icedove vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the icedove package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • L
CVE-2017-7775

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • C
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • M
Improper Input Validation

<1:52.3.0-4~deb8u2
  • M
DEPRECATED: Use of Uninitialized Resource

<1:45.8.0-3~deb8u1
  • C
CVE-2017-5390

<1:45.8.0-3~deb8u1
  • M
Information Exposure

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Out-of-bounds Read

<1:52.3.0-4~deb8u2
  • H
Use After Free

<1:45.5.1-1~deb8u1
  • M
Security Features

<1:45.6.0-1~deb8u1
  • H
Security Features

<1:45.6.0-1~deb8u1
  • H
Improper Input Validation

<1:52.3.0-4~deb8u2
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • H
Information Exposure

<1:45.6.0-1~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • M
Information Exposure

<1:45.5.1-1~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • H
Use After Free

<1:52.2.1-4~deb8u1
  • M
Improper Input Validation

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:45.6.0-1~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • H
Information Exposure

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Integer Overflow or Wraparound

<1:45.5.1-1~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • H
Out-of-Bounds

<1:45.6.0-1~deb8u1
  • H
Information Exposure

<1:45.8.0-3~deb8u1
  • M
Improper Input Validation

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:45.6.0-1~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Error Handling

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • H
Improper Privilege Management

<1:52.3.0-4~deb8u2
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • H
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • H
Improper Access Control

<1:45.6.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • M
Information Exposure

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:45.6.0-1~deb8u1
  • C
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • M
Improper Input Validation

<1:45.5.1-1~deb8u1
  • C
Out-of-Bounds

<1:45.4.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.3.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.2.0-1~deb8u1
  • H
Out-of-Bounds

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.1.0-1~deb8u1
  • H
Out-of-Bounds

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1964

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Access Restriction Bypass

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Improper Data Handling

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Improper Data Handling

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1979

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1961

<38.7.0-1~deb8u1
  • M
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1960

<38.7.0-1~deb8u1
  • C
CVE-2016-1962

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1966

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • M
CVE-2016-1523

<38.6.0-1~deb8u1
  • H
Out-of-Bounds

<38.6.0-1~deb8u1
  • H
Out-of-Bounds

<38.6.0-1~deb8u1
  • C
Out-of-Bounds

<38.6.0-1~deb8u1
  • M
Improper Data Handling

<38.6.0-1~deb8u1
  • M
Information Exposure

<38.5.0-1~deb8u1
  • C
Numeric Errors

<38.5.0-1~deb8u1
  • H
Numeric Errors

<38.5.0-1~deb8u1
  • M
Numeric Errors

<38.5.0-1~deb8u1
  • C
Out-of-Bounds

<38.5.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Security Features

<38.4.0-1~deb8u1
  • M
Access Restriction Bypass

<38.4.0-1~deb8u1
  • C
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Code

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Security Features

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • M
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<31.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
CVE-2015-4488

<38.4.0-1~deb8u1
  • C
Out-of-Bounds

<38.4.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • H
Code

<31.8.0-1~deb8u1
  • H
Code

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • M
Cryptographic Issues

<31.8.0-1~deb8u1
  • L
Cryptographic Issues

<31.8.0-1~deb8u1
  • H
Out-of-Bounds

<31.7.0-1~deb8u1
  • M
CVE-2015-2713

<31.7.0-1~deb8u1
  • M
Out-of-Bounds

<31.7.0-1~deb8u1
  • H
CVE-2015-2708

<31.7.0-1~deb8u1
  • M
CVE-2015-0797

<31.7.0-1~deb8u1
  • H
CVE-2015-0815

<31.6.0-1
  • H
Access Restriction Bypass

<31.6.0-1
  • M
CVE-2015-0813

<31.6.0-1
  • M
Cross-site Request Forgery (CSRF)

<31.6.0-1
  • M
Access Restriction Bypass

<31.6.0-1
  • M
Out-of-Bounds

<31.5.0-1
  • H
CVE-2015-0836

<31.5.0-1
  • M
Information Exposure

<31.5.0-1
  • M
CVE-2015-0831

<31.5.0-1
  • M
Cross-site Request Forgery (CSRF)

<31.4.0-1
  • M
CVE-2014-8639

<31.4.0-1
  • H
CVE-2014-8634

<31.4.0-1
  • M
Out-of-Bounds

<31.3.0-1
  • M
CVE-2014-1592

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
CVE-2014-1577

<31.2.0-1
  • H
Out-of-Bounds

<31.2.0-1
  • H
CVE-2014-1581

<31.2.0-1
  • M
CVE-2014-1585

<31.2.0-1
  • M
CVE-2014-1586

<31.2.0-1
  • H
Out-of-Bounds

<31.2.0-1
  • H
CVE-2014-1574

<31.2.0-1
  • L
Cryptographic Issues

<31.3.0-1
  • M
Out-of-Bounds

<31.2.0-1
  • C
Use After Free

<31.2.0-1
  • H
CVE-2014-1567

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • M
Access of Uninitialized Pointer

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • H
Arbitrary Code Injection

<31.0-1
  • M
CVE-2014-1559

<31.0-1
  • M
CVE-2014-1560

<31.0-1
  • M
Access Restriction Bypass

<31.0-1
  • C
CVE-2014-1550

<31.0-1
  • C
CVE-2014-1547

<31.0-1
  • H
Arbitrary Code Injection

<31.0-1
  • H
Out-of-Bounds

<31.0-1
  • M
CVE-2014-1558

<31.0-1
  • H
CVE-2014-1555

<31.0-1
  • C
CVE-2014-1544

<31.2.0-1
  • M
Out-of-Bounds

<31.0~b1-1
  • C
Out-of-Bounds

<31.0~b1-1
  • C
CVE-2014-1545

<31.0~b1-1
  • C
CVE-2014-1541

<31.0~b1-1
  • C
CVE-2014-1537

<31.0~b1-1
  • C
CVE-2014-1536

<31.0~b1-1
  • C
CVE-2014-1538

<31.0~b1-1
  • C
CVE-2014-1533

<31.0~b1-1
  • H
CVE-2014-1540

<31.0~b1-1
  • C
Use After Free

<24.5.0-1
  • C
Buffer Overflow

<24.5.0-1
  • M
Out-of-bounds Write

<24.5.0-1
  • H
Improper Privilege Management

<24.5.0-1
  • M
Cross-site Scripting (XSS)

<24.5.0-1
  • H
Use After Free

<24.5.0-1
  • H
CVE-2014-1518

<24.5.0-1
  • C
Use After Free

<24.4.0-1
  • C
Improper Privilege Management

<24.4.0-1
  • H
Out-of-bounds Read

<24.4.0-1
  • C
Out-of-bounds Write

<24.4.0-1
  • C
Improper Privilege Management

<24.4.0-1
  • C
Out-of-bounds Read

<24.4.0-1
  • H
Out-of-bounds Write

<24.4.0-1
  • C
Out-of-Bounds

<24.4.0-1
  • H
Information Exposure

<24.4.0-1
  • H
Buffer Overflow

<24.4.0-1
  • M
Cross-site Scripting (XSS)

<24.2.0-1
  • M
Cross-site Scripting (XSS)

<24.2.0-1
  • H
Race Condition

<24.3.0-1
  • H
Origin Validation Error

<24.3.0-1
  • H
CVE-2014-1479

<24.3.0-1
  • H
CVE-2014-1481

<24.3.0-1
  • C
Use After Free

<24.3.0-1
  • M
Inadequate Encryption Strength

<24.3.0-1
  • H
Out-of-bounds Write

<24.3.0-1
  • C
CVE-2014-1477

<24.3.0-1
  • C
Use After Free

<24.2.0-1
  • C
CVE-2013-5609

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • C
Arbitrary Code Injection

<24.2.0-1
  • M
Cryptographic Issues

<24.2.0-1
  • C
CVE-2013-5615

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • M
Information Exposure

<24.2.0-1
  • M
Numeric Errors

<24.2.0-1
  • C
Out-of-Bounds

<17.0.10-1
  • C
CVE-2013-5597

<17.0.10-1
  • C
CVE-2013-5590

<17.0.10-1
  • C
CVE-2013-5600

<17.0.10-1
  • C
CVE-2013-5601

<17.0.10-1
  • C
CVE-2013-5599

<17.0.10-1
  • H
Out-of-Bounds

<17.0.10-1
  • M
Out-of-Bounds

<17.0.10-1
  • H
Resource Management Errors

<17.0.9-1
  • M
Out-of-Bounds

<17.0.9-1
  • H
Out-of-Bounds

<17.0.9-1
  • M
Out-of-Bounds

<17.0.9-1
  • M
Access Restriction Bypass

<17.0.9-1
  • C
Out-of-Bounds

<17.0.9-1
  • H
Improper Input Validation

<17.0.9-1
  • C
Out-of-Bounds

<17.0.9-1
  • C
CVE-2013-1701

<17.0.8-1
  • C
Improper Input Validation

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • M
Cross-site Scripting (XSS)

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • H
Out-of-Bounds

<17.0.7-1
  • H
Improper Input Validation

<17.0.7-1
  • H
Access Restriction Bypass

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • H
Access Restriction Bypass

<17.0.7-1
  • C
CVE-2013-1682

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • M
Out-of-Bounds

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • C
CVE-2013-0801

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
CVE-2013-0796

<17.0.5-1
  • C
CVE-2013-0788

<17.0.5-1
  • M
CVE-2013-0800

<17.0.5-1
  • C
Access Restriction Bypass

<17.0.7-1
  • M
Cross-site Scripting (XSS)

<17.0.5-1
  • H
Resource Management Errors

<17.0.5-1
  • M
Improper Certificate Validation

<17.0.5-1
  • H
Out-of-bounds Write

<17.0.5-1
  • H
Use After Free

<17.0.5-1
  • H
CVE-2013-0773

<17.0.5-1
  • H
Use After Free

<17.0.5-1
  • H
CVE-2013-0783

<17.0.5-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
CVE-2013-0769

<10.0.12-1
  • H
CVE-2013-0746

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Arbitrary Code Injection

<10.0.12-1
  • H
Integer Overflow or Wraparound

<10.0.12-1
  • C
Out-of-bounds Read

<10.0.12-1
  • M
Information Exposure

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • M
Improper Authentication

<10.0.12-1
  • C
Integer Overflow or Wraparound

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • H
CVE-2012-5842

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Out-of-Bounds

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • M
Arbitrary Code Injection

<10.0.10-1
  • M
Cross-site Scripting (XSS)

<10.0.10-1
  • M
Origin Validation Error

<10.0.9-1
  • M
Access Restriction Bypass

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Out-of-bounds Read

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
CVE-2012-3982

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Improper Privilege Management

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Access Restriction Bypass

<10.0.9-1
  • M
Improper Input Validation

<10.0.9-1
  • C
Use After Free

<10.0.7-1
  • H
Arbitrary Code Injection

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Out-of-Bounds

<10.0.7-1
  • M
Access Restriction Bypass

<10.0.7-1
  • H
Numeric Errors

<10.0.7-1
  • H
Out-of-bounds Write

<10.0.7-1
  • H
CVE-2012-3962

<10.0.7-1
  • C
Out-of-Bounds

<10.0.7-1
  • M
Information Exposure

<10.0.7-1
  • C
Out-of-bounds Write

<10.0.7-1
  • M
CVE-2012-1964

<10.0.6-1
  • M
Access Restriction Bypass

<10.0.6-1
  • H
Resource Management Errors

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • H
Resource Management Errors

<10.0.6-1
  • H
Out-of-Bounds

<10.0.6-1
  • C
CVE-2012-1967

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • M
Improper Input Validation

<10.0.6-1
  • M
CVE-2012-1955

<10.0.6-1
  • H
CVE-2012-1948

<10.0.6-1
  • M
Access Restriction Bypass

<10.0.6-1
  • M
CVE-2012-1950

<10.0.6-1
  • M
Cross-site Scripting (XSS)

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • M
Cross-site Scripting (XSS)

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • L
Information Exposure

<10.0.5-1
  • H
CVE-2012-1937

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • H
Resource Management Errors

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • H
Resource Management Errors

<10.0.5-1
  • M
Numeric Errors

<10.0.4-1
  • C
Resource Management Errors

<10.0.4-1
  • M
CVE-2012-0479

<10.0.4-1
  • C
CVE-2012-0467

<10.0.4-1
  • H
Access Restriction Bypass

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • C
Out-of-Bounds

<10.0.4-1
  • L
Access Restriction Bypass

<10.0.4-1
  • M
Incorrect Calculation

<10.0.4-1
  • M
Arbitrary Code Injection

<10.0.3-1
  • H
CVE-2012-0461

<10.0.3-1
  • H
CVE-2012-0462

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • H
Resource Management Errors

<10.0.3-1
  • M
Information Exposure

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • M
Cross-site Scripting (XSS)

<10.0.3-1
  • H
Access Restriction Bypass

<10.0.3-1
  • H
Resource Management Errors

<10.0.3-1
  • H
CVE-2012-0442

<10.0.3-1
  • M
Information Exposure

<7.0-1
  • C
Out-of-Bounds

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • M
Cross-site Scripting (XSS)

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • M
Information Exposure

<10.0.3-1
  • H
Out-of-Bounds

<10.0.3-1
  • H
Out-of-Bounds

<3.1.16-1
  • M
Cross-site Scripting (XSS)

<3.1.16-1
  • H
Improper Input Validation

<3.1.16-1
  • C
Numeric Errors

<3.1.15-1
  • L
Access Restriction Bypass

<3.1.15-1
  • M
Arbitrary Code Injection

<3.1.15-1
  • M
Access Restriction Bypass

<3.1.15-1
  • C
CVE-2011-2995

<3.1.15-1
  • M
Information Exposure

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • C
CVE-2011-2982

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • H
Configuration

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • C
CVE-2011-2376

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • C
CVE-2011-2365

<3.1.11-1
  • M
Access Restriction Bypass

<3.1.11-1
  • M
Arbitrary Code Injection

<3.1.11-1
  • C
CVE-2011-2374

<3.1.11-1
  • H
Resource Management Errors

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • C
Numeric Errors

<3.1.11-1
  • C
CVE-2011-0078

<3.1.10-1
  • C
CVE-2011-0074

<3.1.10-1
  • C
Resource Management Errors

<3.1.15-1+b1
  • C
CVE-2011-0075

<3.1.10-1
  • C
CVE-2011-0080

<3.1.10-1
  • M
Directory Traversal

<3.1.10-1
  • C
CVE-2011-0072

<3.1.10-1
  • C
CVE-2011-0069

<3.1.10-1
  • C
CVE-2011-0070

<3.1.10-1
  • C
CVE-2011-0077

<3.1.10-1
  • C
Resource Management Errors

<3.1.15-1+b1
  • M
Information Exposure

<17.0.2-1
  • C
Resource Management Errors

<3.0.11-2
  • C
CVE-2011-0053

<3.0.11-2
  • C
Out-of-Bounds

<3.0.11-2
  • M
Improper Input Validation

<3.0.11-2
  • C
Out-of-Bounds

<3.0.11-2
  • C
Resource Management Errors

<3.0.11-2
  • M
Cross-site Request Forgery (CSRF)

<3.0.11-2
  • H
Out-of-Bounds

<3.0.11-1
  • H
Out-of-Bounds

<3.0.11-1
  • H
Out-of-Bounds

<3.0.11-1
  • H
Improper Input Validation

<3.0.11-1
  • H
Out-of-Bounds

<3.0.10-1
  • H
Out-of-Bounds

<3.0.9-1
  • H
CVE-2010-3174

<3.0.9-1
  • H
CVE-2010-3182

<3.0.9-1
  • H
Out-of-Bounds

<3.0.9-1
  • M
Access Restriction Bypass

<3.0.9-1
  • H
Resource Management Errors

<3.0.9-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • M
Access Restriction Bypass

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • H
Resource Management Errors

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • H
CVE-2010-3169

<3.0.7-1
  • H
Numeric Errors

<3.0.7-1
  • H
Arbitrary Code Injection

<3.0.7-1
  • H
Resource Management Errors

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • H
Numeric Errors

<3.0.6-1
  • H
Numeric Errors

<3.0.6-1
  • H
Out-of-Bounds

<3.0.6-1
  • M
Improper Input Validation

<3.0.6-1
  • H
CVE-2010-1211

<3.0.6-1
  • M
Information Exposure

<3.0.6-1
  • C
Buffer Overflow

<3.0.6-1
  • H
Numeric Errors

<3.0.5-1
  • H
Numeric Errors

<3.0.5-1
  • H
Improper Input Validation

<3.0.11-2
  • H
CVE-2010-0173

<3.0.4-1
  • M
Improper Input Validation

<3.0.4-1
  • H
Resource Management Errors

<3.0.4-1
  • C
CVE-2010-0174

<3.0.4-1
  • H
Resource Management Errors

<3.0.4-1
  • M
Cross-site Scripting (XSS)

<3.0.2-1
  • H
Out-of-Bounds

<3.0.2-1
  • M
CVE-2010-0169

<3.0.2-1
  • M
CVE-2010-0163

<3.0.4-1
  • C
CVE-2010-0159

<3.0.2-1
  • C
Arbitrary Code Injection

<3.0.2-1
  • M
Information Exposure

<3.0.6-1
  • M
Information Exposure

<3.0.2-1
  • C
CVE-2009-3072

<3.0~rc2-2
  • C
CVE-2009-3075

<3.0~rc2-2
  • M
Information Exposure

<2.0.0.19-1
  • H
Out-of-Bounds

<2.0.0.24-1
  • M
Improper Input Validation

<2.0.0.24-1
  • C
Numeric Errors

<3.0~rc2-2
  • H
CVE-2009-2210

<2.0.0.22-1
  • H
Cryptographic Issues

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • M
Improper Authentication

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • M
Resource Management Errors

<2.0.0.22-1
  • M
Configuration

<2.0.0.22-1
  • M
Improper Input Validation

<2.0.0.22-1
  • M
Information Exposure

<2.0.0.22-1
  • H
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • H
Resource Management Errors

<2.0.0.22-1
  • M
Arbitrary Code Injection

<2.0.0.22-1
  • M
CVE-2009-0652

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • M
Cross-site Scripting (XSS)

<2.0.0.19-1
  • L
CVE-2008-5503

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • M
Information Exposure

<2.0.0.19-1
  • M
Improper Input Validation

<2.0.0.19-1
  • M
CVE-2008-5510

<2.0.0.19-1
  • M
Resource Management Errors

*
  • M
Information Exposure

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • H
Resource Management Errors

<2.0.0.19-1
  • C
Numeric Errors

<2.0.0.19-1
  • C
Improper Input Validation

<2.0.0.19-1
  • M
Resource Management Errors

<2.0.0.19-1
  • H
Improper Authentication

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • H
XML Injection

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • C
Out-of-Bounds

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • C
Out-of-Bounds

<2.0.0.17-1
  • M
Directory Traversal

<2.0.0.17-1
  • C
Numeric Errors

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • H
Directory Traversal

<2.0.0.17-1
  • C
Resource Management Errors

<2.0.0.17-1
  • M
Cross-site Scripting (XSS)

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • M
Cross-site Scripting (XSS)

<2.0.0.17-1
  • M
Improper Input Validation

<2.0.0.16-1
  • M
Information Exposure

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • M
Access Restriction Bypass

<2.0.0.16-1
  • H
Access Restriction Bypass

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • H
Numeric Errors

<2.0.0.16-1
  • H
Resource Management Errors

<2.0.0.14-1
  • H
CVE-2008-1235

<2.0.0.14-1
  • M
Resource Management Errors

<2.0.0.14-1
  • M
Resource Management Errors

<2.0.0.14-1
  • M
Arbitrary Code Injection

<2.0.0.14-1
  • M
Cross-site Scripting (XSS)

<2.0.0.14-1
  • H
Out-of-Bounds

<2.0.0.12-1
  • M
Cross-site Scripting (XSS)

<2.0.0.12-1
  • M
Information Exposure

<2.0.0.12-1
  • M
CVE-2008-0594

<2.0.0.12-1
  • M
CVE-2008-0592

<2.0.0.12-1
  • M
CVE-2008-0591

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • M
Arbitrary Code Injection

<2.0.0.12-1
  • M
Improper Input Validation

<2.0.0.12-1
  • M
Cross-site Scripting (XSS)

<2.0.0.12-1
  • M
Directory Traversal

<2.0.0.12-1
  • M
Improper Input Validation

<2.0.0.9-1
  • M
Improper Input Validation

<2.0.0.9-1
  • H
CVE-2007-3845

<2.0.0.6-1
  • M
CVE-2007-3844

<2.0.0.6-1
  • H
CVE-2007-3735

<2.0.0.6-1
  • H
CVE-2007-3734

<2.0.0.6-1
  • H
Out-of-Bounds

<2.0.0.4-1
  • H
Arbitrary Code Injection

<2.0.0.4-1
  • L
CVE-2007-1558

<2.0.0.4-1
  • H
CVE-2007-1282

<1.5.0.10.dfsg1-1
  • M
Numeric Errors

<1.5.0.10.dfsg1-1
  • M
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • M
CVE-2007-0775

<1.5.0.10.dfsg1-1
  • H
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • H
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • H
Arbitrary Code Injection

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6498

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6502

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6505

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6499

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6497

<1.5.0.9.dfsg1-1
  • M
Security Features

<1.5.0.9.dfsg1-1
  • M
Access Restriction Bypass

<1.5.0.9.dfsg1-1
  • H
CVE-2006-5463

<1.5.0.8-1
  • M
CVE-2006-5748

<1.5.0.8-1
  • H
CVE-2006-5747

<1.5.0.8-1
  • M
CVE-2006-5462

<1.5.0.8-1
  • M
CVE-2006-5464

<1.5.0.8-1
  • M
CVE-2006-5633

*