Direct Vulnerabilities

Known vulnerabilities in the dovecot package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2026-0394

*
  • L
CVE-2026-27856

*
  • L
CVE-2025-59031

*
  • L
CVE-2026-27860

*
  • L
CVE-2026-27857

*
  • L
CVE-2026-27855

*
  • L
CVE-2025-59028

*
  • L
CVE-2026-27858

*
  • L
CVE-2025-59032

*
  • L
CVE-2026-27859

*
  • L
CVE-2026-24031

*
  • L
CVE-2025-30189

<1:2.4.1+dfsg1-7
  • H
NULL Pointer Dereference

<1:2.3.10.1+dfsg1-1
  • L
CVE-2024-23185

<1:2.3.21.1+dfsg1-1
  • C
Out-of-bounds Write

<1:2.3.7.2-1
  • M
Resource Exhaustion

<1:2.2.34-1
  • M
Arbitrary Command Injection

<1:2.3.13+dfsg1-2
  • H
CVE-2019-11499

<1:2.3.4.1-5
  • L
Access Restriction Bypass

<1:1.2.15-1
  • H
Improper Input Validation

<1:2.2.27-3
  • M
Improper Certificate Validation

<1:2.3.4.1-1
  • M
Access Restriction Bypass

<1.2.13-1
  • L
Access Restriction Bypass

<1:1.0.15-2.2
  • M
Access Restriction Bypass

<1:1.2.8-1
  • L
Improper Authentication

<1:2.2.9-1
  • M
CVE-2007-2231

<1.0.rc29-1
  • L
CVE-2006-2414

<1.0.beta8-1
  • L
Configuration

<1:2.0.13-1
  • M
Configuration

<1:1.0.12-1
  • M
Access Restriction Bypass

<1:1.2.15-1
  • H
Improper Authentication

<1:2.3.19.1+dfsg1-2
  • M
Insufficient Comparison

<1:2.3.16+dfsg1-1
  • M
Use After Free

<1:2.3.10.1+dfsg1-1
  • H
Information Exposure

<1:2.2.34-1
  • H
CVE-2019-10691

<1:2.3.4.1-4
  • L
Improper Input Validation

<1:2.0.18-1
  • M
Access Restriction Bypass

<1:1.2.15-1
  • L
Resource Management Errors

<1:1.2.11-1
  • L
Access Restriction Bypass

*
  • M
Improper Input Validation

<1:2.0.13-1
  • L
Access Restriction Bypass

<1:1.1.9-1
  • L
CVE-2007-4211

<1:1.0.3-2
  • M
Out-of-Bounds

<1:1.2.1-1
  • H
Out-of-bounds Read

<1:2.3.11.3+dfsg1-1
  • H
Out-of-Bounds

<1:2.3.4.1-3
  • H
Improper Input Validation

<1:2.3.13+dfsg1-1
  • H
Uncontrolled Recursion

<1:2.3.11.3+dfsg1-1
  • M
Improper Certificate Validation

<1:2.2.13-12
  • M
Directory Traversal

<1:2.3.13+dfsg1-2
  • M
CVE-2020-24386

<1:2.3.13+dfsg1-1
  • M
Directory Traversal

<1:1.0.15-2.3
  • M
Out-of-Bounds

<1:1.2.1-1
  • H
Out-of-bounds Read

<1:2.3.11.3+dfsg1-1
  • H
Missing Release of Resource after Effective Lifetime

<1:2.2.34-1
  • L
Access Restriction Bypass

<1:1.0.10-1
  • L
CVE-2024-23184

<1:2.3.21.1+dfsg1-1
  • H
CVE-2019-11494

<1:2.3.4.1-5
  • M
CVE-2010-3780

<1:1.2.15-1
  • M
Improper Input Validation

<1:2.2.27-1
  • L
Improper Authentication

<1:2.2.13~rc1-1
  • M
Improper Input Validation

<1:2.3.10.1+dfsg1-1
  • L
Directory Traversal

<1:2.0.13-1
  • M
Credentials Management

<1:1.0.13-1
  • M
CVE-2006-5973

<1.0.rc15-1
  • M
Out-of-Bounds

<1.0.beta3-1
  • L
Improper Input Validation

<1:1.1.7-1