php5 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the php5 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Integer Overflow or Wraparound

<5.6.40+dfsg-0+deb8u12
  • H
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u11
  • M
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u11
  • M
CVE-2020-7066

<5.6.40+dfsg-0+deb8u11
  • M
Improper Preservation of Permissions

<5.6.40+dfsg-0+deb8u10
  • H
NULL Pointer Dereference

<5.6.40+dfsg-0+deb8u10
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u9
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u9
  • M
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u8
  • M
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u8
  • M
Arbitrary Code Injection

<5.6.40+dfsg-0+deb8u8
  • M
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u8
  • C
Out-of-bounds Write

<5.6.40+dfsg-0+deb8u7
  • H
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u5
  • H
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u5
  • H
Improper Input Validation

*
  • M
Use of Uninitialized Resource

*
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u4
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u4
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u3
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u3
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u3
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

<5.6.40+dfsg-0+deb8u2
  • H
Out-of-Bounds

<5.6.40+dfsg-0+deb8u2
  • H
Out-of-Bounds

<5.6.40+dfsg-0+deb8u2
  • H
Access Restriction Bypass

<5.6.40+dfsg-0+deb8u2
  • C
Out-of-Bounds

<5.6.40+dfsg-0+deb8u2
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u1
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u2
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.39+dfsg-0+deb8u1
  • H
Out-of-bounds Write

*
  • H
Deserialization of Untrusted Data

<5.6.39+dfsg-0+deb8u2
  • H
NULL Pointer Dereference

<5.6.39+dfsg-0+deb8u1
  • H
Arbitrary Argument Injection

<5.6.39+dfsg-0+deb8u1
  • M
Cross-site Scripting (XSS)

<5.6.38+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.37+dfsg-0+deb8u1
  • M
Out-of-bounds Read

<5.6.37+dfsg-0+deb8u1
  • H
Out-of-bounds Read

*
  • C
Use After Free

<5.6.1+dfsg-1
  • H
Missing Release of Resource after Effective Lifetime

<5.4.4-1
  • H
Out-of-bounds Read

<5.6.36+dfsg-0+deb8u1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.6.36+dfsg-0+deb8u1
  • M
Cross-site Scripting (XSS)

<5.6.36+dfsg-0+deb8u1
  • H
NULL Pointer Dereference

<5.6.36+dfsg-0+deb8u1
  • M
Information Exposure

<5.6.36+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.36+dfsg-0+deb8u1
  • M
Resource Exhaustion

*
  • H
Improper Input Validation

<5.6.19+dfsg-0+deb8u1
  • M
Incorrect Conversion between Numeric Types

<5.6.33+dfsg-0+deb8u1
  • M
Cross-site Scripting (XSS)

<5.6.33+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.33+dfsg-0+deb8u1
  • M
Out-of-Bounds

<5.6.33+dfsg-0+deb8u1
  • C
Out-of-bounds Read

<5.6.33+dfsg-0+deb8u1
  • M
Information Exposure

*
  • H
Out-of-Bounds

<5.6.33+dfsg-0+deb8u1
  • C
Out-of-Bounds

*
  • H
Resource Exhaustion

<5.6.33+dfsg-0+deb8u1
  • C
Out-of-bounds Read

<5.6.30+dfsg-0+deb8u1
  • H
Use After Free

<5.6.33+dfsg-0+deb8u1
  • H
Improper Check for Unusual or Exceptional Conditions

<5.6.33+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.28+dfsg-0+deb8u1
  • H
Information Exposure

<5.6.33+dfsg-0+deb8u1
  • C
Use After Free

<5.6.23+dfsg-0+deb8u1
  • C
Resource Exhaustion

*
  • H
Out-of-bounds Write

<5.6.24+dfsg-0+deb8u1
  • H
Server-Side Request Forgery (SSRF)

*
  • H
Integer Overflow or Wraparound

<5.6.30+dfsg-0+deb8u1
  • M
Improper Input Validation

<5.6.30+dfsg-0+deb8u1
  • H
Access Restriction Bypass

<5.6.29+dfsg-0+deb8u1
  • H
Arbitrary Code Injection

*
  • H
Numeric Errors

<5.6.30+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.30+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.30+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.30+dfsg-0+deb8u1
  • C
Use After Free

<5.6.30+dfsg-0+deb8u1
  • H
CVE-2016-7478

<5.6.28+dfsg-0+deb8u1
  • H
NULL Pointer Dereference

<5.6.28+dfsg-0+deb8u1
  • C
Use After Free

<5.6.28+dfsg-0+deb8u1
  • C
Out-of-bounds Read

<5.6.29+dfsg-0+deb8u1
  • C
Use After Free

<5.6.27+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.0+dfsg-1
  • H
Out-of-Bounds

<5.6.28+dfsg-0+deb8u1
  • C
Integer Overflow or Wraparound

<5.6.27+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.26+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.26+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.26+dfsg-0+deb8u1
  • C
Use After Free

<5.6.26+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.26+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.26+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.26+dfsg-0+deb8u1
  • H
NULL Pointer Dereference

<5.6.26+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.26+dfsg-0+deb8u1
  • C
Out-of-bounds Write

<5.6.26+dfsg-0+deb8u1
  • C
Out-of-bounds Write

<5.6.26+dfsg-0+deb8u1
  • H
NULL Pointer Dereference

<5.6.26+dfsg-0+deb8u1
  • H
NULL Pointer Dereference

<5.6.26+dfsg-0+deb8u1
  • C
Deserialization of Untrusted Data

<5.6.26+dfsg-0+deb8u1
  • H
Arbitrary Code Injection

<5.6.26+dfsg-0+deb8u1
  • M
Information Exposure

<5.6.26+dfsg-0+deb8u1
  • M
Out-of-Bounds

<5.6.24+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.22+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.23+dfsg-0+deb8u1
  • C
Integer Overflow or Wraparound

<5.6.23+dfsg-0+deb8u1
  • C
Use After Free

<5.6.23+dfsg-0+deb8u1
  • C
Double Free

<5.6.23+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.17+dfsg-0+deb8u1
  • M
Cross-site Scripting (XSS)

<5.6.6+dfsg-1
  • C
Use After Free

<5.6.23+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.22+dfsg-0+deb8u1
  • C
Out-of-Bounds

*
  • H
Improper Input Validation

<5.6.26+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.22+dfsg-0+deb8u1
  • C
Integer Overflow or Wraparound

<5.6.23+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.22+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.23+dfsg-0+deb8u1
  • C
Double Free

<5.6.23+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.22+dfsg-0+deb8u1
  • C
Out-of-bounds Read

<5.6.24+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.24+dfsg-0+deb8u1
  • C
Use After Free

<5.6.24+dfsg-0+deb8u1
  • M
NULL Pointer Dereference

<5.6.24+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.24+dfsg-0+deb8u1
  • C
Use After Free

<5.6.24+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.24+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.15+dfsg-1
  • H
Out-of-Bounds

<5.6.24+dfsg-0+deb8u1
  • H
Improper Access Control

<5.6.24+dfsg-0+deb8u1
  • C
CVE-2016-4540

<5.6.22+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.22+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.22+dfsg-0+deb8u1
  • H
Cryptographic Issues

<5.6.12+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.22+dfsg-0+deb8u1
  • C
CVE-2016-4541

<5.6.22+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.22+dfsg-0+deb8u1
  • M
Out-of-Bounds

<5.6.12+dfsg-0+deb8u1
  • C
CVE-2015-8876

<5.6.12+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.19+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.22+dfsg-0+deb8u1
  • H
CVE-2016-4343

<5.6.18+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.22+dfsg-0+deb8u1
  • C
CVE-2015-8866

<5.6.6+dfsg-1
  • M
Directory Traversal

<5.6.13+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.12+dfsg-0+deb8u1
  • H
Resource Management Errors

<5.6.12+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.20+dfsg-0+deb8u1
  • H
Numeric Errors

<5.6.20+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.20+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.20+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.20+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.9+dfsg-0+deb8u1
  • C
CVE-2015-4599

<5.6.9+dfsg-0+deb8u1
  • C
CVE-2015-4601

<5.6.9+dfsg-0+deb8u1
  • C
CVE-2015-6835

<5.6.13+dfsg-0+deb8u1
  • H
CVE-2015-6837

<5.6.13+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.12+dfsg-0+deb8u1
  • C
CVE-2015-6834

<5.6.13+dfsg-0+deb8u1
  • C
CVE-2015-4116

<5.6.12+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.9+dfsg-0+deb8u1
  • C
CVE-2015-4600

<5.6.9+dfsg-0+deb8u1
  • C
CVE-2015-4602

<5.6.9+dfsg-0+deb8u1
  • M
Improper Input Validation

<5.6.12+dfsg-0+deb8u1
  • C
CVE-2015-8835

<5.6.12+dfsg-0+deb8u1
  • M
Improper Input Validation

<5.6.9+dfsg-0+deb8u1
  • C
CVE-2015-4603

<5.6.9+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.19+dfsg-0+deb8u1
  • M
Information Exposure

<5.6.9+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.12+dfsg-0+deb8u1
  • M
Improper Access Control

<5.6.12+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.12+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.12+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.12+dfsg-0+deb8u1
  • H
CVE-2015-6838

<5.6.13+dfsg-0+deb8u1
  • H
CVE-2014-0236

<5.6.0~beta4+dfsg-1
  • H
CVE-2015-4644

<5.6.12+dfsg-0+deb8u1
  • C
Numeric Errors

<5.6.22+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.19+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.19+dfsg-0+deb8u1
  • H
CVE-2015-6832

<5.6.12+dfsg-0+deb8u1
  • H
Directory Traversal

<5.6.12+dfsg-0+deb8u1
  • H
CVE-2015-6836

<5.6.13+dfsg-0+deb8u1
  • H
CVE-2015-6831

<5.6.12+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.14+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.12+dfsg-0+deb8u1
  • M
CVE-2015-7803

<5.6.14+dfsg-0+deb8u1
  • M
Numeric Errors

<5.6.14+dfsg-0+deb8u1
  • M
Improper Input Validation

<5.6.7+dfsg-1
  • M
Numeric Errors

<5.6.9+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.9+dfsg-0+deb8u1
  • M
Out-of-Bounds

<5.6.9+dfsg-0+deb8u1
  • H
Numeric Errors

<5.6.9+dfsg-0+deb8u1
  • M
Resource Management Errors

<5.6.9+dfsg-0+deb8u1
  • H
Improper Data Handling

<5.6.7+dfsg-1
  • M
Improper Input Validation

<5.6.7+dfsg-1
  • H
Improper Data Handling

<5.6.9+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.9+dfsg-0+deb8u1
  • H
Improper Data Handling

<5.6.9+dfsg-0+deb8u1
  • M
Out-of-Bounds

<5.6.5+dfsg-1
  • H
Numeric Errors

<5.6.7+dfsg-1
  • M
CVE-2015-1352

<5.6.6+dfsg-2
  • H
CVE-2015-2301

<5.6.6+dfsg-1
  • M
Out-of-Bounds

<5.6.5+dfsg-1
  • H
Out-of-Bounds

<5.6.6+dfsg-1
  • H
CVE-2015-2787

<5.6.7+dfsg-1
  • H
CVE-2015-0273

<5.6.6+dfsg-1
  • H
Use After Free

<5.6.6+dfsg-2
  • M
Numeric Errors

<5.6.6+dfsg-1
  • M
Arbitrary Code Injection

*
  • M
Access Restriction Bypass

<5.6.7+dfsg-1
  • M
CVE-2015-0232

<5.6.5+dfsg-1
  • H
CVE-2015-0231

<5.6.5+dfsg-1
  • M
Resource Management Errors

<5.6.5+dfsg-1
  • H
Out-of-Bounds

<5.6.5+dfsg-1
  • H
CVE-2014-9425

*
  • H
CVE-2014-8142

<5.6.5+dfsg-1
  • M
Resource Management Errors

<5.6.4+dfsg-2
  • M
Resource Management Errors

<5.6.4+dfsg-2
  • H
Out-of-Bounds

<5.2.9.dfsg.1-1
  • M
Improper Input Validation

<5.6.3+dfsg-1
  • M
Out-of-Bounds

<5.6.2+dfsg-1
  • M
Out-of-Bounds

<5.6.2+dfsg-1
  • H
Numeric Errors

<5.6.2+dfsg-1
  • M
Link Following

*
  • M
Out-of-Bounds

<5.6.0+dfsg-1
  • M
Improper Input Validation

<5.4.0-1
  • M
Numeric Errors

<5.6.0+dfsg-1
  • M
CVE-2014-4698

<5.6.0~rc3+dfsg-1
  • M
CVE-2014-4670

<5.6.0~rc3+dfsg-1
  • M
Improper Input Validation

<5.6.0~rc1+dfsg-1
  • M
Numeric Errors

<5.6.0~rc1+dfsg-1
  • M
Out-of-Bounds

<5.6.0~beta4+dfsg-1
  • M
Improper Input Validation

<5.6.0~rc1+dfsg-1
  • H
CVE-2014-3515

<5.6.0~rc2+dfsg-1
  • M
Out-of-Bounds

<5.6.0~rc1+dfsg-1
  • L
Information Exposure

<5.6.0~rc1+dfsg-2
  • M
Resource Management Errors

<5.6.0~rc4+dfsg-1
  • M
Out-of-Bounds

<5.6.0~beta4+dfsg-3
  • M
Link Following

<5.6.0~rc1+dfsg-1
  • M
Resource Management Errors

<5.6.0~beta4+dfsg-1
  • M
Out-of-Bounds

<5.6.0~beta4+dfsg-1
  • H
Access Restriction Bypass

<5.5.12+dfsg-1
  • M
Access Restriction Bypass

<5.6.0+dfsg-1
  • M
Resource Management Errors

<5.6.0~rc4+dfsg-1
  • M
Out-of-Bounds

<5.5.10+dfsg-1
  • M
Resource Management Errors

<5.5.10+dfsg-1
  • M
Numeric Errors

<5.5.9+dfsg-1
  • M
Improper Input Validation

<5.5.9+dfsg-1
  • M
Numeric Errors

<5.5.9+dfsg-1
  • M
Numeric Errors

<5.5.9+dfsg-1
  • M
Information Exposure

*
  • H
Out-of-Bounds

<5.5.6+dfsg-2
  • M
Out-of-Bounds

<5.5.6+dfsg-2
  • M
Information Exposure

<5.4.4-14
  • M
Improper Input Validation

<5.5.3+dfsg-1
  • M
Access Restriction Bypass

<5.5.2+dfsg-1
  • M
Out-of-Bounds

<5.5.0+dfsg-15
  • M
Improper Input Validation

<5.5.0+dfsg-1
  • M
Numeric Errors

<5.5.0+dfsg-1
  • M
Out-of-Bounds

<5.5.0~rc3+dfsg-1
  • M
Improper Input Validation

*
  • H
Access Restriction Bypass

<5.4.4-14
  • M
Information Exposure

<5.4.4-14
  • M
Information Exposure

<5.4.0~beta2-1
  • M
Improper Input Validation

<5.4.1~rc1-1
  • M
Improper Input Validation

<5.4.0~rc5-1
  • M
Cryptographic Issues

<5.3.6-1
  • L
CVE-2012-3450

<5.4.4-1
  • C
CVE-2012-2688

<5.4.4-4
  • M
Access Restriction Bypass

*
  • H
Numeric Errors

<5.4.4~rc1-1
  • M
Cryptographic Issues

<5.3.3-1
  • M
Improper Input Validation

<5.4.0-1
  • C
Improper Input Validation

<5.4.3-1
  • M
Improper Input Validation

<5.4.3
  • H
SQL Injection

<5.4.3-1
  • M
Out-of-Bounds

<5.4.3-1
  • M
Improper Input Validation

<5.3.9-1
  • M
Resource Management Errors

<5.3.9-1
  • M
Improper Input Validation

<5.3.10-1
  • H
Resource Management Errors

<5.3.10-1
  • M
Access Restriction Bypass

<5.3.9-1
  • M
Improper Input Validation

<5.3.9-1
  • M
Resource Management Errors

<5.3.9-1
  • M
Improper Input Validation

<5.3.9-1
  • M
Numeric Errors

<5.3.9-1
  • H
Arbitrary Code Injection

<5.3.9-1
  • C
Out-of-Bounds

<5.3.8-1
  • M
Resource Management Errors

<5.3.7-1
  • M
Cryptographic Issues

<5.3.6-13
  • M
CVE-2011-3182

<5.3.7-1
  • M
Resource Management Errors

<5.3.7-1
  • M
Cryptographic Issues

<5.3.8-1
  • M
Access Restriction Bypass

<5.3.6-12
  • H
Out-of-Bounds

<5.3.6-13
  • H
Link Following

<5.3.6-1
  • M
Resource Management Errors

<5.3.6-1
  • M
Improper Input Validation

<5.3.6-1
  • M
Numeric Errors

<5.3.6-1
  • M
CVE-2011-0421

<5.3.6-1
  • M
Numeric Errors

<5.3.6-1
  • M
CVE-2011-1467

<5.3.6-1
  • M
CVE-2011-1469

<5.3.6-1
  • M
Out-of-Bounds

<5.3.6-1
  • M
Out-of-Bounds

<5.3.6-1
  • H
Resource Management Errors

<5.4.0-1
  • H
Use of Externally-Controlled Format String

<5.3.6-1
  • H
Numeric Errors

<5.4.0-1
  • M
Link Following

<5.3.6-1
  • M
CVE-2011-0420

<5.3.6-1
  • M
Improper Input Validation

<5.3.3-7
  • M
Race Condition

<5.3.5-1
  • M
Numeric Errors

<5.3.5-1
  • M
Improper Input Validation

<5.3.3-6
  • M
Out-of-Bounds

<5.3.3-7
  • M
Numeric Errors

<5.3.5-1
  • M
Resource Management Errors

<5.3.5-1
  • M
Numeric Errors

<5.3.3-7
  • M
Resource Management Errors

<5.3.3-7
  • M
Numeric Errors

<5.3.3-6
  • M
Numeric Errors

<5.3.3-4
  • M
Improper Input Validation

<5.3.3-4
  • M
Improper Input Validation

<5.3.3-4
  • M
Improper Input Validation

<5.3.3-4
  • M
Access Restriction Bypass

<5.3.3-4
  • M
Resource Management Errors

<5.3.3-3
  • M
Use of Externally-Controlled Format String

<5.3.3-2
  • M
Information Exposure

<5.3.3-2
  • M
Information Exposure

<5.3.3-1
  • M
Out-of-Bounds

*
  • M
Information Exposure

*
  • M
Out-of-Bounds

*
  • M
Access Restriction Bypass

<5.3.3-1
  • H
Resource Management Errors

<5.3.3-1
  • M
Out-of-Bounds

<5.3.3-1
  • M
Information Exposure

*
  • M
Resource Management Errors

<5.3.3-1
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Use of Externally-Controlled Format String

<5.3.3-1
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Management Errors

<5.3.3-1
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Arbitrary Code Injection

*
  • C
Numeric Errors

<5.3.3-1
  • M
Information Exposure

<5.3.3-1
  • M
Resource Management Errors

*
  • M
Information Exposure

<5.3.3-1
  • M
Access Restriction Bypass

<5.3.2-1
  • M
Cryptographic Issues

<5.3.2-1
  • H
Improper Input Validation

<5.3.2-1
  • M
CVE-2010-0397

<5.3.2-1
  • M
Numeric Errors

*
  • C
CVE-2009-4143

<5.2.12.dfsg.1-1
  • M
Cross-site Scripting (XSS)

<5.2.12.dfsg.1-1
  • M
CVE-2009-2626

<5.2.11.dfsg.1-1
  • H
Access Restriction Bypass

<5.2.11.dfsg.1-1
  • M
CVE-2009-4017

<5.2.11.dfsg.1-2
  • M
Access Restriction Bypass

<5.2.12.dfsg.1-1
  • M
Access Restriction Bypass

<5.2.12.dfsg.1-1
  • H
CVE-2009-3559

*
  • H
CVE-2009-3292

<5.2.11.dfsg.1-1
  • H
Improper Input Validation

<5.2.11.dfsg.1-1
  • M
Improper Input Validation

<5.2.6.dfsg.1-3
  • H
Access Restriction Bypass

*
  • M
Improper Input Validation

<5.2.10.dfsg.1-2
  • M
Improper Input Validation

<5.2.6.dfsg.1-3
  • M
CVE-2009-1271

<5.2.9.dfsg.1-1
  • M
Use of Externally-Controlled Format String

<5.2.9.dfsg.1-2
  • L
Cross-site Scripting (XSS)

<5.2.11.dfsg.1-1
  • C
Out-of-Bounds

<5.2.6.dfsg.1-1
  • H
Directory Traversal

<5.2.6.dfsg.1-3
  • H
Access Restriction Bypass

<5.2.6.dfsg.1-1
  • H
Access Restriction Bypass

*
  • M
Numeric Errors

*
  • M
Out-of-Bounds

<5.2.6-4
  • M
Improper Input Validation

<5.2.6-4
  • H
Out-of-Bounds

<5.2.6-4
  • M
Out-of-Bounds

<5.2.6-2
  • M
Directory Traversal

*
  • M
Directory Traversal

<5.2.6.dfsg.1-3
  • H
Numeric Errors

<5.2.2-1
  • C
Numeric Errors

<5.2.2-1
  • C
CVE-2008-0599

<5.2.6-1
  • C
CVE-2008-2051

<5.2.6-1
  • C
Out-of-Bounds

<5.2.6-1
  • M
Numeric Errors

<5.2.6-1
  • M
Access Restriction Bypass

<5.2.6-1
  • M
Information Exposure

<5.2.5-1
  • M
Improper Input Validation

<5.2.5-1
  • M
CVE-2007-5898

<5.2.5-1
  • H
CVE-2007-5424

*
  • M
CVE-2007-4889

*
  • M
Improper Input Validation

<5.2.5-1
  • H
Directory Traversal

<5.2.5-1
  • M
Improper Input Validation

<5.2.5-1
  • M
Improper Input Validation

<5.2.5-1
  • M
Arbitrary Code Injection

<5.2.3-1
  • M
CVE-2007-4670

<5.2.4-1
  • H
Out-of-Bounds

<5.2.4-1
  • H
Directory Traversal

<5.2.4-1
  • H
Out-of-Bounds

<5.2.4-1
  • H
CVE-2007-4659

<5.2.4-1
  • H
Resource Management Errors

<5.2.4-1
  • H
CVE-2007-4658

<5.2.4-1
  • H
Out-of-Bounds

<5.2.4-1
  • M
Link Following

<5.2.4-1
  • H
Access Restriction Bypass

<5.2.4-1
  • M
Improper Input Validation

<5.2.4-1
  • H
Arbitrary Code Injection

*
  • H
CVE-2007-4255

*
  • M
Improper Input Validation

<5.2.4-1
  • M
Improper Input Validation

<5.2.4-1
  • M
Access Restriction Bypass

<5.2.4-1
  • H
Out-of-Bounds

*
  • M
CVE-2007-3205

*
  • M
Access Restriction Bypass

<5.2.3-1
  • M
Numeric Errors

<5.2.3-1
  • C
CVE-2007-0448

*
  • M
CVE-2006-7205

*
  • M
CVE-2007-2519

<5.2.3-1
  • M
CVE-2007-2728

<5.2.3-1
  • L
CVE-2007-2727

<5.2.2-1
  • M
Out-of-Bounds

<5.2.2-1
  • L
Improper Input Validation

<5.2.2-1
  • H
Out-of-Bounds

<5.2.2-1
  • H
CVE-2007-2511

<5.2.2-1
  • M
CVE-2007-1900

<5.2.0-11
  • H
CVE-2007-1890

*
  • H
CVE-2007-1883

*
  • H
CVE-2007-1887

<5.2.0-11
  • H
CVE-2007-1889

<5.2.0-11
  • M
CVE-2007-1835

*
  • M
CVE-2007-1824

<5.2.0-11
  • H
CVE-2007-1777

<5.2.0-11
  • H
CVE-2007-1718

<5.2.0-11
  • M
CVE-2007-1717

<5.2.2-1
  • M
CVE-2007-1711

<5.2.0-9
  • M
Deserialization of Untrusted Data

<5.2.0-9
  • H
CVE-2007-1700

<5.2.0-9
  • M
CVE-2007-1710

*
  • H
CVE-2007-1649

<5.2.2-1
  • H
Arbitrary Code Injection

*
  • M
CVE-2007-1583

<5.2.0-11
  • M
CVE-2007-1582

*
  • M
CVE-2007-1521

<5.2.0-11
  • M
CVE-2007-1522

<5.2.2-1
  • M
CVE-2007-1484

<5.2.2-1
  • H
Access Restriction Bypass

<5.2.2-1
  • H
CVE-2007-1453

<5.2.0-11
  • M
Access Restriction Bypass

<5.2.2-1
  • M
CVE-2007-1454

<5.2.0-11
  • H
Out-of-Bounds

*
  • M
CVE-2007-1396

<5.2.2-1
  • C
CVE-2007-1399

<5.2.2-1
  • M
CVE-2007-1375

<5.2.0-11
  • H
CVE-2007-1376

<5.2.0-11
  • M
CVE-2007-1380

<5.2.0-11
  • M
CVE-2007-1286

<5.2.0-11
  • H
Out-of-Bounds

<5.2.2-1
  • M
Out-of-Bounds

<5.2.0-9
  • M
CVE-2007-0907

<5.2.0-9
  • H
Out-of-Bounds

<5.2.0-9
  • H
CVE-2007-0909

<5.2.0-9
  • M
Improper Input Validation

<5.2.0-9
  • H
CVE-2007-0911

<5.2.2-1
  • H
CVE-2007-0905

<5.2.0-9
  • C
CVE-2007-0910

<5.2.0-9
  • M
Improper Input Validation

*
  • H
CVE-2006-5706

<5.2.0-1
  • H
CVE-2006-5465

<5.1.6-6
  • C
Arbitrary Code Injection

<5.1.6-5
  • H
Race Condition

<5.2.0-1
  • M
CVE-2006-4625

<5.2.0-1
  • H
CVE-2006-4481

<5.1.6-1
  • L
Numeric Errors

<5.1.6-1
  • C
CVE-2006-4485

<5.1.6-1
  • H
CVE-2006-4483

<5.1.6-1
  • H
Out-of-Bounds

<5.1.6-1
  • H
CVE-2006-4433

<5.1.4-0.1
  • M
CVE-2006-4023

*
  • M
CVE-2006-4020

<5.1.6-1
  • M
Access Restriction Bypass

<5.1.6-1
  • H
CVE-2006-3016

<5.1.4-0.1
  • H
CVE-2006-3018

<5.1.4-0.1
  • H
CVE-2006-3017

<5.1.4-0.1
  • M
CVE-2006-2660

<5.1.6-1
  • M
CVE-2006-2563

<5.1.6-1
  • M
Resource Management Errors

<5.1.4-0.1
  • M
CVE-2006-1990

<5.1.4-0.1
  • M
Resource Management Errors

<5.1.4-0.1
  • M
CVE-2006-1608

<5.1.4-0.1
  • L
CVE-2006-1494

<5.1.4-0.1
  • M
Cross-site Scripting (XSS)

<5.1.4-0.1
  • M
CVE-2006-1490

<5.1.4-0.1
  • M
CVE-2006-1015

<5.1.4-0.1
  • M
CVE-2006-1014

<5.1.4-0.1
  • M
Directory Traversal

*
  • L
Cross-site Scripting (XSS)

<5.1.2-1
  • H
Use of Externally-Controlled Format String

<5.1.2-1
  • M
Arbitrary Code Injection

<5.1.2-1
  • M
CVE-2005-4154

<5.1.1-1
  • M
CVE-2005-3883

<5.1.1-1
  • M
CVE-2005-3353

<5.1.1-1
  • M
CVE-2005-3389

<5.1.1-1
  • H
CVE-2005-3390

<5.1.1-1
  • M
CVE-2005-3388

<5.1.1-1
  • H
CVE-2005-3392

<5.1.1-1
  • H
CVE-2005-3391

<5.1.1-1
  • M
CVE-2005-3319

<5.1.1-1
  • M
CVE-2005-3054

<5.0.5-2
  • M
CVE-2005-2498

<5.0.5-1
  • M
CVE-2002-1954

<5.1.1-1