icedove vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the icedove package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • L
CVE-2017-7775

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • C
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:45.6.0-1~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • M
DEPRECATED: Use of Uninitialized Resource

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • M
Security Features

<1:45.6.0-1~deb8u1
  • C
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • H
Security Features

<1:45.6.0-1~deb8u1
  • H
Information Exposure

<1:45.6.0-1~deb8u1
  • M
Information Exposure

<1:45.5.1-1~deb8u1
  • H
Use After Free

<1:45.5.1-1~deb8u1
  • C
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • H
Use After Free

<1:52.2.1-4~deb8u1
  • C
Integer Overflow or Wraparound

<1:45.5.1-1~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • H
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • H
Improper Privilege Management

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • H
Improper Access Control

<1:45.6.0-1~deb8u1
  • H
Information Exposure

<1:45.8.0-3~deb8u1
  • H
Out-of-Bounds

<1:45.6.0-1~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • M
Improper Input Validation

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • M
Improper Input Validation

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:45.6.0-1~deb8u1
  • H
Improper Input Validation

<1:52.3.0-4~deb8u2
  • C
Out-of-bounds Read

<1:52.3.0-4~deb8u2
  • C
Out-of-Bounds

<1:45.8.0-3~deb8u1
  • M
Information Exposure

<1:45.8.0-3~deb8u1
  • C
CVE-2017-5390

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Use After Free

<1:45.6.0-1~deb8u1
  • M
Information Exposure

<1:45.8.0-3~deb8u1
  • H
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • M
Improper Input Validation

<1:45.5.1-1~deb8u1
  • M
Improper Input Validation

<1:52.2.1-4~deb8u1
  • C
Out-of-bounds Read

<1:52.2.1-4~deb8u1
  • H
Out-of-Bounds

<1:45.5.1-1~deb8u1
  • C
Use After Free

<1:52.2.1-4~deb8u1
  • C
Use After Free

<1:52.3.0-4~deb8u2
  • C
Out-of-Bounds

<1:52.2.1-4~deb8u1
  • C
Out-of-Bounds

<1:52.3.0-4~deb8u2
  • H
Information Exposure

<1:52.3.0-4~deb8u2
  • C
Use After Free

<1:45.8.0-3~deb8u1
  • C
Error Handling

<1:45.8.0-3~deb8u1
  • C
Out-of-Bounds

<1:45.4.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.3.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.2.0-1~deb8u1
  • H
Out-of-Bounds

<1:45.1.0-1~deb8u1
  • H
Out-of-Bounds

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<38.8.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1964

<38.7.0-1~deb8u1
  • H
CVE-2016-1960

<38.7.0-1~deb8u1
  • H
CVE-2016-1966

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1961

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
CVE-2016-1979

<38.8.0-1~deb8u1
  • H
Improper Data Handling

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Improper Data Handling

<38.7.0-1~deb8u1
  • C
CVE-2016-1962

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • M
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Access Restriction Bypass

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.6.0-1~deb8u1
  • M
CVE-2016-1523

<38.6.0-1~deb8u1
  • C
Out-of-Bounds

<38.6.0-1~deb8u1
  • H
Out-of-Bounds

<38.6.0-1~deb8u1
  • M
Improper Data Handling

<38.6.0-1~deb8u1
  • M
Numeric Errors

<38.5.0-1~deb8u1
  • C
Numeric Errors

<38.5.0-1~deb8u1
  • H
Numeric Errors

<38.5.0-1~deb8u1
  • M
Information Exposure

<38.5.0-1~deb8u1
  • C
Out-of-Bounds

<38.5.0-1~deb8u1
  • H
Out-of-Bounds

<31.7.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • M
Access Restriction Bypass

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Code

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Security Features

<38.4.0-1~deb8u1
  • C
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Security Features

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • M
Out-of-Bounds

<38.4.0-1~deb8u1
  • C
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
CVE-2015-4488

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Out-of-Bounds

<38.4.0-1~deb8u1
  • H
Code

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • H
Code

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • C
Code

<31.8.0-1~deb8u1
  • M
Cryptographic Issues

<31.8.0-1~deb8u1
  • C
Out-of-Bounds

<31.8.0-1~deb8u1
  • L
Cryptographic Issues

<31.8.0-1~deb8u1
  • M
Out-of-Bounds

<31.7.0-1~deb8u1
  • H
Out-of-Bounds

<31.7.0-1~deb8u1
  • M
CVE-2015-0797

<31.7.0-1~deb8u1
  • M
CVE-2015-2713

<31.7.0-1~deb8u1
  • H
CVE-2015-2708

<31.7.0-1~deb8u1
  • H
Access Restriction Bypass

<31.6.0-1
  • M
CVE-2015-0813

<31.6.0-1
  • H
CVE-2015-0815

<31.6.0-1
  • M
Access Restriction Bypass

<31.6.0-1
  • M
Cross-site Request Forgery (CSRF)

<31.6.0-1
  • H
CVE-2015-0836

<31.5.0-1
  • M
Out-of-Bounds

<31.5.0-1
  • M
Information Exposure

<31.5.0-1
  • M
CVE-2015-0831

<31.5.0-1
  • M
CVE-2014-8639

<31.4.0-1
  • H
CVE-2014-8634

<31.4.0-1
  • M
Cross-site Request Forgery (CSRF)

<31.4.0-1
  • M
Out-of-Bounds

<31.3.0-1
  • M
CVE-2014-1592

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
Improper Input Validation

<31.3.0-1
  • M
CVE-2014-1586

<31.2.0-1
  • H
CVE-2014-1574

<31.2.0-1
  • M
CVE-2014-1577

<31.2.0-1
  • H
Out-of-Bounds

<31.2.0-1
  • M
CVE-2014-1585

<31.2.0-1
  • H
Out-of-Bounds

<31.2.0-1
  • H
CVE-2014-1581

<31.2.0-1
  • L
Cryptographic Issues

<31.3.0-1
  • M
Access of Uninitialized Pointer

<31.2.0-1
  • H
CVE-2014-1567

<31.2.0-1
  • C
Use After Free

<31.2.0-1
  • M
Out-of-Bounds

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • C
Out-of-Bounds

<31.2.0-1
  • C
CVE-2014-1550

<31.0-1
  • M
Access Restriction Bypass

<31.0-1
  • C
CVE-2014-1547

<31.0-1
  • M
CVE-2014-1559

<31.0-1
  • H
Out-of-Bounds

<31.0-1
  • H
Arbitrary Code Injection

<31.0-1
  • M
CVE-2014-1558

<31.0-1
  • M
CVE-2014-1560

<31.0-1
  • H
CVE-2014-1555

<31.0-1
  • C
CVE-2014-1544

<31.2.0-1
  • H
Arbitrary Code Injection

<31.0-1
  • H
CVE-2014-1540

<31.0~b1-1
  • C
CVE-2014-1541

<31.0~b1-1
  • C
CVE-2014-1536

<31.0~b1-1
  • C
CVE-2014-1538

<31.0~b1-1
  • C
CVE-2014-1533

<31.0~b1-1
  • C
CVE-2014-1537

<31.0~b1-1
  • C
CVE-2014-1545

<31.0~b1-1
  • M
Out-of-Bounds

<31.0~b1-1
  • C
Out-of-Bounds

<31.0~b1-1
  • H
CVE-2014-1518

<24.5.0-1
  • H
Use After Free

<24.5.0-1
  • C
Use After Free

<24.5.0-1
  • H
Improper Privilege Management

<24.5.0-1
  • C
Buffer Overflow

<24.5.0-1
  • M
Out-of-bounds Write

<24.5.0-1
  • M
Cross-site Scripting (XSS)

<24.5.0-1
  • H
Information Exposure

<24.4.0-1
  • C
Out-of-bounds Write

<24.4.0-1
  • H
Out-of-bounds Write

<24.4.0-1
  • H
Out-of-bounds Read

<24.4.0-1
  • H
Buffer Overflow

<24.4.0-1
  • C
Use After Free

<24.4.0-1
  • C
Out-of-Bounds

<24.4.0-1
  • C
Improper Privilege Management

<24.4.0-1
  • C
Improper Privilege Management

<24.4.0-1
  • C
Out-of-bounds Read

<24.4.0-1
  • M
Cross-site Scripting (XSS)

<24.2.0-1
  • M
Cross-site Scripting (XSS)

<24.2.0-1
  • H
Race Condition

<24.3.0-1
  • H
CVE-2014-1481

<24.3.0-1
  • C
CVE-2014-1477

<24.3.0-1
  • H
Origin Validation Error

<24.3.0-1
  • M
Inadequate Encryption Strength

<24.3.0-1
  • H
Out-of-bounds Write

<24.3.0-1
  • C
Use After Free

<24.3.0-1
  • H
CVE-2014-1479

<24.3.0-1
  • C
Arbitrary Code Injection

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • M
Cryptographic Issues

<24.2.0-1
  • C
Use After Free

<24.2.0-1
  • C
CVE-2013-5609

<24.2.0-1
  • C
CVE-2013-5615

<24.2.0-1
  • M
Information Exposure

<24.2.0-1
  • M
Numeric Errors

<24.2.0-1
  • C
CVE-2013-5601

<17.0.10-1
  • M
Out-of-Bounds

<17.0.10-1
  • H
Out-of-Bounds

<17.0.10-1
  • C
CVE-2013-5599

<17.0.10-1
  • C
CVE-2013-5597

<17.0.10-1
  • C
Out-of-Bounds

<17.0.10-1
  • C
CVE-2013-5590

<17.0.10-1
  • C
CVE-2013-5600

<17.0.10-1
  • M
Out-of-Bounds

<17.0.9-1
  • M
Access Restriction Bypass

<17.0.9-1
  • H
Out-of-Bounds

<17.0.9-1
  • C
Out-of-Bounds

<17.0.9-1
  • M
Out-of-Bounds

<17.0.9-1
  • H
Resource Management Errors

<17.0.9-1
  • C
Out-of-Bounds

<17.0.9-1
  • H
Improper Input Validation

<17.0.9-1
  • M
Access Restriction Bypass

<17.0.8-1
  • C
CVE-2013-1701

<17.0.8-1
  • M
Cross-site Scripting (XSS)

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.8-1
  • C
Improper Input Validation

<17.0.8-1
  • M
Access Restriction Bypass

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • H
Access Restriction Bypass

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • H
Access Restriction Bypass

<17.0.7-1
  • H
Out-of-Bounds

<17.0.7-1
  • H
Improper Input Validation

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • C
CVE-2013-1682

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • H
Resource Management Errors

<17.0.7-1
  • M
Access Restriction Bypass

<17.0.7-1
  • C
CVE-2013-0801

<17.0.7-1
  • M
Out-of-Bounds

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
Resource Management Errors

<17.0.7-1
  • C
Out-of-Bounds

<17.0.7-1
  • C
CVE-2013-0788

<17.0.5-1
  • M
CVE-2013-0800

<17.0.5-1
  • C
CVE-2013-0796

<17.0.5-1
  • M
Cross-site Scripting (XSS)

<17.0.5-1
  • C
Access Restriction Bypass

<17.0.7-1
  • H
Resource Management Errors

<17.0.5-1
  • H
CVE-2013-0783

<17.0.5-1
  • H
Use After Free

<17.0.5-1
  • H
Use After Free

<17.0.5-1
  • M
Improper Certificate Validation

<17.0.5-1
  • H
Out-of-bounds Write

<17.0.5-1
  • H
CVE-2013-0773

<17.0.5-1
  • H
Integer Overflow or Wraparound

<10.0.12-1
  • H
CVE-2013-0769

<10.0.12-1
  • M
Improper Authentication

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
Arbitrary Code Injection

<10.0.12-1
  • C
Out-of-bounds Read

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • M
Information Exposure

<10.0.12-1
  • H
Use After Free

<10.0.12-1
  • H
CVE-2013-0746

<10.0.12-1
  • H
Use After Free

<10.0.11-1
  • H
Out-of-Bounds

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • H
CVE-2012-5842

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • H
Out-of-bounds Write

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • H
Use After Free

<10.0.11-1
  • M
Cross-site Scripting (XSS)

<10.0.11-1
  • C
Integer Overflow or Wraparound

<10.0.11-1
  • M
Arbitrary Code Injection

<10.0.10-1
  • M
Cross-site Scripting (XSS)

<10.0.10-1
  • M
Origin Validation Error

<10.0.9-1
  • M
Access Restriction Bypass

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
CVE-2012-3982

<10.0.9-1
  • H
Improper Privilege Management

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-bounds Read

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Out-of-Bounds

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • H
Access Restriction Bypass

<10.0.9-1
  • M
Cross-site Scripting (XSS)

<10.0.9-1
  • H
Use After Free

<10.0.9-1
  • M
Improper Input Validation

<10.0.9-1
  • H
Out-of-bounds Write

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Out-of-Bounds

<10.0.7-1
  • H
CVE-2012-3962

<10.0.7-1
  • M
Information Exposure

<10.0.7-1
  • H
Numeric Errors

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Out-of-bounds Write

<10.0.7-1
  • C
Out-of-Bounds

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • H
Arbitrary Code Injection

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • M
Access Restriction Bypass

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
Use After Free

<10.0.7-1
  • C
CVE-2012-1967

<10.0.6-1
  • H
Out-of-Bounds

<10.0.6-1
  • M
Cross-site Scripting (XSS)

<10.0.6-1
  • H
Resource Management Errors

<10.0.6-1
  • M
Improper Input Validation

<10.0.6-1
  • M
CVE-2012-1955

<10.0.6-1
  • M
Access Restriction Bypass

<10.0.6-1
  • H
Resource Management Errors

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • M
CVE-2012-1964

<10.0.6-1
  • H
CVE-2012-1948

<10.0.6-1
  • M
CVE-2012-1950

<10.0.6-1
  • M
Access Restriction Bypass

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • C
Resource Management Errors

<10.0.6-1
  • L
Information Exposure

<10.0.5-1
  • H
Resource Management Errors

<10.0.5-1
  • H
Resource Management Errors

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • M
Cross-site Scripting (XSS)

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • H
Out-of-Bounds

<10.0.5-1
  • H
CVE-2012-1937

<10.0.5-1
  • L
Access Restriction Bypass

<10.0.4-1
  • C
Resource Management Errors

<10.0.4-1
  • C
Out-of-Bounds

<10.0.4-1
  • H
Access Restriction Bypass

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
Numeric Errors

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
CVE-2012-0479

<10.0.4-1
  • C
CVE-2012-0467

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.4-1
  • M
Incorrect Calculation

<10.0.4-1
  • M
Cross-site Scripting (XSS)

<10.0.3-1
  • H
Resource Management Errors

<10.0.3-1
  • H
CVE-2012-0461

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • M
Information Exposure

<10.0.3-1
  • H
CVE-2012-0462

<10.0.3-1
  • M
Arbitrary Code Injection

<10.0.3-1
  • H
Access Restriction Bypass

<10.0.3-1
  • H
Resource Management Errors

<10.0.3-1
  • M
Information Exposure

<7.0-1
  • M
Information Exposure

<10.0.3-1
  • M
Cross-site Scripting (XSS)

<10.0.3-1
  • H
Out-of-Bounds

<10.0.3-1
  • C
Out-of-Bounds

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • H
CVE-2012-0442

<10.0.3-1
  • M
Access Restriction Bypass

<10.0.3-1
  • H
Improper Input Validation

<3.1.16-1
  • M
Cross-site Scripting (XSS)

<3.1.16-1
  • H
Out-of-Bounds

<3.1.16-1
  • C
Numeric Errors

<3.1.15-1
  • C
CVE-2011-2995

<3.1.15-1
  • M
Access Restriction Bypass

<3.1.15-1
  • L
Access Restriction Bypass

<3.1.15-1
  • M
Arbitrary Code Injection

<3.1.15-1
  • H
Configuration

<3.1.12-1
  • M
Information Exposure

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • C
CVE-2011-2982

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • C
Arbitrary Code Injection

<3.1.12-1
  • C
Resource Management Errors

<3.1.11-1
  • M
Access Restriction Bypass

<3.1.11-1
  • M
Arbitrary Code Injection

<3.1.11-1
  • H
Resource Management Errors

<3.1.11-1
  • C
CVE-2011-2374

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • C
Numeric Errors

<3.1.11-1
  • C
CVE-2011-2365

<3.1.11-1
  • C
Resource Management Errors

<3.1.11-1
  • C
CVE-2011-2376

<3.1.11-1
  • C
CVE-2011-0069

<3.1.10-1
  • C
CVE-2011-0070

<3.1.10-1
  • C
CVE-2011-0074

<3.1.10-1
  • C
Resource Management Errors

<3.1.15-1+b1
  • M
Directory Traversal

<3.1.10-1
  • C
CVE-2011-0080

<3.1.10-1
  • C
CVE-2011-0075

<3.1.10-1
  • C
Resource Management Errors

<3.1.15-1+b1
  • C
CVE-2011-0077

<3.1.10-1
  • C
CVE-2011-0078

<3.1.10-1
  • C
CVE-2011-0072

<3.1.10-1
  • M
Information Exposure

<17.0.2-1
  • M
Improper Input Validation

<3.0.11-2
  • C
Resource Management Errors

<3.0.11-2
  • C
Resource Management Errors

<3.0.11-2
  • C
Out-of-Bounds

<3.0.11-2
  • C
CVE-2011-0053

<3.0.11-2
  • C
Out-of-Bounds

<3.0.11-2
  • M
Cross-site Request Forgery (CSRF)

<3.0.11-2
  • H
Out-of-Bounds

<3.0.11-1
  • H
Improper Input Validation

<3.0.11-1
  • H
Out-of-Bounds

<3.0.11-1
  • H
Out-of-Bounds

<3.0.11-1
  • H
Out-of-Bounds

<3.0.10-1
  • H
Resource Management Errors

<3.0.9-1
  • H
CVE-2010-3182

<3.0.9-1
  • H
CVE-2010-3174

<3.0.9-1
  • H
Out-of-Bounds

<3.0.9-1
  • M
Access Restriction Bypass

<3.0.9-1
  • H
Out-of-Bounds

<3.0.9-1
  • H
Resource Management Errors

<3.0.7-1
  • H
Numeric Errors

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • M
Access Restriction Bypass

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • H
Arbitrary Code Injection

<3.0.7-1
  • H
Out-of-Bounds

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • M
Cross-site Scripting (XSS)

<3.0.7-1
  • H
CVE-2010-3169

<3.0.7-1
  • H
Resource Management Errors

<3.0.7-1
  • H
Numeric Errors

<3.0.6-1
  • H
Out-of-Bounds

<3.0.6-1
  • M
Improper Input Validation

<3.0.6-1
  • H
Numeric Errors

<3.0.6-1
  • H
CVE-2010-1211

<3.0.6-1
  • M
Information Exposure

<3.0.6-1
  • C
Buffer Overflow

<3.0.6-1
  • H
Numeric Errors

<3.0.5-1
  • H
Numeric Errors

<3.0.5-1
  • H
Improper Input Validation

<3.0.11-2
  • C
CVE-2010-0174

<3.0.4-1
  • M
Improper Input Validation

<3.0.4-1
  • H
Resource Management Errors

<3.0.4-1
  • H
CVE-2010-0173

<3.0.4-1
  • H
Resource Management Errors

<3.0.4-1
  • M
CVE-2010-0169

<3.0.2-1
  • H
Out-of-Bounds

<3.0.2-1
  • M
Cross-site Scripting (XSS)

<3.0.2-1
  • M
CVE-2010-0163

<3.0.4-1
  • C
Arbitrary Code Injection

<3.0.2-1
  • C
CVE-2010-0159

<3.0.2-1
  • M
Information Exposure

<3.0.6-1
  • M
Information Exposure

<3.0.2-1
  • C
CVE-2009-3072

<3.0~rc2-2
  • C
CVE-2009-3075

<3.0~rc2-2
  • M
Information Exposure

<2.0.0.19-1
  • H
Out-of-Bounds

<2.0.0.24-1
  • M
Improper Input Validation

<2.0.0.24-1
  • C
Numeric Errors

<3.0~rc2-2
  • H
CVE-2009-2210

<2.0.0.22-1
  • H
Cryptographic Issues

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • M
Improper Authentication

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • H
Arbitrary Code Injection

<2.0.0.22-1
  • M
Configuration

<2.0.0.22-1
  • M
Improper Input Validation

<2.0.0.22-1
  • M
Resource Management Errors

<2.0.0.22-1
  • M
Information Exposure

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • H
Resource Management Errors

<2.0.0.22-1
  • H
Resource Management Errors

<2.0.0.22-1
  • M
Arbitrary Code Injection

<2.0.0.22-1
  • M
CVE-2009-0652

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • C
Resource Management Errors

<2.0.0.22-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • M
Information Exposure

<2.0.0.19-1
  • M
Improper Input Validation

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • M
CVE-2008-5510

<2.0.0.19-1
  • L
CVE-2008-5503

<2.0.0.19-1
  • M
Cross-site Scripting (XSS)

<2.0.0.19-1
  • M
Resource Management Errors

*
  • M
Information Exposure

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • H
Resource Management Errors

<2.0.0.19-1
  • M
Resource Management Errors

<2.0.0.19-1
  • C
Numeric Errors

<2.0.0.19-1
  • C
Improper Input Validation

<2.0.0.19-1
  • H
Improper Authentication

<2.0.0.19-1
  • C
Resource Management Errors

<2.0.0.19-1
  • H
XML Injection

<2.0.0.19-1
  • M
Access Restriction Bypass

<2.0.0.19-1
  • C
Out-of-Bounds

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • C
Out-of-Bounds

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • M
Cross-site Scripting (XSS)

<2.0.0.17-1
  • M
Cross-site Scripting (XSS)

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • C
Resource Management Errors

<2.0.0.17-1
  • C
Numeric Errors

<2.0.0.17-1
  • M
Directory Traversal

<2.0.0.17-1
  • H
Directory Traversal

<2.0.0.17-1
  • H
Access Restriction Bypass

<2.0.0.17-1
  • M
Improper Input Validation

<2.0.0.16-1
  • M
Access Restriction Bypass

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • M
Information Exposure

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • H
Access Restriction Bypass

<2.0.0.16-1
  • C
Resource Management Errors

<2.0.0.16-1
  • H
Numeric Errors

<2.0.0.16-1
  • H
Resource Management Errors

<2.0.0.14-1
  • M
Resource Management Errors

<2.0.0.14-1
  • M
Resource Management Errors

<2.0.0.14-1
  • H
CVE-2008-1235

<2.0.0.14-1
  • M
Cross-site Scripting (XSS)

<2.0.0.14-1
  • M
Arbitrary Code Injection

<2.0.0.14-1
  • H
Out-of-Bounds

<2.0.0.12-1
  • M
Cross-site Scripting (XSS)

<2.0.0.12-1
  • M
Information Exposure

<2.0.0.12-1
  • M
CVE-2008-0594

<2.0.0.12-1
  • M
CVE-2008-0591

<2.0.0.12-1
  • M
CVE-2008-0592

<2.0.0.12-1
  • M
Cross-site Scripting (XSS)

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • M
Directory Traversal

<2.0.0.12-1
  • M
Arbitrary Code Injection

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • H
Resource Management Errors

<2.0.0.12-1
  • M
Improper Input Validation

<2.0.0.12-1
  • M
Improper Input Validation

<2.0.0.9-1
  • M
Improper Input Validation

<2.0.0.9-1
  • M
CVE-2007-3844

<2.0.0.6-1
  • H
CVE-2007-3845

<2.0.0.6-1
  • H
CVE-2007-3734

<2.0.0.6-1
  • H
CVE-2007-3735

<2.0.0.6-1
  • H
Arbitrary Code Injection

<2.0.0.4-1
  • H
Out-of-Bounds

<2.0.0.4-1
  • L
CVE-2007-1558

<2.0.0.4-1
  • H
CVE-2007-1282

<1.5.0.10.dfsg1-1
  • M
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • M
Numeric Errors

<1.5.0.10.dfsg1-1
  • H
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • H
Out-of-Bounds

<1.5.0.10.dfsg1-1
  • M
CVE-2007-0775

<1.5.0.10.dfsg1-1
  • M
Security Features

<1.5.0.9.dfsg1-1
  • H
Arbitrary Code Injection

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6505

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6499

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6498

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6497

<1.5.0.9.dfsg1-1
  • M
CVE-2006-6502

<1.5.0.9.dfsg1-1
  • M
Access Restriction Bypass

<1.5.0.9.dfsg1-1
  • H
CVE-2006-5463

<1.5.0.8-1
  • M
CVE-2006-5464

<1.5.0.8-1
  • H
CVE-2006-5747

<1.5.0.8-1
  • M
CVE-2006-5462

<1.5.0.8-1
  • M
CVE-2006-5748

<1.5.0.8-1
  • M
CVE-2006-5633

*