icedove vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the icedove package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • L
CVE-2017-7775

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • C
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • M
Improper Input Validation

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Improper Access Control

<1:45.6.0-1~deb8u1
  • C
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • H
Use After Free

<1:52.2.1-4~deb8u1
  • H
Security Features

<1:45.6.0-1~deb8u1
  • M
DEPRECATED: Use of Uninitialized Resource

<1:45.8.0-3~deb8u1
  • M
Improper Input Validation

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • M
Improper Input Validation

<1:52.2.1-4~deb8u1
  • H
Information Exposure

<1:45.6.0-1~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.6.0-1~deb8u1
  • M
Improper Input Validation

<1:45.5.1-1~deb8u1
  • H
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • M
Information Exposure

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:45.6.0-1~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
CVE-2017-5390

<1:45.8.0-3~deb8u1
  • M
Information Exposure

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Out-of-bounds Read

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • H
Improper Input Validation

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:45.6.0-1~deb8u1
  • H
Information Exposure

<1:45.8.0-3~deb8u1
  • H
Out-of-Bounds

<1:45.6.0-1~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • M
Information Exposure

<1:45.5.1-1~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • H
Use After Free

<1:45.5.1-1~deb8u1
  • M
Security Features

<1:45.6.0-1~deb8u1
  • C
Error Handling

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • C
Integer Overflow or Wraparound

<1:45.5.1-1~deb8u1
  • H
Information Exposure

<1:52.3.0-4~deb8u2
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • C
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • H
Improper Privilege Management

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:45.4.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.3.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.2.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.1.0-1~deb8u1
  • H
Out-of-Bounds

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1960

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Improper Data Handling

<38.7.0-1~deb8u1
  • H
Access Restriction Bypass

<38.7.0-1~deb8u1
  • C
CVE-2016-1962

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1964

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1961

<38.7.0-1~deb8u1
  • H
CVE-2016-1966

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Improper Data Handling

<38.7.0-1~deb8u1
  • H
CVE-2016-1979

<38.8.0-1~deb8u1
  • M
Out-of-Bounds

<38.7.0-1~deb8u1
  • M
CVE-2016-1523

<38.6.0-1~deb8u1
  • H
Out-of-Bounds

<38.6.0-1~deb8u1
  • H
Out-of-Bounds

<38.6.0-1~deb8u1
  • C
Out-of-Bounds

<38.6.0-1~deb8u1
  • M
Improper Data Handling

<38.6.0-1~deb8u1
  • M
Numeric Errors

<38.5.0-1~deb8u1
  • M
Information Exposure

<38.5.0-1~deb8u1
  • C
Out-of-Bounds

<38.5.0-1~deb8u1
  • H
Numeric Errors

<38.5.0-1~deb8u1
  • C
Numeric Errors

<38.5.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Security Features

<38.4.0-1~deb8u1
  • M
Out-of-Bounds

<38.4.0-1~deb8u1
  • C
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<31.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • M
Access Restriction Bypass

<38.4.0-1~deb8u1
  • H
Code

<38.4.0-1~deb8u1
  • H
Security Features

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
CVE-2015-4488

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • C
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Code

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • H
Code

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • M
Cryptographic Issues

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • L
Cryptographic Issues

<31.8.0-1~deb8u1
  • H
CVE-2015-2708

<31.7.0-1~deb8u1
  • M
CVE-2015-0797

<31.7.0-1~deb8u1
  • H
Out-of-Bounds

<31.7.0-1~deb8u1
  • M
Out-of-Bounds

<31.7.0-1~deb8u1
  • M
CVE-2015-2713

<31.7.0-1~deb8u1
  • H
CVE-2015-0815

<31.6.0-1
  • M
CVE-2015-0813

<31.6.0-1
  • M
Cross-site Request Forgery (CSRF)

<31.6.0-1
  • M
Access Restriction Bypass

<31.6.0-1
  • H
Access Restriction Bypass

<31.6.0-1
  • M
Information Exposure

<31.5.0-1
  • H
CVE-2015-0836

<31.5.0-1
  • M
CVE-2015-0831

<31.5.0-1
  • M
Out-of-Bounds

<31.5.0-1
  • M
CVE-2014-8639

<31.4.0-1
  • M
Cross-site Request Forgery (CSRF)

<31.4.0-1
  • H
CVE-2014-8634

<31.4.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
Out-of-Bounds

<31.3.0-1
  • M
CVE-2014-1592

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • H
CVE-2014-1581

<31.2.0-1
  • H
Out-of-Bounds

<31.2.0-1
  • H
CVE-2014-1574

<31.2.0-1
  • M
CVE-2014-1585

<31.2.0-1
  • H
Out-of-Bounds

<31.2.0-1
  • M
CVE-2014-1586

<31.2.0-1
  • M
CVE-2014-1577

<31.2.0-1
  • L
Cryptographic Issues

<31.3.0-1
  • H
CVE-2014-1567

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • M
Out-of-Bounds

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • M
Access of Uninitialized Pointer

<31.2.0-1
  • C
Use After Free

<31.2.0-1
  • H
Arbitrary Code Injection

<31.0-1
  • M
CVE-2014-1559

<31.0-1
  • C
CVE-2014-1550

<31.0-1
  • H
Out-of-Bounds

<31.0-1
  • H
Arbitrary Code Injection

<31.0-1
  • M
Access Restriction Bypass

<31.0-1
  • C
CVE-2014-1547

<31.0-1
  • C
CVE-2014-1544

<31.2.0-1
  • H
CVE-2014-1555

<31.0-1
  • M
CVE-2014-1560

<31.0-1
  • M
CVE-2014-1558

<31.0-1
  • H
CVE-2014-1540

<31.0~b1-1
  • M
Out-of-Bounds

<31.0~b1-1
  • C
CVE-2014-1537

<31.0~b1-1
  • C
CVE-2014-1533

<31.0~b1-1
  • C
CVE-2014-1538

<31.0~b1-1
  • C
Out-of-Bounds

<31.0~b1-1
  • C
CVE-2014-1536

<31.0~b1-1
  • C
CVE-2014-1545

<31.0~b1-1
  • C
CVE-2014-1541

<31.0~b1-1
  • H
Use After Free

<24.5.0-1
  • C
Use After Free

<24.5.0-1
  • M
Out-of-bounds Write

<24.5.0-1
  • H
Improper Privilege Management

<24.5.0-1
  • H
CVE-2014-1518

<24.5.0-1
  • C
Buffer Overflow

<24.5.0-1
  • M
Cross-site Scripting (XSS)

<24.5.0-1
  • C
Improper Privilege Management

<24.4.0-1
  • H
Out-of-bounds Write

<24.4.0-1
  • C
Improper Privilege Management

<24.4.0-1
  • C
Use After Free

<24.4.0-1
  • H
Out-of-bounds Read

<24.4.0-1
  • H
Buffer Overflow

<24.4.0-1
  • C
Out-of-bounds Read

<24.4.0-1
  • C
Out-of-Bounds

<24.4.0-1
  • C
Out-of-bounds Write

<24.4.0-1
  • H
Information Exposure

<24.4.0-1
  • M
Cross-site Scripting (XSS)

<24.2.0-1
  • M
Cross-site Scripting (XSS)

<24.2.0-1
  • C
Use After Free

<24.3.0-1
  • H
Race Condition

<24.3.0-1
  • M
Inadequate Encryption Strength

<24.3.0-1
  • H
Out-of-bounds Write

<24.3.0-1
  • H
CVE-2014-1481

<24.3.0-1
  • H
CVE-2014-1479

<24.3.0-1
  • C
CVE-2014-1477

<24.3.0-1
  • H
Origin Validation Error

<24.3.0-1
  • C
Arbitrary Code Injection

<24.2.0-1
  • C
CVE-2013-5615

<24.2.0-1
  • M
Cryptographic Issues

<24.2.0-1
  • C
CVE-2013-5609

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • M
Numeric Errors

<24.2.0-1
  • M
Information Exposure

<24.2.0-1
  • C
Out-of-Bounds

<17.0.10-1
  • C
CVE-2013-5601

<17.0.10-1
  • C
CVE-2013-5600

<17.0.10-1
  • C
CVE-2013-5597

<17.0.10-1
  • C
CVE-2013-5590

<17.0.10-1
  • C
CVE-2013-5599

<17.0.10-1
  • H
Out-of-Bounds

<17.0.10-1
  • M
Out-of-Bounds

<17.0.10-1
  • C
Out-of-Bounds

<17.0.9-1
  • M
Access Restriction Bypass

<17.0.9-1
  • H
Improper Input Validation

<17.0.9-1
  • H
Out-of-Bounds

<17.0.9-1
  • M
Out-of-Bounds

<17.0.9-1
  • H
Resource Management Errors

<17.0.9-1
  • M
Out-of-Bounds

<17.0.9-1
  • C
Out-of-Bounds

<17.0.9-1
  • M
Cross-site Scripting (XSS)

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • C
CVE-2013-1701

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • C
Improper Input Validation

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • H
Resource Management Errors

<17.0.7-1
  • H
Access Restriction Bypass

<17.0.7-1
  • H
Access Restriction Bypass

<17.0.7-1
  • H
Out-of-Bounds

<17.0.7-1
  • C
CVE-2013-1682

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • H
Improper Input Validation

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • M
Out-of-Bounds

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • C
CVE-2013-0801

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • C
CVE-2013-0788

<17.0.5-1
  • M
Cross-site Scripting (XSS)

<17.0.5-1
  • M
CVE-2013-0800

<17.0.5-1
  • C
Access Restriction Bypass

<17.0.7-1
  • C
CVE-2013-0796

<17.0.5-1
  • H
Resource Management Errors

<17.0.5-1
  • H
Out-of-bounds Write

<17.0.5-1
  • H
Use After Free

<17.0.5-1
  • H
Use After Free

<17.0.5-1
  • H
CVE-2013-0773

<17.0.5-1
  • M
Improper Certificate Validation

<17.0.5-1
  • H
CVE-2013-0783

<17.0.5-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • M
Improper Authentication

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • M
Information Exposure

<10.0.12-1
  • H
Integer Overflow or Wraparound

<10.0.12-1
  • C
Out-of-bounds Read

<10.0.12-1
  • H
Arbitrary Code Injection

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
CVE-2013-0769

<10.0.12-1
  • H
CVE-2013-0746

<10.0.12-1
  • H
Use After Free

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • H
Out-of-Bounds

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • H
CVE-2012-5842

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • C
Integer Overflow or Wraparound

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • M
Arbitrary Code Injection

<10.0.10-1
  • M
Cross-site Scripting (XSS)

<10.0.10-1
  • M
Access Restriction Bypass

<10.0.9-1
  • M
Origin Validation Error

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • M
Improper Input Validation

<10.0.9-1
  • H
Access Restriction Bypass

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
CVE-2012-3982

<10.0.9-1
  • H
Improper Privilege Management

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-bounds Read

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • M
Access Restriction Bypass

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Out-of-bounds Write

<10.0.7-1
  • C
Out-of-Bounds

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Out-of-Bounds

<10.0.7-1
  • H
Arbitrary Code Injection

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • H
CVE-2012-3962

<10.0.7-1
  • M
Information Exposure

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • H
Numeric Errors

<10.0.7-1
  • H
Out-of-bounds Write

<10.0.7-1
  • C
CVE-2012-1967

<10.0.6-1
  • H
Resource Management Errors

<10.0.6-1
  • M
CVE-2012-1950

<10.0.6-1
  • M
CVE-2012-1955

<10.0.6-1
  • M
Improper Input Validation

<10.0.6-1
  • H
Resource Management Errors

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • M
Access Restriction Bypass

<10.0.6-1
  • M
CVE-2012-1964

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • H
CVE-2012-1948

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • M
Cross-site Scripting (XSS)

<10.0.6-1
  • H
Out-of-Bounds

<10.0.6-1
  • M
Access Restriction Bypass

<10.0.6-1
  • H
CVE-2012-1937

<10.0.5-1
  • M
Cross-site Scripting (XSS)

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • L
Information Exposure

<10.0.5-1
  • H
Resource Management Errors

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • H
Resource Management Errors

<10.0.5-1
  • M
CVE-2012-0479

<10.0.4-1
  • C
CVE-2012-0467

<10.0.4-1
  • H
Access Restriction Bypass

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
Numeric Errors

<10.0.4-1
  • L
Access Restriction Bypass

<10.0.4-1
  • C
Out-of-Bounds

<10.0.4-1
  • C
Resource Management Errors

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
Incorrect Calculation

<10.0.4-1
  • H
Resource Management Errors

<10.0.3-1
  • M
Cross-site Scripting (XSS)

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • H
CVE-2012-0462

<10.0.3-1
  • H
CVE-2012-0461

<10.0.3-1
  • M
Arbitrary Code Injection

<10.0.3-1
  • H
Resource Management Errors

<10.0.3-1
  • M
Information Exposure

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • H
Access Restriction Bypass

<10.0.3-1
  • M
Information Exposure

<10.0.3-1
  • C
Out-of-Bounds

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • H
CVE-2012-0442

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • M
Cross-site Scripting (XSS)

<10.0.3-1
  • M
Information Exposure

<7.0-1
  • H
Out-of-Bounds

<10.0.3-1
  • H
Improper Input Validation

<3.1.16-1
  • M
Cross-site Scripting (XSS)

<3.1.16-1
  • H
Out-of-Bounds

<3.1.16-1
  • C
Numeric Errors

<3.1.15-1
  • M
Arbitrary Code Injection

<3.1.15-1
  • L
Access Restriction Bypass

<3.1.15-1
  • C
CVE-2011-2995

<3.1.15-1
  • M
Access Restriction Bypass

<3.1.15-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • M
Information Exposure

<3.1.12-1
  • C
CVE-2011-2982

<3.1.12-1
  • H
Configuration

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • M
Arbitrary Code Injection

<3.1.11-1
  • C
CVE-2011-2376

<3.1.11-1
  • C
CVE-2011-2374

<3.1.11-1
  • C
CVE-2011-2365

<3.1.11-1
  • H
Resource Management Errors

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • M
Access Restriction Bypass

<3.1.11-1
  • C
Numeric Errors

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • C
CVE-2011-0077

<3.1.10-1
  • C
Resource Management Errors

<3.1.15-1+b1
  • C
Resource Management Errors

<3.1.15-1+b1
  • C
CVE-2011-0080

<3.1.10-1
  • C
CVE-2011-0075

<3.1.10-1
  • C
CVE-2011-0078

<3.1.10-1
  • C
CVE-2011-0074

<3.1.10-1
  • C
CVE-2011-0072

<3.1.10-1
  • C
CVE-2011-0069

<3.1.10-1
  • M
Directory Traversal

<3.1.10-1
  • C
CVE-2011-0070

<3.1.10-1
  • M
Information Exposure

<17.0.2-1
  • M
Improper Input Validation

<3.0.11-2
  • C
CVE-2011-0053

<3.0.11-2
  • C
Resource Management Errors

<3.0.11-2
  • C
Out-of-Bounds

<3.0.11-2
  • C
Resource Management Errors

<3.0.11-2
  • M
Cross-site Request Forgery (CSRF)

<3.0.11-2
  • C
Out-of-Bounds

<3.0.11-2
  • H
Out-of-Bounds

<3.0.11-1
  • H
Out-of-Bounds

<3.0.11-1
  • H
Improper Input Validation

<3.0.11-1
  • H
Out-of-Bounds

<3.0.11-1
  • H
Out-of-Bounds

<3.0.10-1
  • H
Out-of-Bounds

<3.0.9-1
  • H
CVE-2010-3174

<3.0.9-1
  • M
Access Restriction Bypass

<3.0.9-1
  • H
Resource Management Errors

<3.0.9-1
  • H
CVE-2010-3182

<3.0.9-1
  • H
Out-of-Bounds

<3.0.9-1
  • H
Resource Management Errors

<3.0.7-1
  • H
Arbitrary Code Injection

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • M
Access Restriction Bypass

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • H
Resource Management Errors

<3.0.7-1
  • H
CVE-2010-3169

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • H
Numeric Errors

<3.0.7-1
  • H
Out-of-Bounds

<3.0.6-1
  • M
Improper Input Validation

<3.0.6-1
  • H
CVE-2010-1211

<3.0.6-1
  • H
Numeric Errors

<3.0.6-1
  • H
Numeric Errors

<3.0.6-1
  • M
Information Exposure

<3.0.6-1
  • C
Buffer Overflow

<3.0.6-1
  • H
Numeric Errors

<3.0.5-1
  • H
Numeric Errors

<3.0.5-1
  • H
Improper Input Validation

<3.0.11-2
  • H
CVE-2010-0173

<3.0.4-1
  • H
Resource Management Errors

<3.0.4-1
  • C
CVE-2010-0174

<3.0.4-1
  • H
Resource Management Errors

<3.0.4-1
  • M
Improper Input Validation

<3.0.4-1
  • M
CVE-2010-0169

<3.0.2-1
  • H
Out-of-Bounds

<3.0.2-1
  • M
Cross-site Scripting (XSS)

<3.0.2-1
  • M
CVE-2010-0163

<3.0.4-1
  • C
CVE-2010-0159

<3.0.2-1
  • C
Arbitrary Code Injection

<3.0.2-1
  • M
Information Exposure

<3.0.6-1
  • M
Information Exposure

<3.0.2-1
  • C
CVE-2009-3075

<3.0~rc2-2
  • C
CVE-2009-3072

<3.0~rc2-2
  • M
Information Exposure

<2.0.0.19-1
  • H
Out-of-Bounds

<2.0.0.24-1
  • M
Improper Input Validation

<2.0.0.24-1
  • C
Numeric Errors

<3.0~rc2-2
  • H
CVE-2009-2210

<2.0.0.22-1
  • H
Cryptographic Issues

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • M
Improper Authentication

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • M
Resource Management Errors

<2.0.0.22-1
  • M
Improper Input Validation

<2.0.0.22-1
  • M
Configuration

<2.0.0.22-1
  • M
Information Exposure

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • H
Resource Management Errors

<2.0.0.22-1
  • H
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • M
Arbitrary Code Injection

<2.0.0.22-1
  • M
CVE-2009-0652

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • M
Information Exposure

<2.0.0.19-1
  • M
CVE-2008-5510

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • L
CVE-2008-5503

<2.0.0.19-1
  • M
Improper Input Validation

<2.0.0.19-1
  • M
Cross-site Scripting (XSS)

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • M
Resource Management Errors

*
  • H
Resource Management Errors

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • H
XML Injection

<2.0.0.19-1
  • M
Information Exposure

<2.0.0.19-1
  • C
Improper Input Validation

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • H
Improper Authentication

<2.0.0.19-1
  • C
Numeric Errors

<2.0.0.19-1
  • M
Resource Management Errors

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • C
Out-of-Bounds

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • C
Numeric Errors

<2.0.0.17-1
  • M
Directory Traversal

<2.0.0.17-1
  • C
Resource Management Errors

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • M
Cross-site Scripting (XSS)

<2.0.0.17-1
  • C
Out-of-Bounds

<2.0.0.17-1
  • H
Directory Traversal

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • M
Cross-site Scripting (XSS)

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • M
Improper Input Validation

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • H
Access Restriction Bypass

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • M
Access Restriction Bypass

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • M
Information Exposure

<2.0.0.16-1
  • H
Numeric Errors

<2.0.0.16-1
  • H
Resource Management Errors

<2.0.0.14-1
  • H
CVE-2008-1235

<2.0.0.14-1
  • M
Cross-site Scripting (XSS)

<2.0.0.14-1
  • M
Resource Management Errors

<2.0.0.14-1
  • M
Resource Management Errors

<2.0.0.14-1
  • M
Arbitrary Code Injection

<2.0.0.14-1
  • H
Out-of-Bounds

<2.0.0.12-1
  • M
Cross-site Scripting (XSS)

<2.0.0.12-1
  • M
CVE-2008-0594

<2.0.0.12-1
  • M
Information Exposure

<2.0.0.12-1
  • M
CVE-2008-0591

<2.0.0.12-1
  • M
CVE-2008-0592

<2.0.0.12-1
  • M
Improper Input Validation

<2.0.0.12-1
  • M
Arbitrary Code Injection

<2.0.0.12-1
  • M
Directory Traversal

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • M
Cross-site Scripting (XSS)

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • M
Improper Input Validation

<2.0.0.9-1
  • M
Improper Input Validation

<2.0.0.9-1
  • M
CVE-2007-3844

<2.0.0.6-1
  • H
CVE-2007-3845

<2.0.0.6-1
  • H
CVE-2007-3734

<2.0.0.6-1
  • H
CVE-2007-3735

<2.0.0.6-1
  • H
Arbitrary Code Injection

<2.0.0.4-1
  • H
Out-of-Bounds

<2.0.0.4-1
  • L
CVE-2007-1558

<2.0.0.4-1
  • H
CVE-2007-1282

<1.5.0.10.dfsg1-1
  • M
Numeric Errors

<1.5.0.10.dfsg1-1
  • M
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • H
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • M
CVE-2007-0775

<1.5.0.10.dfsg1-1
  • H
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • M
CVE-2006-6498

<1.5.0.9.dfsg1-1
  • M
Security Features

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6499

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6497

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6502

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6505

<1.5.0.9.dfsg1-1
  • M
Access Restriction Bypass

<1.5.0.9.dfsg1-1
  • H
Arbitrary Code Injection

<1.5.0.9.dfsg1-1
  • H
CVE-2006-5463

<1.5.0.8-1
  • M
CVE-2006-5462

<1.5.0.8-1
  • M
CVE-2006-5464

<1.5.0.8-1
  • M
CVE-2006-5748

<1.5.0.8-1
  • H
CVE-2006-5747

<1.5.0.8-1
  • M
CVE-2006-5633

*