xen vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xen package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-53241

*
  • L
CVE-2024-45819

*
  • L
CVE-2024-45818

*
  • L
CVE-2024-45817

*
  • L
CVE-2024-31145

*
  • L
CVE-2024-31146

*
  • L
CVE-2024-31143

*
  • L
CVE-2024-31142

*
  • L
CVE-2024-2201

*
  • L
CVE-2023-46842

*
  • L
CVE-2023-28746

*
  • L
CVE-2024-2193

*
  • L
CVE-2023-46841

<4.17.3+36-g54dacb5c02-1
  • L
CVE-2023-46840

<4.17.3+10-g091466ba55-1
  • L
CVE-2023-46839

<4.17.3+10-g091466ba55-1
  • L
Out-of-Bounds

<4.17.3+10-g091466ba55-1
  • M
CVE-2023-46836

<4.17.2+76-ge1f9cb16e2-1
  • M
CVE-2023-46835

<4.17.2+76-ge1f9cb16e2-1
  • M
CVE-2023-34327

<4.17.2+55-g0b56bed864-1
  • H
Out-of-bounds Write

<4.17.2+55-g0b56bed864-1
  • L
NULL Pointer Dereference

<4.17.2+55-g0b56bed864-1
  • M
CVE-2023-34328

<4.17.2+55-g0b56bed864-1
  • H
CVE-2023-34326

<4.17.2+55-g0b56bed864-1
  • H
Improper Check for Dropped Privileges

<4.17.2+55-g0b56bed864-1
  • L
Out-of-Bounds

<4.17.2+55-g0b56bed864-1
  • M
Divide By Zero

<4.17.2+55-g0b56bed864-1
  • M
Improper Locking

<4.17.2-1
  • L
CVE-2022-42336

<4.17.1+2-gb773c48e36-1
  • H
NULL Pointer Dereference

<4.17.1+2-gb773c48e36-1
  • H
Use After Free

<4.17.0+74-g3eac216e6e-1
  • M
Allocation of Resources Without Limits or Throttling

<4.17.0+74-g3eac216e6e-1
  • M
CVE-2022-42331

<4.17.0+74-g3eac216e6e-1
  • H
Allocation of Resources Without Limits or Throttling

<4.17.0+74-g3eac216e6e-1
  • M
CVE-2022-27672

<4.17.0+46-gaaf74a532c-1
  • H
CVE-2022-42330

<4.17.0+24-g2f8851c37f-2
  • M
CVE-2022-23824

<4.16.2+90-g0d39a6d1ae-1
  • M
Allocation of Resources Without Limits or Throttling

<4.16.2+90-g0d39a6d1ae-1
  • M
Allocation of Resources Without Limits or Throttling

<4.16.2+90-g0d39a6d1ae-1
  • M
Allocation of Resources Without Limits or Throttling

<4.16.2+90-g0d39a6d1ae-1
  • M
Allocation of Resources Without Limits or Throttling

<4.16.2+90-g0d39a6d1ae-1
  • M
Allocation of Resources Without Limits or Throttling

<4.16.2+90-g0d39a6d1ae-1
  • M
Allocation of Resources Without Limits or Throttling

<4.16.2+90-g0d39a6d1ae-1
  • M
Allocation of Resources Without Limits or Throttling

<4.16.2+90-g0d39a6d1ae-1
  • M
Allocation of Resources Without Limits or Throttling

<4.16.2+90-g0d39a6d1ae-1
  • H
CVE-2022-42327

<4.16.2+90-g0d39a6d1ae-1
  • M
Memory Leak

<4.16.2+90-g0d39a6d1ae-1
  • M
Memory Leak

<4.16.2+90-g0d39a6d1ae-1
  • H
Release of Invalid Pointer or Reference

<4.16.2+90-g0d39a6d1ae-1
  • M
Memory Leak

<4.16.2+90-g0d39a6d1ae-1
  • M
Memory Leak

<4.16.2+90-g0d39a6d1ae-1
  • M
Uncontrolled Recursion

<4.16.2+90-g0d39a6d1ae-1
  • M
Incomplete Cleanup

<4.16.2+90-g0d39a6d1ae-1
  • H
Incomplete Cleanup

<4.16.2+90-g0d39a6d1ae-1
  • M
Memory Leak

<4.16.2+90-g0d39a6d1ae-1
  • M
Incorrect Conversion between Numeric Types

<4.16.2+90-g0d39a6d1ae-1
  • M
Improper Handling of Exceptional Conditions

<4.16.2+90-g0d39a6d1ae-1
  • L
Improper Resource Shutdown or Release

<4.16.2+90-g0d39a6d1ae-1
  • M
Improper Resource Shutdown or Release

<4.16.2+90-g0d39a6d1ae-1
  • H
CVE-2022-33745

<4.16.2-1
  • M
Improper Cross-boundary Removal of Sensitive Data

<4.16.2-1
  • M
Exposure of Resource to Wrong Sphere

<4.16.2-1
  • H
Information Exposure

<4.16.2-1
  • H
Improper Cross-boundary Removal of Sensitive Data

<4.16.2-1
  • H
Information Exposure

<4.16.2-1
  • H
Memory Leak

<4.16.2-1
  • M
Incomplete Cleanup

<4.16.2-1
  • M
Incomplete Cleanup

<4.16.2-1
  • M
Incomplete Cleanup

<4.16.2-1
  • M
CVE-2022-26364

<4.16.2-1
  • M
CVE-2022-26363

<4.16.2-1
  • M
Race Condition

<4.16.2-1
  • M
Improper Locking

<4.16.1-1
  • H
CVE-2022-26361

<4.16.1-1
  • H
CVE-2022-26358

<4.16.1-1
  • H
Race Condition

<4.16.1-1
  • H
CVE-2022-26359

<4.16.1-1
  • H
CVE-2022-26360

<4.16.1-1
  • H
Improper Resource Shutdown or Release

<4.16.0+51-g0941d6cb-1
  • M
Incomplete Cleanup

<4.16.0+51-g0941d6cb-1
  • M
Integer Underflow

<4.16.0+51-g0941d6cb-1
  • H
Improper Handling of Exceptional Conditions

<4.14.3+32-g9de3671772-1
  • H
CVE-2021-28704

<4.14.3+32-g9de3671772-1
  • H
Allocation of Resources Without Limits or Throttling

<4.14.3+32-g9de3671772-1
  • H
CVE-2021-28707

<4.14.3+32-g9de3671772-1
  • H
Improper Handling of Exceptional Conditions

<4.14.3+32-g9de3671772-1
  • H
CVE-2021-28703

<4.14.0+80-gd101b417b7-1
  • H
CVE-2021-28708

<4.14.3+32-g9de3671772-1
  • H
Improper Privilege Management

<4.14.3+32-g9de3671772-1
  • H
Improper Privilege Management

<4.14.3-1
  • H
Improper Privilege Management

<4.14.3-1
  • M
CVE-2021-28699

<4.14.3-1
  • M
CVE-2021-28695

<4.14.3-1
  • M
Improper Authentication

<4.14.3-1
  • M
Allocation of Resources Without Limits or Throttling

<4.14.3-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.14.3-1
  • M
Incorrect Authorization

<4.14.3-1
  • M
Exposure of Resource to Wrong Sphere

<4.14.2+25-gb6a8c4f72d-1
  • M
CVE-2021-28690

<4.14.2+25-gb6a8c4f72d-1
  • M
Information Exposure

<4.14.2+25-gb6a8c4f72d-1
  • M
CVE-2021-28693

<4.14.2+25-gb6a8c4f72d-1
  • H
Improper Privilege Management

<4.14.2+25-gb6a8c4f72d-1
  • L
Out-of-Bounds

*
  • M
Missing Initialization of Resource

<4.14.2+25-gb6a8c4f72d-1
  • H
Improper Privilege Management

<4.14.0+80-gd101b417b7-1
  • M
CVE-2021-26933

<4.14.1+11-gb0b734a8b3-1
  • M
CVE-2021-3308

<4.14.1+11-gb0b734a8b3-1
  • M
NULL Pointer Dereference

<4.14.0+88-g1d1d1f5391-1
  • M
Allocation of Resources Without Limits or Throttling

<4.14.0+88-g1d1d1f5391-1
  • M
Allocation of Resources Without Limits or Throttling

<4.14.0+88-g1d1d1f5391-1
  • M
Allocation of Resources Without Limits or Throttling

<4.14.0+88-g1d1d1f5391-1
  • M
Uncontrolled Recursion

<4.14.0+88-g1d1d1f5391-1
  • M
NULL Pointer Dereference

<4.14.0+88-g1d1d1f5391-1
  • M
Memory Leak

<4.14.0+88-g1d1d1f5391-1
  • M
Use After Free

<4.14.0+88-g1d1d1f5391-1
  • H
Exposure of Resource to Wrong Sphere

<4.14.0+88-g1d1d1f5391-1
  • M
Untrusted Search Path

<4.14.0+88-g1d1d1f5391-1
  • L
Information Exposure

<4.14.0+88-g1d1d1f5391-1
  • H
Incorrect Permission Assignment for Critical Resource

<4.14.0+88-g1d1d1f5391-1
  • H
Off-by-one Error

<4.14.0+88-g1d1d1f5391-1
  • M
Information Exposure

<4.14.0+80-gd101b417b7-1
  • M
Out-of-Bounds

<4.14.0+80-gd101b417b7-1
  • H
Improper Privilege Management

<4.14.0+80-gd101b417b7-1
  • H
Race Condition

<4.14.0+80-gd101b417b7-1
  • H
Insufficient Verification of Data Authenticity

<4.14.0+80-gd101b417b7-1
  • H
Memory Leak

<4.14.0+80-gd101b417b7-1
  • M
Race Condition

<4.14.0+80-gd101b417b7-1
  • M
Improper Handling of Exceptional Conditions

<4.14.0+80-gd101b417b7-1
  • M
Resource Exhaustion

<4.14.0+80-gd101b417b7-1
  • M
Out-of-Bounds

<4.14.0+80-gd101b417b7-1
  • H
Race Condition

<4.14.0+80-gd101b417b7-1
  • M
Out-of-Bounds

<4.14.0+80-gd101b417b7-1
  • M
Arbitrary Code Injection

<4.14.0+80-gd101b417b7-1
  • H
Improper Privilege Management

<4.14.0+80-gd101b417b7-1
  • M
Improper Input Validation

<4.11.4+24-gddaaccbbab-1
  • H
Race Condition

<4.11.4+24-gddaaccbbab-1
  • M
Improper Handling of Exceptional Conditions

<4.11.4+24-gddaaccbbab-1
  • M
Improper Input Validation

<4.11.4+24-gddaaccbbab-1
  • H
Resource Exhaustion

<4.11.4+24-gddaaccbbab-1
  • H
Missing Authorization

<4.11.4-1
  • M
Improper Handling of Exceptional Conditions

<4.11.4-1
  • M
Information Exposure

<4.11.4-1
  • H
Out-of-Bounds

<4.11.4-1
  • M
CVE-2020-11742

<4.11.4-1
  • H
Improper Input Validation

<4.11.3+24-g14b62ab3e5-1
  • H
Memory Leak

<4.11.3+24-g14b62ab3e5-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.11.3+24-g14b62ab3e5-1
  • M
Race Condition

<4.11.3+24-g14b62ab3e5-1
  • M
Out-of-Bounds

<4.11.3+24-g14b62ab3e5-1
  • H
Incorrect Calculation

<4.11.3+24-g14b62ab3e5-1
  • M
Improper Input Validation

<4.11.3+24-g14b62ab3e5-1
  • M
CVE-2019-11135

<4.11.3+24-g14b62ab3e5-1
  • M
Improper Input Validation

<4.11.3+24-g14b62ab3e5-1
  • H
Race Condition

<4.11.3+24-g14b62ab3e5-1
  • H
Incorrect Permission Assignment for Critical Resource

<4.11.3+24-g14b62ab3e5-1
  • M
Use of Externally-Controlled Format String

<4.11.3+24-g14b62ab3e5-1
  • M
OS Command Injection

<4.11.3+24-g14b62ab3e5-1
  • H
Off-by-one Error

<4.11.3+24-g14b62ab3e5-1
  • C
Improper Privilege Management

<4.11.3+24-g14b62ab3e5-1
  • H
Improper Input Validation

<4.11.1+92-g6c33308a8d-1
  • H
Race Condition

<4.11.1+92-g6c33308a8d-1
  • M
Improper Input Validation

<4.11.1+92-g6c33308a8d-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.11.3+24-g14b62ab3e5-1
  • H
Improper Input Validation

<4.11.1+92-g6c33308a8d-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.11.3+24-g14b62ab3e5-1
  • M
Improper Input Validation

<4.11.1+92-g6c33308a8d-1
  • H
Race Condition

<4.11.1+92-g6c33308a8d-1
  • M
Improper Input Validation

<4.11.1+92-g6c33308a8d-1
  • H
Improper Input Validation

<4.11.1+92-g6c33308a8d-1
  • M
Improper Input Validation

<4.11.1+92-g6c33308a8d-1
  • M
Information Exposure

<4.11.1+92-g6c33308a8d-1
  • M
CVE-2019-11091

<4.11.1+92-g6c33308a8d-1
  • M
Information Exposure

<4.11.1+92-g6c33308a8d-1
  • M
Information Exposure

<4.11.1+92-g6c33308a8d-1
  • H
Incomplete Cleanup

<4.11.1-1
  • H
Reachable Assertion

<4.11.1-1
  • H
Information Exposure

<4.11.1-1
  • M
Improper Input Validation

<4.11.1-1
  • M
CVE-2018-19965

<4.11.1-1
  • M
CVE-2018-19964

<4.11.1-1
  • H
Interpretation Conflict

<4.11.1-1
  • H
NULL Pointer Dereference

<4.11.1-1
  • M
Incorrect Authorization

<4.11.1~pre.20180911.5acdd26fdc+dfsg-2
  • L
Resource Exhaustion

<4.11.1~pre.20180911.5acdd26fdc+dfsg-2
  • M
Resource Exhaustion

<4.11.1~pre.20180911.5acdd26fdc+dfsg-2
  • M
Information Exposure

<4.11.1~pre.20180911.5acdd26fdc+dfsg-2
  • M
CVE-2018-3646

<4.11.1~pre.20180911.5acdd26fdc+dfsg-2
  • C
Information Exposure

<4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9
  • M
CVE-2018-12891

<4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9
  • M
CVE-2018-12893

<4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9
  • C
Out-of-bounds Read

<4.4.0-1
  • C
Out-of-Bounds

<4.4.0-1
  • M
Information Exposure

<4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u8
  • M
Information Exposure

<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7
  • H
CVE-2018-10982

<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
  • H
Race Condition

<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
  • M
Information Exposure

<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
  • M
Out-of-bounds Write

<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
  • H
CVE-2018-7541

<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
  • M
Resource Exhaustion

<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
  • M
NULL Pointer Dereference

<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
  • M
Information Exposure

<4.11.1~pre+1.733450b39b-1
  • M
Information Exposure

<4.11.1~pre+1.733450b39b-1
  • H
Error Handling

<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
  • H
CVE-2017-17566

<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
  • M
Improper Input Validation

<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
  • H
Out-of-Bounds

<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
  • M
Information Exposure

<4.8.2+xsa245-0+deb9u1
  • M
Improper Check for Unusual or Exceptional Conditions

<4.8.2+xsa245-0+deb9u1
  • H
Use After Free

<4.8.2+xsa245-0+deb9u1
  • C
Out-of-Bounds

<4.8.2+xsa245-0+deb9u1
  • H
CVE-2017-15590

<4.8.2+xsa245-0+deb9u1
  • M
Resource Exhaustion

<4.8.1-1+deb9u3
  • H
Exposure of Resource to Wrong Sphere

<4.8.2+xsa245-0+deb9u1
  • H
Race Condition

<4.8.2+xsa245-0+deb9u1
  • M
Improper Input Validation

<4.8.2+xsa245-0+deb9u1
  • H
Resource Exhaustion

<4.8.2+xsa245-0+deb9u1
  • M
Information Exposure

<4.8.2+xsa245-0+deb9u1
  • H
CVE-2017-15594

<4.8.2+xsa245-0+deb9u1
  • M
Missing Release of Resource after Effective Lifetime

<4.8.2+xsa245-0+deb9u1
  • M
Missing Release of Resource after Effective Lifetime

<4.8.1-1
  • M
NULL Pointer Dereference

<4.8.2+xsa245-0+deb9u1
  • H
Out-of-bounds Read

<4.8.2+xsa245-0+deb9u1
  • M
Race Condition

<4.8.2+xsa245-0+deb9u1
  • H
CVE-2017-14319

<4.8.2+xsa245-0+deb9u1
  • H
Incorrect Calculation

<4.8.1-1+deb9u3
  • H
Buffer Overflow

<4.8.1-1+deb9u3
  • H
Race Condition

<4.8.1-1+deb9u3
  • M
Information Exposure

<4.8.1-1+deb9u3
  • H
Information Exposure

<4.8.1-1+deb9u3
  • C
Out-of-Bounds

<4.8.1-1+deb9u3
  • H
Resource Exhaustion

<4.8.1-1+deb9u3
  • M
CVE-2017-10919

<4.8.1-1+deb9u3
  • C
Race Condition

<4.8.1-1+deb9u3
  • H
Race Condition

<4.8.1-1+deb9u3
  • C
Improper Input Validation

<4.8.1-1+deb9u3
  • M
Improper Input Validation

<4.8.1-1+deb9u3
  • C
Out-of-Bounds

<4.8.1-1+deb9u3
  • C
CVE-2017-10912

<4.8.1-1+deb9u3
  • C
CVE-2017-10913

<4.8.1-1+deb9u3
  • C
NULL Pointer Dereference

<4.8.1-1+deb9u3
  • H
CVE-2017-8904

<4.8.1-1+deb9u1
  • H
Incorrect Calculation

<4.8.0~rc3-1
  • H
CVE-2017-8903

<4.8.1-1+deb9u1
  • L
Information Exposure

<4.3.0-1
  • H
Improper Validation of Array Index

<4.8.1-1
  • M
Improper Access Control

<4.8.0-1
  • M
Improper Access Control

<4.8.0-1
  • M
Improper Access Control

<4.8.0-1
  • M
Improper Access Control

<4.8.0-1
  • M
Improper Access Control

<4.8.0-1
  • M
Incorrect Calculation

<4.8.0-1
  • M
Information Exposure

<4.8.0-1
  • H
Access Restriction Bypass

<4.4.0-1
  • M
NULL Pointer Dereference

<4.8.0-1
  • L
Information Exposure

<4.8.0~rc3-1
  • H
Access Restriction Bypass

<4.8.0-1
  • M
Improper Input Validation

<4.8.0-1
  • H
Improper Input Validation

<4.8.0-1
  • H
Improper Input Validation

<4.8.0-1
  • M
Improper Input Validation

<4.8.0-1
  • H
Access Restriction Bypass

<4.8.0-1
  • H
Race Condition

<4.4.0-1
  • H
Access Restriction Bypass

<4.8.0-1
  • H
Improper Input Validation

<4.8.0-1
  • M
Race Condition

<4.8.0~rc3-1
  • H
Access Restriction Bypass

<4.8.0~rc3-1
  • M
Use After Free

<4.6.0-1
  • M
Out-of-Bounds

<4.8.0~rc3-1
  • M
Improper Input Validation

<4.8.0~rc3-1
  • H
Improper Access Control

<4.8.0~rc3-1
  • M
Improper Access Control

<4.8.0~rc3-1
  • M
Access Restriction Bypass

<4.8.0~rc3-1
  • M
CVE-2016-5242

<4.8.0~rc3-1
  • M
Resource Exhaustion

<4.4.0-1
  • H
Access Restriction Bypass

<4.8.0~rc3-1
  • H
Out-of-Bounds

<4.4.0-1
  • M
Integer Overflow or Wraparound

<4.4.0-1
  • H
Access Restriction Bypass

<4.8.0~rc3-1
  • H
Improper Access Control

<4.8.0~rc3-1
  • H
Out-of-Bounds

<4.4.0-1
  • L
Information Exposure

<4.8.0~rc3-1
  • L
Information Exposure

<4.8.0~rc3-1
  • H
Information Exposure

<4.8.0~rc3-1
  • M
Improper Input Validation

<4.8.0~rc3-1
  • M
CVE-2016-2271

<4.8.0~rc3-1
  • M
Code

<4.8.0~rc3-1
  • H
Improper Input Validation

<4.8.0~rc3-1
  • M
Security Features

<4.8.0~rc3-1
  • H
Resource Management Errors

<4.8.0~rc3-1
  • M
Improper Data Handling

<4.8.0~rc3-1
  • M
Code

<4.8.0~rc3-1
  • H
Security Features

<4.8.0~rc3-1
  • M
Security Features

<4.6.0-1
  • M
Resource Management Errors

<4.8.0~rc3-1
  • M
Resource Management Errors

<4.8.0~rc3-1
  • M
Improper Data Handling

<4.6.0-1
  • M
Resource Management Errors

<4.6.0-1
  • M
Resource Management Errors

<4.6.0-1
  • M
Resource Management Errors

<4.6.0-1
  • M
Out-of-Bounds

<4.6.0-1
  • M
Resource Management Errors

<4.6.0-1
  • H
Access Restriction Bypass

<4.6.0-1
  • M
Code

<4.8.0~rc3-1
  • M
Access Restriction Bypass

<4.8.0~rc3-1
  • H
Out-of-Bounds

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.0-1
  • H
Information Exposure

<4.4.0-1
  • H
Out-of-Bounds

<4.4.0-1
  • L
Access Restriction Bypass

<4.6.0-1
  • H
Out-of-bounds Write

<4.4.0-1
  • M
Resource Management Errors

<4.6.0-1
  • M
CVE-2015-4163

<4.6.0-1
  • H
Access Restriction Bypass

<4.4.0-1
  • M
Resource Management Errors

<4.4.0-1
  • M
Incorrect Authorization

<4.4.0-1
  • M
Access Restriction Bypass

<4.4.0-1
  • H
Out-of-Bounds

<4.4.0-1
  • L
Information Exposure

<4.6.0-1
  • M
Improper Input Validation

<4.4.1-9
  • M
Code

<4.4.1-9
  • M
Access Restriction Bypass

<4.2.0~rc2-1
  • L
Access Restriction Bypass

<4.4.1-9
  • M
Information Exposure

<4.4.1-8
  • M
Information Exposure

<4.4.1-8
  • H
Access Restriction Bypass

<4.4.1-8
  • L
Resource Management Errors

<4.4.1-7
  • M
Resource Management Errors

<4.4.1-3
  • H
CVE-2015-0361

<4.4.1-7
  • M
Code

<4.4.1-6
  • L
Code

*
  • M
Code

<4.4.1-5
  • M
Code

<4.4.1-5
  • L
Improper Input Validation

<4.4.1-4
  • L
Code

<4.4.1-4
  • L
Improper Input Validation

<4.4.1-4
  • M
Out-of-Bounds

<4.4.1-1
  • M
Access Restriction Bypass

<4.4.1-3
  • H
Resource Management Errors

<4.4.1-3
  • M
Access Restriction Bypass

<4.4.1-3
  • M
Race Condition

<4.4.1-3
  • M
Access Restriction Bypass

<4.4.1-1
  • L
Resource Management Errors

<4.4.1-4
  • L
Resource Management Errors

<4.4.1-4
  • L
Out-of-Bounds

<4.4.1-1
  • M
CVE-2014-3967

<4.4.1-1
  • M
CVE-2014-3968

<4.4.1-1
  • M
Access Restriction Bypass

<4.4.1-1
  • M
Improper Input Validation

<4.4.0-1
  • M
Numeric Errors

<4.4.0-1
  • M
Improper Input Validation

<4.4.1-1
  • H
Out-of-Bounds

<4.4.0-1
  • M
Resource Management Errors

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.0-1
  • M
Resource Management Errors

<4.4.0-1
  • L
Resource Management Errors

<4.2
  • M
Improper Input Validation

<4.1.0-1
  • M
Out-of-Bounds

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.0-1
  • M
Improper Input Validation

<4.4.0-1
  • M
Improper Input Validation

<4.4.0-1
  • L
Information Exposure

<4.4.0-1
  • L
CVE-2013-4369

<4.4.0-1
  • M
Out-of-Bounds

<4.4.0-1
  • M
Resource Management Errors

<4.4.0-1
  • M
Access Restriction Bypass

<4.4.0-1
  • H
Buffer Overflow

<4.2-1
  • L
Information Exposure

<4.4.0-1
  • M
Information Exposure

<4.4.0-1
  • L
Information Exposure

<4.4.0-1
  • H
Access Restriction Bypass

<4.3.0-1
  • L
Out-of-Bounds

<4.3.0-1
  • H
Access Restriction Bypass

<4.3.0-1
  • H
Resource Management Errors

<4.3.0-1
  • M
Access Restriction Bypass

<4.2.2-1
  • M
Information Exposure

<4.2.2-1
  • L
Access Restriction Bypass

<4.4.1-3
  • L
Out-of-Bounds

<4.2.2-1
  • H
Numeric Errors

<4.3.0-1
  • H
Numeric Errors

<4.3.0-1
  • H
CVE-2013-2196

<4.3.0-1
  • M
Improper Input Validation

<4.2.2-1
  • H
Access Restriction Bypass

<4.1.4-3
  • M
Access Restriction Bypass

<4.1.4-3
  • L
Improper Input Validation

<4.1.4-3
  • L
Improper Input Validation

<4.1.4-4
  • M
Out-of-Bounds

<4.1.4-4
  • M
CVE-2013-0153

<4.1.4-2
  • L
Configuration

<4.1.3-8
  • H
Buffer Overflow

<4.1.3-8
  • M
CVE-2012-5515

<4.1.3-5
  • M
Out-of-Bounds

<4.1.3-5
  • M
CVE-2012-5514

<4.1.3-6
  • M
Resource Management Errors

<4.1.3-8
  • H
Improper Input Validation

<4.1.3-5
  • M
Configuration

<4.1.3-5
  • M
CVE-2012-5510

<4.1.3-5
  • M
Resource Management Errors

<4.1.2-1
  • L
CVE-2012-0218

<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
  • L
Access Restriction Bypass

<4.1.3-1
  • L
CVE-2012-2934

<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
  • M
Improper Input Validation

<4.1.3-4
  • M
Resource Management Errors

<4.1.3-1
  • L
Improper Input Validation

<4.1.4-1
  • L
Improper Input Validation

<4.1.4-1
  • M
Improper Input Validation

<4.1.3-2
  • L
Improper Input Validation

<4.1.4-1
  • L
Improper Input Validation

<4.1.4-1
  • H
Improper Input Validation

<4.1.3-2
  • M
Information Exposure

<4.1.3-2
  • M
Access Restriction Bypass

<4.1.3-2
  • L
Numeric Errors

<4.1.4-1
  • M
Configuration

<4.1.3-2
  • L
Improper Input Validation

<4.1.4-1
  • L
Access Restriction Bypass

<4.1.4-1
  • L
Access Restriction Bypass

<4.1.4-1
  • H
Improper Input Validation

<4.1.3-2
  • M
Resource Management Errors

<4.1.3-4
  • M
Configuration

<4.1.3-4
  • L
Resource Management Errors

<4.1.3-4
  • M
CVE-2012-4536

<4.1.3-4
  • L
Improper Input Validation

<4.1.3-4
  • L
Improper Input Validation

<4.1.3-4
  • H
Out-of-Bounds

<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
  • M
Out-of-Bounds

<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
  • M
Resource Management Errors

<4.1.1-1
  • H
Access Restriction Bypass

<4.1.1-1
  • H
Numeric Errors

<4.1.1-1
  • M
CVE-2010-4255

<4.0.1-2
  • M
Resource Management Errors

<4.0.1-1