icedove vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the icedove package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • L
CVE-2017-7775

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • C
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • H
Use After Free

<1:45.5.1-1~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • M
DEPRECATED: Use of Uninitialized Resource

<1:45.8.0-3~deb8u1
  • H
Improper Input Validation

<1:52.3.0-4~deb8u2
  • M
Improper Input Validation

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:45.6.0-1~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • H
Information Exposure

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:45.6.0-1~deb8u1
  • H
Use After Free

<1:52.2.1-4~deb8u1
  • C
Error Handling

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Integer Overflow or Wraparound

<1:45.5.1-1~deb8u1
  • M
Information Exposure

<1:45.8.0-3~deb8u1
  • M
Improper Input Validation

<1:52.2.1-4~deb8u1
  • M
Improper Input Validation

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • C
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • H
Information Exposure

<1:45.8.0-3~deb8u1
  • H
Information Exposure

<1:45.6.0-1~deb8u1
  • H
Improper Privilege Management

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • H
Security Features

<1:45.6.0-1~deb8u1
  • M
Information Exposure

<1:45.8.0-3~deb8u1
  • M
Information Exposure

<1:45.5.1-1~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • M
Security Features

<1:45.6.0-1~deb8u1
  • C
Out-of-bounds Read

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:45.6.0-1~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.6.0-1~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • H
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • H
Improper Access Control

<1:45.6.0-1~deb8u1
  • M
Improper Input Validation

<1:45.5.1-1~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
CVE-2017-5390

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • H
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • C
Out-of-Bounds

<1:45.4.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.3.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.2.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.1.0-1~deb8u1
  • H
Out-of-Bounds

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Access Restriction Bypass

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1960

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1966

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1964

<38.7.0-1~deb8u1
  • H
CVE-2016-1979

<38.8.0-1~deb8u1
  • H
Improper Data Handling

<38.7.0-1~deb8u1
  • H
Improper Data Handling

<38.7.0-1~deb8u1
  • C
CVE-2016-1962

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1961

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • M
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • M
CVE-2016-1523

<38.6.0-1~deb8u1
  • H
Out-of-Bounds

<38.6.0-1~deb8u1
  • H
Out-of-Bounds

<38.6.0-1~deb8u1
  • C
Out-of-Bounds

<38.6.0-1~deb8u1
  • M
Improper Data Handling

<38.6.0-1~deb8u1
  • C
Out-of-Bounds

<38.5.0-1~deb8u1
  • M
Information Exposure

<38.5.0-1~deb8u1
  • M
Numeric Errors

<38.5.0-1~deb8u1
  • H
Numeric Errors

<38.5.0-1~deb8u1
  • C
Numeric Errors

<38.5.0-1~deb8u1
  • H
Security Features

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<31.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • M
Access Restriction Bypass

<38.4.0-1~deb8u1
  • H
Security Features

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Code

<38.4.0-1~deb8u1
  • C
Out-of-Bounds

<38.4.0-1~deb8u1
  • M
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • C
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
CVE-2015-4488

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Code

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • H
Code

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • M
Cryptographic Issues

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • L
Cryptographic Issues

<31.8.0-1~deb8u1
  • M
Out-of-Bounds

<31.7.0-1~deb8u1
  • M
CVE-2015-2713

<31.7.0-1~deb8u1
  • M
CVE-2015-0797

<31.7.0-1~deb8u1
  • H
Out-of-Bounds

<31.7.0-1~deb8u1
  • H
CVE-2015-2708

<31.7.0-1~deb8u1
  • H
CVE-2015-0815

<31.6.0-1
  • M
CVE-2015-0813

<31.6.0-1
  • M
Cross-site Request Forgery (CSRF)

<31.6.0-1
  • M
Access Restriction Bypass

<31.6.0-1
  • H
Access Restriction Bypass

<31.6.0-1
  • M
CVE-2015-0831

<31.5.0-1
  • M
Out-of-Bounds

<31.5.0-1
  • M
Information Exposure

<31.5.0-1
  • H
CVE-2015-0836

<31.5.0-1
  • M
CVE-2014-8639

<31.4.0-1
  • M
Cross-site Request Forgery (CSRF)

<31.4.0-1
  • H
CVE-2014-8634

<31.4.0-1
  • M
CVE-2014-1592

<31.3.0-1
  • M
Out-of-Bounds

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
CVE-2014-1577

<31.2.0-1
  • H
CVE-2014-1581

<31.2.0-1
  • H
Out-of-Bounds

<31.2.0-1
  • M
CVE-2014-1585

<31.2.0-1
  • H
CVE-2014-1574

<31.2.0-1
  • H
Out-of-Bounds

<31.2.0-1
  • M
CVE-2014-1586

<31.2.0-1
  • L
Cryptographic Issues

<31.3.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • M
Access of Uninitialized Pointer

<31.2.0-1
  • H
CVE-2014-1567

<31.2.0-1
  • C
Use After Free

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • M
Out-of-Bounds

<31.2.0-1
  • H
Out-of-Bounds

<31.0-1
  • H
Arbitrary Code Injection

<31.0-1
  • C
CVE-2014-1547

<31.0-1
  • M
Access Restriction Bypass

<31.0-1
  • C
CVE-2014-1544

<31.2.0-1
  • C
CVE-2014-1550

<31.0-1
  • M
CVE-2014-1559

<31.0-1
  • H
Arbitrary Code Injection

<31.0-1
  • H
CVE-2014-1555

<31.0-1
  • M
CVE-2014-1558

<31.0-1
  • M
CVE-2014-1560

<31.0-1
  • C
CVE-2014-1537

<31.0~b1-1
  • C
CVE-2014-1545

<31.0~b1-1
  • C
CVE-2014-1541

<31.0~b1-1
  • H
CVE-2014-1540

<31.0~b1-1
  • M
Out-of-Bounds

<31.0~b1-1
  • C
CVE-2014-1536

<31.0~b1-1
  • C
CVE-2014-1538

<31.0~b1-1
  • C
CVE-2014-1533

<31.0~b1-1
  • C
Out-of-Bounds

<31.0~b1-1
  • C
Use After Free

<24.5.0-1
  • H
Improper Privilege Management

<24.5.0-1
  • H
Use After Free

<24.5.0-1
  • C
Buffer Overflow

<24.5.0-1
  • M
Cross-site Scripting (XSS)

<24.5.0-1
  • M
Out-of-bounds Write

<24.5.0-1
  • H
CVE-2014-1518

<24.5.0-1
  • H
Out-of-bounds Write

<24.4.0-1
  • C
Improper Privilege Management

<24.4.0-1
  • C
Out-of-Bounds

<24.4.0-1
  • C
Out-of-bounds Write

<24.4.0-1
  • H
Information Exposure

<24.4.0-1
  • C
Use After Free

<24.4.0-1
  • H
Out-of-bounds Read

<24.4.0-1
  • H
Buffer Overflow

<24.4.0-1
  • C
Improper Privilege Management

<24.4.0-1
  • C
Out-of-bounds Read

<24.4.0-1
  • M
Cross-site Scripting (XSS)

<24.2.0-1
  • M
Cross-site Scripting (XSS)

<24.2.0-1
  • H
CVE-2014-1479

<24.3.0-1
  • C
Use After Free

<24.3.0-1
  • M
Inadequate Encryption Strength

<24.3.0-1
  • H
Out-of-bounds Write

<24.3.0-1
  • H
Race Condition

<24.3.0-1
  • C
CVE-2014-1477

<24.3.0-1
  • H
CVE-2014-1481

<24.3.0-1
  • H
Origin Validation Error

<24.3.0-1
  • C
Use After Free

<24.2.0-1
  • C
CVE-2013-5609

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • C
Arbitrary Code Injection

<24.2.0-1
  • M
Cryptographic Issues

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • C
CVE-2013-5615

<24.2.0-1
  • M
Information Exposure

<24.2.0-1
  • M
Numeric Errors

<24.2.0-1
  • C
CVE-2013-5599

<17.0.10-1
  • C
CVE-2013-5590

<17.0.10-1
  • M
Out-of-Bounds

<17.0.10-1
  • C
CVE-2013-5600

<17.0.10-1
  • C
CVE-2013-5597

<17.0.10-1
  • C
Out-of-Bounds

<17.0.10-1
  • C
CVE-2013-5601

<17.0.10-1
  • H
Out-of-Bounds

<17.0.10-1
  • M
Out-of-Bounds

<17.0.9-1
  • H
Out-of-Bounds

<17.0.9-1
  • H
Improper Input Validation

<17.0.9-1
  • M
Out-of-Bounds

<17.0.9-1
  • H
Resource Management Errors

<17.0.9-1
  • C
Out-of-Bounds

<17.0.9-1
  • M
Access Restriction Bypass

<17.0.9-1
  • C
Out-of-Bounds

<17.0.9-1
  • M
Access Restriction Bypass

<17.0.8-1
  • C
Improper Input Validation

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • M
Cross-site Scripting (XSS)

<17.0.8-1
  • C
CVE-2013-1701

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • H
Improper Input Validation

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • C
CVE-2013-1682

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • H
Access Restriction Bypass

<17.0.7-1
  • H
Access Restriction Bypass

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • H
Out-of-Bounds

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
CVE-2013-0801

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • M
Out-of-Bounds

<17.0.7-1
  • C
CVE-2013-0796

<17.0.5-1
  • M
CVE-2013-0800

<17.0.5-1
  • C
Access Restriction Bypass

<17.0.7-1
  • C
CVE-2013-0788

<17.0.5-1
  • M
Cross-site Scripting (XSS)

<17.0.5-1
  • H
Resource Management Errors

<17.0.5-1
  • H
Use After Free

<17.0.5-1
  • H
CVE-2013-0773

<17.0.5-1
  • H
Out-of-bounds Write

<17.0.5-1
  • M
Improper Certificate Validation

<17.0.5-1
  • H
CVE-2013-0783

<17.0.5-1
  • H
Use After Free

<17.0.5-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Integer Overflow or Wraparound

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • M
Information Exposure

<10.0.12-1
  • M
Improper Authentication

<10.0.12-1
  • H
CVE-2013-0769

<10.0.12-1
  • C
Out-of-bounds Read

<10.0.12-1
  • H
Arbitrary Code Injection

<10.0.12-1
  • H
CVE-2013-0746

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • C
Integer Overflow or Wraparound

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
CVE-2012-5842

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • H
Out-of-Bounds

<10.0.11-1
  • M
Arbitrary Code Injection

<10.0.10-1
  • M
Cross-site Scripting (XSS)

<10.0.10-1
  • M
Access Restriction Bypass

<10.0.9-1
  • M
Origin Validation Error

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Out-of-bounds Read

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Improper Privilege Management

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Access Restriction Bypass

<10.0.9-1
  • M
Improper Input Validation

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
CVE-2012-3982

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • C
Out-of-Bounds

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • H
CVE-2012-3962

<10.0.7-1
  • C
Out-of-bounds Write

<10.0.7-1
  • H
Numeric Errors

<10.0.7-1
  • M
Access Restriction Bypass

<10.0.7-1
  • H
Arbitrary Code Injection

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • M
Information Exposure

<10.0.7-1
  • C
Out-of-Bounds

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • H
Out-of-bounds Write

<10.0.7-1
  • M
CVE-2012-1950

<10.0.6-1
  • M
Improper Input Validation

<10.0.6-1
  • H
Resource Management Errors

<10.0.6-1
  • C
CVE-2012-1967

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • H
CVE-2012-1948

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • M
Access Restriction Bypass

<10.0.6-1
  • M
Access Restriction Bypass

<10.0.6-1
  • M
CVE-2012-1964

<10.0.6-1
  • H
Resource Management Errors

<10.0.6-1
  • H
Out-of-Bounds

<10.0.6-1
  • M
CVE-2012-1955

<10.0.6-1
  • M
Cross-site Scripting (XSS)

<10.0.6-1
  • M
Cross-site Scripting (XSS)

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • H
CVE-2012-1937

<10.0.5-1
  • L
Information Exposure

<10.0.5-1
  • H
Resource Management Errors

<10.0.5-1
  • H
Resource Management Errors

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • H
Access Restriction Bypass

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
CVE-2012-0479

<10.0.4-1
  • C
Out-of-Bounds

<10.0.4-1
  • C
CVE-2012-0467

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
Numeric Errors

<10.0.4-1
  • L
Access Restriction Bypass

<10.0.4-1
  • C
Resource Management Errors

<10.0.4-1
  • M
Incorrect Calculation

<10.0.4-1
  • H
Resource Management Errors

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • M
Arbitrary Code Injection

<10.0.3-1
  • M
Information Exposure

<10.0.3-1
  • M
Cross-site Scripting (XSS)

<10.0.3-1
  • H
CVE-2012-0462

<10.0.3-1
  • H
Resource Management Errors

<10.0.3-1
  • H
Access Restriction Bypass

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • H
CVE-2012-0461

<10.0.3-1
  • M
Information Exposure

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • C
Out-of-Bounds

<10.0.3-1
  • H
CVE-2012-0442

<10.0.3-1
  • M
Cross-site Scripting (XSS)

<10.0.3-1
  • H
Out-of-Bounds

<10.0.3-1
  • M
Information Exposure

<7.0-1
  • M
Access Restriction Bypass

<10.0.3-1
  • H
Out-of-Bounds

<3.1.16-1
  • M
Cross-site Scripting (XSS)

<3.1.16-1
  • H
Improper Input Validation

<3.1.16-1
  • C
Numeric Errors

<3.1.15-1
  • M
Arbitrary Code Injection

<3.1.15-1
  • L
Access Restriction Bypass

<3.1.15-1
  • C
CVE-2011-2995

<3.1.15-1
  • M
Access Restriction Bypass

<3.1.15-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • H
Configuration

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • C
CVE-2011-2982

<3.1.12-1
  • M
Information Exposure

<3.1.12-1
  • C
Numeric Errors

<3.1.11-1
  • H
Resource Management Errors

<3.1.11-1
  • M
Access Restriction Bypass

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • C
CVE-2011-2374

<3.1.11-1
  • C
CVE-2011-2376

<3.1.11-1
  • C
CVE-2011-2365

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • M
Arbitrary Code Injection

<3.1.11-1
  • C
CVE-2011-0078

<3.1.10-1
  • C
CVE-2011-0072

<3.1.10-1
  • C
CVE-2011-0074

<3.1.10-1
  • C
Resource Management Errors

<3.1.15-1+b1
  • C
CVE-2011-0080

<3.1.10-1
  • C
CVE-2011-0075

<3.1.10-1
  • C
CVE-2011-0069

<3.1.10-1
  • M
Directory Traversal

<3.1.10-1
  • C
CVE-2011-0070

<3.1.10-1
  • C
Resource Management Errors

<3.1.15-1+b1
  • C
CVE-2011-0077

<3.1.10-1
  • M
Information Exposure

<17.0.2-1
  • M
Cross-site Request Forgery (CSRF)

<3.0.11-2
  • M
Improper Input Validation

<3.0.11-2
  • C
Out-of-Bounds

<3.0.11-2
  • C
Resource Management Errors

<3.0.11-2
  • C
CVE-2011-0053

<3.0.11-2
  • C
Out-of-Bounds

<3.0.11-2
  • C
Resource Management Errors

<3.0.11-2
  • H
Out-of-Bounds

<3.0.11-1
  • H
Out-of-Bounds

<3.0.11-1
  • H
Out-of-Bounds

<3.0.11-1
  • H
Improper Input Validation

<3.0.11-1
  • H
Out-of-Bounds

<3.0.10-1
  • H
CVE-2010-3182

<3.0.9-1
  • H
Out-of-Bounds

<3.0.9-1
  • H
Out-of-Bounds

<3.0.9-1
  • H
CVE-2010-3174

<3.0.9-1
  • H
Resource Management Errors

<3.0.9-1
  • M
Access Restriction Bypass

<3.0.9-1
  • H
Numeric Errors

<3.0.7-1
  • H
Resource Management Errors

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • M
Access Restriction Bypass

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • H
CVE-2010-3169

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • H
Arbitrary Code Injection

<3.0.7-1
  • H
Resource Management Errors

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • H
Out-of-Bounds

<3.0.6-1
  • M
Improper Input Validation

<3.0.6-1
  • H
Numeric Errors

<3.0.6-1
  • H
CVE-2010-1211

<3.0.6-1
  • H
Numeric Errors

<3.0.6-1
  • M
Information Exposure

<3.0.6-1
  • C
Buffer Overflow

<3.0.6-1
  • H
Numeric Errors

<3.0.5-1
  • H
Numeric Errors

<3.0.5-1
  • H
Improper Input Validation

<3.0.11-2
  • H
CVE-2010-0173

<3.0.4-1
  • H
Resource Management Errors

<3.0.4-1
  • C
CVE-2010-0174

<3.0.4-1
  • H
Resource Management Errors

<3.0.4-1
  • M
Improper Input Validation

<3.0.4-1
  • H
Out-of-Bounds

<3.0.2-1
  • M
CVE-2010-0169

<3.0.2-1
  • M
Cross-site Scripting (XSS)

<3.0.2-1
  • M
CVE-2010-0163

<3.0.4-1
  • C
Arbitrary Code Injection

<3.0.2-1
  • C
CVE-2010-0159

<3.0.2-1
  • M
Information Exposure

<3.0.6-1
  • M
Information Exposure

<3.0.2-1
  • C
CVE-2009-3072

<3.0~rc2-2
  • C
CVE-2009-3075

<3.0~rc2-2
  • M
Information Exposure

<2.0.0.19-1
  • H
Out-of-Bounds

<2.0.0.24-1
  • M
Improper Input Validation

<2.0.0.24-1
  • C
Numeric Errors

<3.0~rc2-2
  • H
CVE-2009-2210

<2.0.0.22-1
  • H
Cryptographic Issues

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • M
Improper Authentication

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • M
Resource Management Errors

<2.0.0.22-1
  • M
Improper Input Validation

<2.0.0.22-1
  • M
Configuration

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • H
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • H
Resource Management Errors

<2.0.0.22-1
  • M
Information Exposure

<2.0.0.22-1
  • M
Arbitrary Code Injection

<2.0.0.22-1
  • M
CVE-2009-0652

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • M
CVE-2008-5510

<2.0.0.19-1
  • M
Information Exposure

<2.0.0.19-1
  • M
Cross-site Scripting (XSS)

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • M
Improper Input Validation

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • L
CVE-2008-5503

<2.0.0.19-1
  • M
Resource Management Errors

*
  • C
Resource Management Errors

<2.0.0.19-1
  • H
Resource Management Errors

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • M
Resource Management Errors

<2.0.0.19-1
  • H
XML Injection

<2.0.0.19-1
  • H
Improper Authentication

<2.0.0.19-1
  • C
Numeric Errors

<2.0.0.19-1
  • C
Improper Input Validation

<2.0.0.19-1
  • M
Information Exposure

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • C
Out-of-Bounds

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • M
Cross-site Scripting (XSS)

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • C
Resource Management Errors

<2.0.0.17-1
  • H
Directory Traversal

<2.0.0.17-1
  • C
Out-of-Bounds

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • C
Numeric Errors

<2.0.0.17-1
  • M
Cross-site Scripting (XSS)

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • M
Directory Traversal

<2.0.0.17-1
  • M
Improper Input Validation

<2.0.0.16-1
  • M
Access Restriction Bypass

<2.0.0.16-1
  • M
Information Exposure

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • H
Access Restriction Bypass

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • H
Numeric Errors

<2.0.0.16-1
  • H
Resource Management Errors

<2.0.0.14-1
  • M
Resource Management Errors

<2.0.0.14-1
  • M
Cross-site Scripting (XSS)

<2.0.0.14-1
  • M
Arbitrary Code Injection

<2.0.0.14-1
  • M
Resource Management Errors

<2.0.0.14-1
  • H
CVE-2008-1235

<2.0.0.14-1
  • H
Out-of-Bounds

<2.0.0.12-1
  • M
Cross-site Scripting (XSS)

<2.0.0.12-1
  • M
CVE-2008-0594

<2.0.0.12-1
  • M
Information Exposure

<2.0.0.12-1
  • M
CVE-2008-0592

<2.0.0.12-1
  • M
CVE-2008-0591

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • M
Cross-site Scripting (XSS)

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • M
Improper Input Validation

<2.0.0.12-1
  • M
Directory Traversal

<2.0.0.12-1
  • M
Arbitrary Code Injection

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • M
Improper Input Validation

<2.0.0.9-1
  • M
Improper Input Validation

<2.0.0.9-1
  • M
CVE-2007-3844

<2.0.0.6-1
  • H
CVE-2007-3845

<2.0.0.6-1
  • H
CVE-2007-3735

<2.0.0.6-1
  • H
CVE-2007-3734

<2.0.0.6-1
  • H
Out-of-Bounds

<2.0.0.4-1
  • H
Arbitrary Code Injection

<2.0.0.4-1
  • L
CVE-2007-1558

<2.0.0.4-1
  • H
CVE-2007-1282

<1.5.0.10.dfsg1-1
  • M
Numeric Errors

<1.5.0.10.dfsg1-1
  • M
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • H
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • M
CVE-2007-0775

<1.5.0.10.dfsg1-1
  • H
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • M
CVE-2006-6499

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6497

<1.5.0.9.dfsg1-1
  • M
Security Features

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6498

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6502

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6505

<1.5.0.9.dfsg1-1
  • H
Arbitrary Code Injection

<1.5.0.9.dfsg1-1
  • M
Access Restriction Bypass

<1.5.0.9.dfsg1-1
  • H
CVE-2006-5463

<1.5.0.8-1
  • M
CVE-2006-5462

<1.5.0.8-1
  • M
CVE-2006-5748

<1.5.0.8-1
  • M
CVE-2006-5464

<1.5.0.8-1
  • H
CVE-2006-5747

<1.5.0.8-1
  • M
CVE-2006-5633

*