exposure

<24.2.0-1
  • C
CVE-2013-5600

<17.0.10-1
  • C
CVE-2013-5599

<17.0.10-1
  • C
CVE-2013-5601

<17.0.10-1
  • H
Out-of-Bounds

<17.0.10-1
  • C
CVE-2013-5597

<17.0.10-1
  • M
Out-of-Bounds

<17.0.10-1
  • C
CVE-2013-5590

<17.0.10-1
  • C
Out-of-Bounds

<17.0.10-1
  • M
Out-of-Bounds

<17.0.9-1
  • H
Improper Input Validation

<17.0.9-1
  • M
Access Restriction Bypass

<17.0.9-1
  • M
Out-of-Bounds

<17.0.9-1
  • C
Out-of-Bounds

<17.0.9-1
  • H
Resource Management Errors

<17.0.9-1
  • H
Out-of-Bounds

<17.0.9-1
  • C
Out-of-Bounds

<17.0.9-1
  • M
Access Restriction Bypass

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • C
CVE-2013-1701

<17.0.8-1
  • C
Improper Input Validation

<17.0.8-1
  • M
Cross-site Scripting (XSS)

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • H
Resource Management Errors

<17.0.7-1
  • H
Access Restriction Bypass

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • H
Access Restriction Bypass

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • C
CVE-2013-1682

<17.0.7-1
  • H
Improper Input Validation

<17.0.7-1
  • H
Out-of-Bounds

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • M
Out-of-Bounds

<17.0.7-1
  • C
CVE-2013-0801

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • M
CVE-2013-0800

<17.0.5-1
  • C
CVE-2013-0796

<17.0.5-1
  • C
CVE-2013-0788

<17.0.5-1
  • C
Access Restriction Bypass

<17.0.7-1
  • M
Cross-site Scripting (XSS)

<17.0.5-1
  • H
Resource Management Errors

<17.0.5-1
  • H
Use After Free

<17.0.5-1
  • M
Improper Certificate Validation

<17.0.5-1
  • H
CVE-2013-0773

<17.0.5-1
  • H
CVE-2013-0783

<17.0.5-1
  • H
Out-of-bounds Write

<17.0.5-1
  • H
Use After Free

<17.0.5-1
  • H
CVE-2013-0769

<10.0.12-1
  • M
Improper Authentication

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • C
Out-of-bounds Read

<10.0.12-1
  • H
Integer Overflow or Wraparound

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Arbitrary Code Injection

<10.0.12-1
  • H
CVE-2013-0746

<10.0.12-1
  • M
Information Exposure

<10.0.12-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • H
CVE-2012-5842

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • H
Out-of-Bounds

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • C
Integer Overflow or Wraparound

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.10-1
  • M
Arbitrary Code Injection

<10.0.10-1
  • M
Origin Validation Error

<10.0.9-1
  • M
Access Restriction Bypass

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Out-of-bounds Read

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • M
Improper Input Validation

<10.0.9-1
  • H
Access Restriction Bypass

<10.0.9-1
  • H
CVE-2012-3982

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Improper Privilege Management

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • H
CVE-2012-3962

<10.0.7-1
  • H
Arbitrary Code Injection

<10.0.7-1
  • M
Access Restriction Bypass

<10.0.7-1
  • C
Out-of-Bounds

<10.0.7-1
  • C
Out-of-Bounds

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Out-of-bounds Write

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • M
Information Exposure

<10.0.7-1
  • H
Out-of-bounds Write

<10.0.7-1
  • H
Numeric Errors

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • M
CVE-2012-1950

<10.0.6-1
  • M
CVE-2012-1964

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • H
CVE-2012-1948

<10.0.6-1
  • M
CVE-2012-1955

<10.0.6-1
  • M
Improper Input Validation

<10.0.6-1
  • H
Resource Management Errors

<10.0.6-1
  • M
Access Restriction Bypass

<10.0.6-1
  • H
Resource Management Errors

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • C
CVE-2012-1967

<10.0.6-1
  • H
Out-of-Bounds

<10.0.6-1
  • M
Cross-site Scripting (XSS)

<10.0.6-1
  • M
Access Restriction Bypass

<10.0.6-1
  • M
Cross-site Scripting (XSS)

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • H
Resource Management Errors

<10.0.5-1
  • H
CVE-2012-1937

<10.0.5-1
  • H
Resource Management Errors

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • L
Information Exposure

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • C
Resource Management Errors

<10.0.4-1
  • L
Access Restriction Bypass

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • C
Out-of-Bounds

<10.0.4-1
  • M
Numeric Errors

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • C
CVE-2012-0467

<10.0.4-1
  • M
CVE-2012-0479

<10.0.4-1
  • H
Access Restriction Bypass

<10.0.4-1
  • M
Incorrect Calculation

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.3-1
  • H
Resource Management Errors

<10.0.3-1
  • H
CVE-2012-0461

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • M
Arbitrary Code Injection

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • H
Resource Management Errors

<10.0.3-1
  • M
Information Exposure

<10.0.3-1
  • H
CVE-2012-0462

<10.0.3-1
  • H
Access Restriction Bypass

<10.0.3-1
  • M
Information Exposure

<7.0-1
  • H
CVE-2012-0442

<10.0.3-1
  • C
Out-of-Bounds

<10.0.3-1
  • H
Out-of-Bounds

<10.0.3-1
  • M
Information Exposure

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • M
Cross-site Scripting (XSS)

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • M
Cross-site Scripting (XSS)

<3.1.16-1
  • H
Out-of-Bounds

<3.1.16-1
  • H
Improper Input Validation

<3.1.16-1
  • C
Numeric Errors

<3.1.15-1
  • M
Access Restriction Bypass

<3.1.15-1
  • L
Access Restriction Bypass

<3.1.15-1
  • C
CVE-2011-2995

<3.1.15-1
  • M
Arbitrary Code Injection

<3.1.15-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • H
Configuration

<3.1.12-1
  • C
CVE-2011-2982

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • M
Information Exposure

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • C
Resource Management Errors

<3.1.11-1
  • H
Resource Management Errors

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • C
CVE-2011-2376

<3.1.11-1
  • C
CVE-2011-2365

<3.1.11-1
  • M
Access Restriction Bypass

<3.1.11-1
  • M
Arbitrary Code Injection

<3.1.11-1
  • C
CVE-2011-2374

<3.1.11-1
  • C
Numeric Errors

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • C
Resource Management Errors

<3.1.15-1+b1
  • C
CVE-2011-0074

<3.1.10-1
  • C
CVE-2011-0075

<3.1.10-1
  • C
CVE-2011-0080

<3.1.10-1
  • C
CVE-2011-0069

<3.1.10-1
  • C
CVE-2011-0070

<3.1.10-1
  • C
CVE-2011-0077

<3.1.10-1
  • C
CVE-2011-0078

<3.1.10-1
  • C
Resource Management Errors

<3.1.15-1+b1
  • M
Directory Traversal

<3.1.10-1
  • C
CVE-2011-0072

<3.1.10-1
  • M
Information Exposure

<17.0.2-1
  • C
Out-of-Bounds

<3.0.11-2
  • C
CVE-2011-0053

<3.0.11-2
  • M
Cross-site Request Forgery (CSRF)

<3.0.11-2
  • C
Resource Management Errors

<3.0.11-2
  • M
Improper Input Validation

<3.0.11-2
  • C
Out-of-Bounds

<3.0.11-2
  • C
Resource Management Errors

<3.0.11-2
  • H
Improper Input Validation

<3.0.11-1
  • H
Out-of-Bounds

<3.0.11-1
  • H
Out-of-Bounds

<3.0.11-1
  • H
Out-of-Bounds

<3.0.11-1
  • H
Out-of-Bounds

<3.0.10-1
  • H
Resource Management Errors

<3.0.9-1
  • H
CVE-2010-3174

<3.0.9-1
  • H
Out-of-Bounds

<3.0.9-1
  • H
CVE-2010-3182

<3.0.9-1
  • H
Out-of-Bounds

<3.0.9-1
  • M
Access Restriction Bypass

<3.0.9-1
  • H
Out-of-Bounds

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • H
Resource Management Errors

<3.0.7-1
  • H
Arbitrary Code Injection

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • H
Numeric Errors

<3.0.7-1
  • H
Resource Management Errors

<3.0.7-1
  • H
CVE-2010-3169

<3.0.7-1
  • M
Access Restriction Bypass

<3.0.7-1
  • H
Out-of-Bounds

<3.0.6-1
  • H
Numeric Errors

<3.0.6-1
  • M
Improper Input Validation

<3.0.6-1
  • H
CVE-2010-1211

<3.0.6-1
  • H
Numeric Errors

<3.0.6-1
  • M
Information Exposure

<3.0.6-1
  • C
Buffer Overflow

<3.0.6-1
  • H
Numeric Errors

<3.0.5-1
  • H
Numeric Errors

<3.0.5-1
  • H
Improper Input Validation

<3.0.11-2
  • C
CVE-2010-0174

<3.0.4-1
  • H
Resource Management Errors

<3.0.4-1
  • M
Improper Input Validation

<3.0.4-1
  • H
Resource Management Errors

<3.0.4-1
  • H
CVE-2010-0173

<3.0.4-1
  • M
CVE-2010-0169

<3.0.2-1
  • H
Out-of-Bounds

<3.0.2-1
  • M
Cross-site Scripting (XSS)

<3.0.2-1
  • M
CVE-2010-0163

<3.0.4-1
  • C
Arbitrary Code Injection

<3.0.2-1
  • C
CVE-2010-0159

<3.0.2-1
  • M
Information Exposure

<3.0.6-1
  • M
Information Exposure

<3.0.2-1
  • C
CVE-2009-3075

<3.0~rc2-2
  • C
CVE-2009-3072

<3.0~rc2-2
  • M
Information Exposure

<2.0.0.19-1
  • H
Out-of-Bounds

<2.0.0.24-1
  • M
Improper Input Validation

<2.0.0.24-1
  • C
Numeric Errors

<3.0~rc2-2
  • H
CVE-2009-2210

<2.0.0.22-1
  • H
Cryptographic Issues

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • M
Improper Authentication

<2.0.0.22-1
  • M
Improper Input Validation

<2.0.0.22-1
  • M
Configuration

<2.0.0.22-1
  • M
Resource Management Errors

<2.0.0.22-1
  • H
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • M
Information Exposure

<2.0.0.22-1
  • H
Resource Management Errors

<2.0.0.22-1
  • M
Arbitrary Code Injection

<2.0.0.22-1
  • M
CVE-2009-0652

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • M
Cross-site Scripting (XSS)

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • M
Information Exposure

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • L
CVE-2008-5503

<2.0.0.19-1
  • M
CVE-2008-5510

<2.0.0.19-1
  • M
Improper Input Validation

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • M
Resource Management Errors

*
  • H
Resource Management Errors

<2.0.0.19-1
  • C
Numeric Errors

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • C
Improper Input Validation

<2.0.0.19-1
  • H
XML Injection

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • M
Information Exposure

<2.0.0.19-1
  • H
Improper Authentication

<2.0.0.19-1
  • M
Resource Management Errors

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • C
Out-of-Bounds

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • M
Cross-site Scripting (XSS)

<2.0.0.17-1
  • C
Out-of-Bounds

<2.0.0.17-1
  • C
Resource Management Errors

<2.0.0.17-1
  • M
Directory Traversal

<2.0.0.17-1
  • M
Cross-site Scripting (XSS)

<2.0.0.17-1
  • C
Numeric Errors

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • H
Directory Traversal

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • M
Improper Input Validation

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • H
Access Restriction Bypass

<2.0.0.16-1
  • M
Information Exposure

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • M
Access Restriction Bypass

<2.0.0.16-1
  • H
Numeric Errors

<2.0.0.16-1
  • H
Resource Management Errors

<2.0.0.14-1
  • M
Resource Management Errors

<2.0.0.14-1
  • H
CVE-2008-1235

<2.0.0.14-1
  • M
Resource Management Errors

<2.0.0.14-1
  • M
Cross-site Scripting (XSS)

<2.0.0.14-1
  • M
Arbitrary Code Injection

<2.0.0.14-1
  • H
Out-of-Bounds

<2.0.0.12-1
  • M
Cross-site Scripting (XSS)

<2.0.0.12-1
  • M
CVE-2008-0594

<2.0.0.12-1
  • M
Information Exposure

<2.0.0.12-1
  • M
CVE-2008-0592

<2.0.0.12-1
  • M
CVE-2008-0591

<2.0.0.12-1
  • M
Arbitrary Code Injection

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • M
Cross-site Scripting (XSS)

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • M
Directory Traversal

<2.0.0.12-1
  • M
Improper Input Validation

<2.0.0.12-1
  • M
Improper Input Validation

<2.0.0.9-1
  • M
Improper Input Validation

<2.0.0.9-1
  • H
CVE-2007-3845

<2.0.0.6-1
  • M
CVE-2007-3844

<2.0.0.6-1
  • H
CVE-2007-3734

<2.0.0.6-1
  • H
CVE-2007-3735

<2.0.0.6-1
  • H
Out-of-Bounds

<2.0.0.4-1
  • H
Arbitrary Code Injection

<2.0.0.4-1
  • L
CVE-2007-1558

<2.0.0.4-1
  • H
CVE-2007-1282

<1.5.0.10.dfsg1-1
  • M
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • M
Numeric Errors

<1.5.0.10.dfsg1-1
  • M
CVE-2007-0775

<1.5.0.10.dfsg1-1
  • H
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • H
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • M
Security Features

<1.5.0.9.dfsg1-1
  • M
Access Restriction Bypass

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6505

<1.5.0.9.dfsg1-1
  • H
Arbitrary Code Injection

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6499

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6497

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6498

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6502

<1.5.0.9.dfsg1-1
  • H
CVE-2006-5463

<1.5.0.8-1
  • H
CVE-2006-5747

<1.5.0.8-1
  • M
CVE-2006-5464

<1.5.0.8-1
  • M
CVE-2006-5748

<1.5.0.8-1
  • M
CVE-2006-5462

<1.5.0.8-1
  • M
CVE-2006-5633

*