| Improper Input Validation | |
| Improper Input Validation | |
| Resource Exhaustion | <1:4.2.6.p5+dfsg-7+deb8u3 |
| Information Exposure | |
| Directory Traversal | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2018-7170 | |
| Out-of-bounds Read | |
| CVE-2018-7185 | |
| CVE-2018-7184 | |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Insufficient Entropy | |
| Improper Input Validation | |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Improper Authentication | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Missing Release of Resource after Effective Lifetime | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Loop with Unreachable Exit Condition ('Infinite Loop') | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Incorrect Type Conversion or Cast | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Time and State | <1:4.2.6.p5+dfsg-7+deb8u1 |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Exhaustion | <1:4.2.6.p5+dfsg-7+deb8u2 |
| CVE-2015-8158 | <1:4.2.6.p5+dfsg-7+deb8u2 |
| Out-of-Bounds | |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u2 |
| Improper Access Control | |
| Improper Input Validation | |
| NULL Pointer Dereference | <1:4.2.6.p5+dfsg-7+deb8u2 |
| Out-of-bounds Read | <1:4.2.6.p5+dfsg-7+deb8u2 |
| Security Features | |
| Improper Data Handling | <1:4.2.6.p5+dfsg-7+deb8u2 |
| Security Features | |
| Improper Access Control | |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u2 |
| Resource Exhaustion | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Source Code | |
| Improper Input Validation | <1:4.2.6.p5+dfsg-7+deb8u2 |
| Improper Data Handling | |
| Information Exposure | <1:4.2.6.p5+dfsg-7+deb8u2 |
| Improper Data Handling | <1:4.2.6.p5+dfsg-7+deb8u2 |
| Race Condition | |
| Race Condition | |
| Improper Authentication | <1:4.2.6.p5+dfsg-7+deb8u2 |
| Improper Input Validation | |
| Improper Input Validation | |
| Code | |
| Code | |
| Out-of-Bounds | |
| Code | |
| CVE-2014-9293 | |
| CVE-2014-9294 | |
| Improper Input Validation | |
| CVE-2009-3563 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Authentication | |
| CVE-2005-2496 | |
| Integer Overflow or Wraparound | |