imagemagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the imagemagick package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Write-what-where Condition

*
  • L
Divide By Zero

*
  • L
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • L
Integer Overflow or Wraparound

*
  • L
Reliance on Undefined

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
OS Command Injection

*
  • M
Out-of-bounds Write

<8:6.9.11.24+dfsg-1
  • H
Buffer Overflow

<8:6.9.11.60+dfsg-1.5
  • M
CVE-2022-44268

<8:6.9.11.60+dfsg-1.6
  • M
Out-of-bounds Write

<8:6.9.12.98+dfsg1-2
  • H
Divide By Zero

<8:6.9.11.60+dfsg-1.5
  • H
Integer Overflow or Wraparound

<8:6.9.11.60+dfsg-1.5
  • H
Incorrect Type Conversion or Cast

<8:6.9.11.60+dfsg-1.5
  • M
Divide By Zero

<8:6.9.11.60+dfsg-1.5
  • M
Divide By Zero

<8:6.9.11.60+dfsg-1.5
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • M
Out-of-bounds Write

<8:6.9.12.98+dfsg1-2
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • M
Divide By Zero

<8:6.9.11.57+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • M
Out-of-bounds Write

<8:6.9.12.98+dfsg1-2
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • H
Memory Leak

<8:6.9.11.57+dfsg-1
  • M
Improper Resource Shutdown or Release

<8:6.9.11.60+dfsg-1.6
  • M
Improper Input Validation

<8:6.9.11.60+dfsg-1.5
  • H
Out-of-bounds Write

<8:6.9.11.24+dfsg-1
  • L
Exposure of Resource to Wrong Sphere

<8:6.9.11.60+dfsg-1.5
  • H
Use of Uninitialized Resource

<8:6.9.11.24+dfsg-1
  • L
Out-of-bounds Read

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.11.24+dfsg-1
  • H
Information Exposure

<8:6.9.11.60+dfsg-1.5
  • M
Integer Overflow or Wraparound

<8:6.9.11.57+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Divide By Zero

<8:6.9.11.24+dfsg-1
  • L
Resource Exhaustion

<8:6.9.11.24+dfsg-1
  • L
Out-of-bounds Read

<8:6.9.9.39+dfsg-1
  • L
Divide By Zero

<8:6.9.12.98+dfsg1-2
  • L
Out-of-bounds Read

<8:6.9.10.8+dfsg-1
  • L
Divide By Zero

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.14+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.14+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.14+dfsg-1
  • L
Buffer Underflow

*
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • M
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
CVE-2025-43965

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.10.23+dfsg-1
  • M
Integer Overflow or Wraparound

<8:6.9.12.98+dfsg1-2
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • M
Out-of-Bounds

<8:6.9.10.14+dfsg-1
  • M
Heap-based Buffer Overflow

<8:6.9.12.98+dfsg1-2
  • L
CVE-2025-46393

*
  • M
Out-of-bounds Write

<8:6.9.12.98+dfsg1-2
  • H
Out-of-bounds Write

<8:6.9.12.98+dfsg1-2
  • M
Out-of-bounds Write

<8:6.9.11.24+dfsg-1
  • H
Divide By Zero

<8:6.9.11.60+dfsg-1.5
  • L
Reachable Assertion

<8:6.9.7.4+dfsg-13
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-9
  • H
Out-of-bounds Read

<8:6.9.10.2+dfsg-2
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • H
Out-of-bounds Write

<8:6.9.11.24+dfsg-1
  • M
Divide By Zero

<8:6.9.11.24+dfsg-1
  • M
Divide By Zero

<8:6.9.11.60+dfsg-1.5
  • L
Out-of-bounds Read

<8:6.9.11.24+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.11.24+dfsg-1
  • M
Divide By Zero

<8:6.9.11.24+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-11
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-6
  • M
Divide By Zero

<8:6.9.11.60+dfsg-1.5
  • M
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • H
Out-of-bounds Read

<8:6.9.11.24+dfsg-1
  • H
Out-of-bounds Write

<8:6.9.10.23+dfsg-2.1
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-4
  • H
Out-of-bounds Write

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-10
  • M
NULL Pointer Dereference

<8:6.9.7.4+dfsg-2
  • H
XML Injection

<8:6.9.11.57+dfsg-1
  • H
Out-of-bounds Read

<8:6.9.11.24+dfsg-1
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.11.24+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Use After Free

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-6
  • M
Divide By Zero

<8:6.9.11.24+dfsg-1
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Divide By Zero

<8:6.9.11.57+dfsg-1
  • H
Out-of-bounds Write

<8:6.9.7.4+dfsg-1
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • H
Out-of-bounds Write

<8:6.9.11.24+dfsg-1
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Excessive Iteration

<8:6.9.10.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-1
  • H
Out-of-bounds Write

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • M
Excessive Iteration

<8:6.9.9.34+dfsg-3
  • H
Improper Initialization

<8:6.9.11.24+dfsg-1
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • M
Use After Free

<8:6.9.12.98+dfsg1-2
  • M
Out-of-bounds Write

<8:6.9.12.98+dfsg1-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • M
Improper Input Validation

<8:6.9.12.98+dfsg1-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • C
Out-of-bounds Read

*
  • L
Out-of-Bounds

<8:6.9.9.39+dfsg-1
  • H
Integer Overflow or Wraparound

<8:6.9.11.60+dfsg-1.5
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • H
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.10.14+dfsg-1
  • H
Integer Overflow or Wraparound

<8:6.9.11.60+dfsg-1.5
  • M
Out-of-bounds Read

<8:6.9.10.14+dfsg-1
  • M
Out-of-bounds Read

<8:6.9.11.24+dfsg-1
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Divide By Zero

<8:6.9.11.24+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • H
Out-of-bounds Write

<8:6.9.10.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.14+dfsg-1
  • M
Out-of-bounds Write

<8:6.9.10.2+dfsg-2
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • H
Out-of-bounds Read

<8:6.9.11.24+dfsg-1
  • L
Divide By Zero

<8:6.9.11.24+dfsg-1
  • L
Unchecked Return Value

<8:6.9.10.8+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • H
Out-of-Bounds

<8:6.9.10.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.11.24+dfsg-1
  • L
Divide By Zero

<8:6.9.11.24+dfsg-1
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-11
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.10.2+dfsg-2
  • H
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • M
Divide By Zero

<8:6.9.11.60+dfsg-1.5
  • H
Use After Free

<8:6.9.10.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • M
Heap-based Buffer Overflow

<8:6.9.11.57+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-9
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-13
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-11
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • L
Out-of-bounds Write

<8:6.9.11.24+dfsg-1
  • H
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-6
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Out-of-bounds Read

<8:6.9.10.14+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.14+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.11.24+dfsg-1
  • C
Out-of-bounds Write

<8:6.9.10.8+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Divide By Zero

<8:6.9.11.24+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-9
  • M
Out-of-bounds Read

<8:6.9.7.4+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Out-of-bounds Write

<8:6.9.7.4+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Out-of-bounds Read

<8:6.9.10.14+dfsg-1
  • M
Allocation of Resources Without Limits or Throttling

<8:6.9.10.14+dfsg-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.9.34+dfsg-3
  • L
Out-of-bounds Write

<8:6.9.11.24+dfsg-1
  • M
Out-of-bounds Read

<8:6.9.9.39+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-13
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-10
  • H
Out-of-bounds Write

<8:6.9.11.24+dfsg-1
  • H
Double Free

<8:6.9.7.4+dfsg-1
  • H
Use After Free

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
NULL Pointer Dereference

<8:6.9.7.4+dfsg-2
  • H
Use of Uninitialized Resource

<8:6.9.7.4+dfsg-9
  • H
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-13
  • H
Out-of-bounds Write

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Out-of-bounds Read

<8:6.9.11.24+dfsg-1
  • H
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Use After Free

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.11.24+dfsg-1
  • L
NULL Pointer Dereference

<8:6.9.10.2+dfsg-2
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • M
Use After Free

<8:6.9.10.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Double Free

<8:6.9.9.39+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Improper Initialization

<8:6.9.11.24+dfsg-1
  • H
Use After Free

<8:6.9.11.60+dfsg-1.5
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • M
Out-of-bounds Read

<8:6.9.7.4+dfsg-13
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • L
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • M
NULL Pointer Dereference

<8:6.9.11.57+dfsg-1
  • L
Memory Leak

<8:6.9.11.60+dfsg-1.5
  • M
Out-of-Bounds

<8:6.9.7.4+dfsg-15
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.2+dfsg-2
  • H
Out-of-bounds Read

<8:6.9.10.14+dfsg-1
  • M
Information Exposure

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • L
Divide By Zero

<8:6.9.9.34+dfsg-3
  • H
Out-of-bounds Read

<8:6.9.10.23+dfsg-2.1
  • L
Out-of-Bounds

*
  • H
Out-of-bounds Write

<8:6.9.10.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • C
Out-of-Bounds

<8:6.9.7.4+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • C
NULL Pointer Dereference

<8:6.9.10.8+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.7.4+dfsg-13
  • M
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
NULL Pointer Dereference

<8:6.9.6.5+dfsg-1
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-15
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • L
Reachable Assertion

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • H
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • L
Integer Overflow or Wraparound

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • L
Excessive Iteration

<8:6.9.9.34+dfsg-3
  • M
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • M
Out-of-bounds Read

<8:6.9.11.24+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • L
Use After Free

<8:6.9.7.4+dfsg-15
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • M
Out-of-bounds Write

<8:6.9.6.2+dfsg-2
  • L
Out-of-bounds Read

<8:6.9.11.24+dfsg-1
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.7.4+dfsg-4
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • M
Use After Free

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-13
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Memory Leak

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • H
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • H
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • C
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-16
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • M
Improper Access Control

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Out-of-bounds Read

<8:6.9.9.39+dfsg-1
  • L
Excessive Iteration

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Out-of-bounds Read

<8:6.9.11.24+dfsg-1
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-15
  • L
Improper Initialization

<8:6.9.11.24+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • M
Reachable Assertion

<8:6.9.7.4+dfsg-14
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
NULL Pointer Dereference

<8:6.9.11.24+dfsg-1
  • M
Information Exposure

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • H
Use After Free

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Out-of-Bounds

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.39+dfsg-1
  • M
Resource Exhaustion

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • L
Incorrect Calculation

<8:6.9.7.4+dfsg-13
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.9.7.4+dfsg-14
  • M
Out-of-bounds Read

<8:6.9.7.4+dfsg-13
  • M
Resource Management Errors

<8:6.9.6.2+dfsg-2
  • M
Error Handling

<8:6.9.7.4+dfsg-1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • H
Excessive Iteration

<8:6.9.7.4+dfsg-12
  • L
Out-of-bounds Read

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • C
Out-of-Bounds

<8:6.8.9.9-4
  • M
Out-of-Bounds

<8:6.9.6.5+dfsg-1
  • H
Out-of-bounds Read

<8:6.9.7.4+dfsg-12
  • H
CVE-2016-8677

<8:6.9.6.2+dfsg-1
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
Use After Free

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • L
Out-of-bounds Read

*
  • H
Resource Management Errors

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Information Exposure

<8:6.9.10.14+dfsg-1
  • M
Divide By Zero

<8:6.9.6.2+dfsg-2
  • L
Reachable Assertion

<8:6.9.7.4+dfsg-12
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.8.9.9-4
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.2+dfsg-2
  • L
Excessive Iteration

<8:6.9.9.34+dfsg-3
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-15
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Use After Free

<8:6.9.7.4+dfsg-13
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
Out-of-bounds Read

<8:6.9.7.4+dfsg-15
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-9
  • H
CVE-2014-9804

<8:6.8.9.9-4
  • M
Out-of-bounds Write

<8:6.9.6.2+dfsg-2
  • C
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Improper Check for Unusual or Exceptional Conditions

<8:6.9.7.4+dfsg-15
  • L
Reachable Assertion

<8:6.9.7.4+dfsg-14
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Numeric Errors

<7:6.5.1.0-1.1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.10.8+dfsg-1
  • M
Resource Exhaustion

<8:6.9.7.4+dfsg-12
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Numeric Errors

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • L
Improper Input Validation

<8:6.9.7.4+dfsg-15
  • H
CVE-2017-11450

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • C
Improper Access Control

<8:6.8.9.9-7.1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-14
  • H
Improper Input Validation

<8:6.6.9.7-6
  • H
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-7
  • C
Improper Access Control

<8:6.9.7.4+dfsg-1
  • M
Improper Input Validation

<8:6.9.7.4+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-15
  • M
Out-of-bounds Read

<8:6.8.9.9-1
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-Bounds

<8:6.7.7.10-6
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Out-of-Bounds

<8:6.9.7.4+dfsg-1
  • M
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-12
  • H
Out-of-bounds Read

<8:6.9.7.4+dfsg-15
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-15
  • M
Improper Data Handling

<8:6.9.6.2+dfsg-2
  • M
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • M
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • M
Out-of-Bounds

<7:6.3.7.9.dfsg1-2.1
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • M
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • C
CVE-2004-0981

<6:6.0.6.2-1.5
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-15
  • M
Improper Input Validation

<8:6.9.6.5+dfsg-1
  • H
Integer Overflow or Wraparound

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • L
Access Restriction Bypass

<8:6.9.6.2+dfsg-2
  • L
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • C
Use After Free

<8:6.9.9.34+dfsg-3
  • H
CVE-2004-0827

<5:6.0.7.1-1
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.8.9.9-6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.8.9.9-6
  • L
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • M
CVE-2015-8896

<8:6.8.9.9-7
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
NULL Pointer Dereference

<8:6.8.9.9-7
  • M
Double Free

<8:6.8.9.9-6
  • C
NULL Pointer Dereference

<8:6.9.6.2+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-13
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • H
Improper Input Validation

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-2
  • M
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Resource Management Errors

<8:6.8.9.9-4
  • C
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Directory Traversal

<8:6.9.5.7+dfsg-1
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • M
CVE-2017-11352

<8:6.9.7.4+dfsg-12
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • M
CVE-2014-9838

<8:6.8.9.9-4
  • L
Resource Exhaustion

<8:6.9.9.34+dfsg-3
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • L
Excessive Iteration

<8:6.9.9.34+dfsg-3
  • H
Improper Access Control

<8:6.8.9.9-4
  • M
Out-of-Bounds

<8:6.8.9.9-4
  • H
Resource Exhaustion

<8:6.8.9.9-4
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Out-of-bounds Read

<8:6.8.9.9-4
  • M
Resource Management Errors

<8:6.8.9.9-4
  • M
Excessive Iteration

<8:6.9.7.4+dfsg-12
  • M
Unchecked Return Value

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • H
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Out-of-bounds Write

<8:6.9.7.0+dfsg-2
  • H
Out-of-Bounds

<8:6.9.6.6+dfsg-1
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
Out-of-bounds Write

<8:6.9.6.2+dfsg-2
  • M
Unchecked Return Value

<8:6.9.6.2+dfsg-2
  • L
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • M
Improper Input Validation

<8:6.8.9.9-4
  • H
Improper Access Control

<8:6.8.9.9-4
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • H
CVE-2017-11449

<8:6.9.7.4+dfsg-12
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Information Exposure

<8:6.9.7.4+dfsg-14
  • M
NULL Pointer Dereference

<8:6.9.9.34+dfsg-3
  • C
Out-of-bounds Read

<8:6.9.7.4+dfsg-15
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.8.9.9-6
  • H
Resource Management Errors

<8:6.8.9.9-4
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.9.34+dfsg-3
  • L
Integer Overflow or Wraparound

<8:6.9.9.34+dfsg-3
  • M
Improper Input Validation

<8:6.9.9.34+dfsg-3
  • H
Out-of-bounds Write

<8:6.7.7.10+dfsg-1
  • M
Resource Exhaustion

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.7.4.0-4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.6.9.7-7
  • H
CVE-2007-0770

<7:6.2.4.5.dfsg1-0.14
  • C
NULL Pointer Dereference

<8:6.9.6.2+dfsg-2
  • M
Out-of-Bounds

<7:6.2.4.5.dfsg1-0.11
  • C
Out-of-Bounds

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • M
CVE-2005-1739

<6:6.0.6.2-2.4
  • L
Improper Input Validation

<8:6.9.7.4+dfsg-14
  • H
Resource Exhaustion

<8:6.8.9.9-4
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Numeric Errors

<8:6.8.9.9-1
  • L
CVE-2012-3437

<8:6.7.7.10-3
  • C
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.8.9.9-3
  • H
CVE-2005-0397

<6:6.0.6.2-2.2
  • H
Resource Management Errors

<8:6.8.9.9-4
  • H
Excessive Iteration

<8:6.9.7.4+dfsg-16
  • M
Information Exposure

<8:6.9.6.2+dfsg-2
  • M
Resource Management Errors

<7:6.2.4.5.dfsg1-2
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
NULL Pointer Dereference

<8:6.8.9.9-4
  • L
Allocation of Resources Without Limits or Throttling

<8:6.9.7.4+dfsg-16
  • C
Numeric Errors

<8:6.9.7.4+dfsg-1
  • M
Out-of-Bounds

<8:6.8.9.9-4
  • M
NULL Pointer Dereference

<8:6.8.9.9-4
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.9.34+dfsg-3
  • M
Buffer Overflow

<8:6.9.6.2+dfsg-2
  • M
Double Free

<8:6.8.9.9-4
  • H
CVE-2006-2440

<6:6.2.4.5-0.6
  • H
Integer Overflow or Wraparound

<8:6.7.4.0-4
  • L
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-16
  • M
NULL Pointer Dereference

<8:6.9.7.4+dfsg-16
  • M
Out-of-bounds Read

<8:6.7.4.0-4
  • L
Missing Release of Resource after Effective Lifetime

*
  • M
Out-of-Bounds

<8:6.9.7.4+dfsg-15
  • M
Resource Exhaustion

<8:6.9.7.4+dfsg-12
  • M
Resource Exhaustion

<8:6.9.6.5+dfsg-1
  • M
Reachable Assertion

<8:6.9.7.4+dfsg-12
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
CVE-2005-0761

<5:6.0.2.5
  • M
Divide By Zero

<8:6.9.6.2+dfsg-2
  • M
CVE-2005-0760

<5:6.0.0-1
  • H
Improper Access Control

<8:6.8.9.9-4
  • L
CVE-2005-0406

*
  • L
CVE-2010-4167

<8:6.6.0.4-3
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.8.9.9-1
  • M
Resource Management Errors

<7:6.2.4.5.dfsg1-1
  • M
Excessive Iteration

<8:6.9.7.4+dfsg-12
  • C
Improper Control of Dynamically-Managed Code Resources

<8:6.8.9.9-4
  • L
Resource Management Errors

*
  • M
Missing Release of Resource after Effective Lifetime

<8:6.9.7.4+dfsg-12
  • H
CVE-2006-5868

<7:6.2.4.5.dfsg1-0.11
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-Bounds

<8:6.9.6.5+dfsg-1
  • M
Out-of-bounds Read

<8:6.8.9.9-7
  • M
Numeric Errors

<7:6.2.4.5.dfsg1-2
  • M
CVE-2006-4144

<7:6.2.4.5.dfsg1-0.10
  • C
Error Handling

<8:6.8.9.9-4
  • H
Resource Management Errors

<8:6.9.6.2+dfsg-2
  • M
Improper Input Validation

<8:6.9.6.2+dfsg-2
  • M
Resource Exhaustion

<8:6.7.4.0-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.8.9.9-4
  • C
Error Handling

<8:6.8.9.9-4
  • M
CVE-2005-4601

<6:6.2.4.5-0.6
  • M
CVE-2005-0759

<5:6.0.0-1
  • M
Improper Input Validation

<8:6.8.9.9-4
  • M
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Read

<8:6.8.9.9-4
  • M
Numeric Errors

<7:6.2.4.5.dfsg1-1
  • C
Integer Overflow or Wraparound

<8:6.9.6.2+dfsg-2
  • M
Out-of-bounds Write

<8:6.9.6.2+dfsg-2
  • M
CVE-2006-3743

<7:6.2.4.5.dfsg1-0.10
  • M
Out-of-bounds Read

<8:6.8.9.9-1
  • M
Improper Input Validation

<8:6.8.9.9-4
  • H
Resource Management Errors

<8:6.9.7.0+dfsg-2
  • C
Improper Access Control

<8:6.9.6.2+dfsg-2
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.6.9.7-6
  • H
Buffer Overflow

<8:6.7.7.10+dfsg-1
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Improper Access Control

<8:6.9.6.2+dfsg-2
  • M
Out-of-Bounds

<7:6.2.4.5.dfsg1-2
  • M
Use of Externally-Controlled Format String

<6:6.2.4.5-0.6
  • M
CVE-2005-1275

<6:6.0.6.2-2.3
  • M
Out-of-bounds Read

<8:6.9.6.2+dfsg-2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.8.9.9-6
  • L
CVE-2009-3736

<6:6.2.3.1-1
  • C
Out-of-Bounds

<8:6.8.9.9-4
  • H
Out-of-Bounds

<8:6.9.6.2+dfsg-2
  • H
Integer Overflow or Wraparound

<8:6.8.9.9-7
  • M
Out-of-bounds Read

<8:6.8.9.9-4
  • H
Improper Access Control

<8:6.8.9.9-4
  • M
Out-of-Bounds

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • M
Improper Input Validation

<8:6.8.9.9-4
  • M
Out-of-bounds Read

<8:6.8.9.9-4
  • M
Out-of-bounds Read

<8:6.8.9.9-1
  • H
Integer Overflow or Wraparound

<8:6.6.9.7-7
  • H
Out-of-bounds Write

<8:6.7.7.10+dfsg-1
  • M
Numeric Errors

<7:6.2.4.5.dfsg1-2
  • M
Numeric Errors

<7:6.2.4.5.dfsg1-0.10
  • H
CVE-2005-0762

<5:6.0.0-1
  • H
CVE-2005-0005

<6:6.0.6.2-2.1
  • M
CVE-2003-0455

<4:5.5.7-1
  • M
Numeric Errors

<7:6.2.4.5.dfsg1-1