php5 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the php5 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Integer Overflow or Wraparound

<5.6.40+dfsg-0+deb8u12
  • H
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u11
  • M
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u11
  • M
CVE-2020-7066

<5.6.40+dfsg-0+deb8u11
  • M
Improper Preservation of Permissions

<5.6.40+dfsg-0+deb8u10
  • H
NULL Pointer Dereference

<5.6.40+dfsg-0+deb8u10
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u9
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u9
  • M
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u8
  • M
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u8
  • M
Arbitrary Code Injection

<5.6.40+dfsg-0+deb8u8
  • M
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u8
  • C
Out-of-bounds Write

<5.6.40+dfsg-0+deb8u7
  • H
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u5
  • H
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u5
  • H
Improper Input Validation

*
  • M
Use of Uninitialized Resource

*
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u4
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u4
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u3
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u3
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u3
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

<5.6.40+dfsg-0+deb8u2
  • C
Out-of-Bounds

<5.6.40+dfsg-0+deb8u2
  • H
Out-of-Bounds

<5.6.40+dfsg-0+deb8u2
  • H
Out-of-Bounds

<5.6.40+dfsg-0+deb8u2
  • H
Access Restriction Bypass

<5.6.40+dfsg-0+deb8u2
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u2
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u1
  • C
Out-of-bounds Read

<5.6.40+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.39+dfsg-0+deb8u1
  • H
Out-of-bounds Write

*
  • H
Deserialization of Untrusted Data

<5.6.39+dfsg-0+deb8u2
  • H
NULL Pointer Dereference

<5.6.39+dfsg-0+deb8u1
  • H
Arbitrary Argument Injection

<5.6.39+dfsg-0+deb8u1
  • M
Cross-site Scripting (XSS)

<5.6.38+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.37+dfsg-0+deb8u1
  • M
Out-of-bounds Read

<5.6.37+dfsg-0+deb8u1
  • H
Out-of-bounds Read

*
  • C
Use After Free

<5.6.1+dfsg-1
  • H
Missing Release of Resource after Effective Lifetime

<5.4.4-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.6.36+dfsg-0+deb8u1
  • M
Cross-site Scripting (XSS)

<5.6.36+dfsg-0+deb8u1
  • M
Information Exposure

<5.6.36+dfsg-0+deb8u1
  • H
NULL Pointer Dereference

<5.6.36+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.36+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.36+dfsg-0+deb8u1
  • M
Resource Exhaustion

*
  • H
Improper Input Validation

<5.6.19+dfsg-0+deb8u1
  • M
Incorrect Conversion between Numeric Types

<5.6.33+dfsg-0+deb8u1
  • M
Cross-site Scripting (XSS)

<5.6.33+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.33+dfsg-0+deb8u1
  • M
Out-of-Bounds

<5.6.33+dfsg-0+deb8u1
  • C
Out-of-bounds Read

<5.6.33+dfsg-0+deb8u1
  • M
Information Exposure

*
  • H
Out-of-Bounds

<5.6.33+dfsg-0+deb8u1
  • C
Out-of-Bounds

*
  • H
Information Exposure

<5.6.33+dfsg-0+deb8u1
  • H
Use After Free

<5.6.33+dfsg-0+deb8u1
  • C
Out-of-bounds Read

<5.6.30+dfsg-0+deb8u1
  • H
Resource Exhaustion

<5.6.33+dfsg-0+deb8u1
  • H
Improper Check for Unusual or Exceptional Conditions

<5.6.33+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.28+dfsg-0+deb8u1
  • C
Use After Free

<5.6.23+dfsg-0+deb8u1
  • C
Resource Exhaustion

*
  • H
Out-of-bounds Write

<5.6.24+dfsg-0+deb8u1
  • H
Server-Side Request Forgery (SSRF)

*
  • M
Improper Input Validation

<5.6.30+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.30+dfsg-0+deb8u1
  • H
Access Restriction Bypass

<5.6.29+dfsg-0+deb8u1
  • H
Arbitrary Code Injection

*
  • H
Out-of-bounds Read

<5.6.30+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.30+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.30+dfsg-0+deb8u1
  • H
Numeric Errors

<5.6.30+dfsg-0+deb8u1
  • C
Use After Free

<5.6.30+dfsg-0+deb8u1
  • H
CVE-2016-7478

<5.6.28+dfsg-0+deb8u1
  • C
Use After Free

<5.6.27+dfsg-0+deb8u1
  • C
Out-of-bounds Read

<5.6.29+dfsg-0+deb8u1
  • H
NULL Pointer Dereference

<5.6.28+dfsg-0+deb8u1
  • C
Use After Free

<5.6.28+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.0+dfsg-1
  • H
Out-of-Bounds

<5.6.28+dfsg-0+deb8u1
  • C
Integer Overflow or Wraparound

<5.6.27+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.26+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.26+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.26+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.26+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.26+dfsg-0+deb8u1
  • C
Use After Free

<5.6.26+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.26+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.26+dfsg-0+deb8u1
  • H
Arbitrary Code Injection

<5.6.26+dfsg-0+deb8u1
  • C
Out-of-bounds Write

<5.6.26+dfsg-0+deb8u1
  • H
NULL Pointer Dereference

<5.6.26+dfsg-0+deb8u1
  • H
NULL Pointer Dereference

<5.6.26+dfsg-0+deb8u1
  • H
NULL Pointer Dereference

<5.6.26+dfsg-0+deb8u1
  • C
Out-of-bounds Write

<5.6.26+dfsg-0+deb8u1
  • M
Information Exposure

<5.6.26+dfsg-0+deb8u1
  • C
Deserialization of Untrusted Data

<5.6.26+dfsg-0+deb8u1
  • M
Out-of-Bounds

<5.6.24+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.22+dfsg-0+deb8u1
  • C
Integer Overflow or Wraparound

<5.6.23+dfsg-0+deb8u1
  • C
Use After Free

<5.6.23+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.22+dfsg-0+deb8u1
  • C
Use After Free

<5.6.23+dfsg-0+deb8u1
  • C
Out-of-Bounds

*
  • C
Double Free

<5.6.23+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.26+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.22+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.22+dfsg-0+deb8u1
  • C
Double Free

<5.6.23+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<5.6.22+dfsg-0+deb8u1
  • M
Cross-site Scripting (XSS)

<5.6.6+dfsg-1
  • C
Integer Overflow or Wraparound

<5.6.23+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.23+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.23+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.17+dfsg-0+deb8u1
  • H
Integer Overflow or Wraparound

<5.6.24+dfsg-0+deb8u1
  • C
Use After Free

<5.6.24+dfsg-0+deb8u1
  • M
NULL Pointer Dereference

<5.6.24+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.24+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.15+dfsg-1
  • C
Out-of-bounds Read

<5.6.24+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.24+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.24+dfsg-0+deb8u1
  • C
Use After Free

<5.6.24+dfsg-0+deb8u1
  • H
Improper Access Control

<5.6.24+dfsg-0+deb8u1
  • M
Directory Traversal

<5.6.13+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.22+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.19+dfsg-0+deb8u1
  • C
CVE-2016-4540

<5.6.22+dfsg-0+deb8u1
  • H
Resource Management Errors

<5.6.12+dfsg-0+deb8u1
  • C
CVE-2015-8866

<5.6.6+dfsg-1
  • C
Improper Input Validation

<5.6.22+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.22+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.22+dfsg-0+deb8u1
  • C
CVE-2016-4541

<5.6.22+dfsg-0+deb8u1
  • C
CVE-2015-8876

<5.6.12+dfsg-0+deb8u1
  • H
Cryptographic Issues

<5.6.12+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.12+dfsg-0+deb8u1
  • H
CVE-2016-4343

<5.6.18+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.22+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.22+dfsg-0+deb8u1
  • M
Out-of-Bounds

<5.6.12+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.20+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.20+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.20+dfsg-0+deb8u1
  • H
Numeric Errors

<5.6.20+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.20+dfsg-0+deb8u1
  • C
CVE-2015-4116

<5.6.12+dfsg-0+deb8u1
  • H
CVE-2015-6837

<5.6.13+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.9+dfsg-0+deb8u1
  • C
CVE-2015-4599

<5.6.9+dfsg-0+deb8u1
  • H
CVE-2014-0236

<5.6.0~beta4+dfsg-1
  • H
Improper Input Validation

<5.6.12+dfsg-0+deb8u1
  • M
Information Exposure

<5.6.9+dfsg-0+deb8u1
  • C
CVE-2015-4602

<5.6.9+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.9+dfsg-0+deb8u1
  • H
CVE-2015-6838

<5.6.13+dfsg-0+deb8u1
  • H
Improper Input Validation

<5.6.12+dfsg-0+deb8u1
  • C
CVE-2015-8835

<5.6.12+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.12+dfsg-0+deb8u1
  • M
Improper Access Control

<5.6.12+dfsg-0+deb8u1
  • C
CVE-2015-6834

<5.6.13+dfsg-0+deb8u1
  • C
CVE-2015-6835

<5.6.13+dfsg-0+deb8u1
  • C
Improper Input Validation

<5.6.12+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.19+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.12+dfsg-0+deb8u1
  • M
Improper Input Validation

<5.6.9+dfsg-0+deb8u1
  • C
CVE-2015-4603

<5.6.9+dfsg-0+deb8u1
  • C
CVE-2015-4600

<5.6.9+dfsg-0+deb8u1
  • M
Improper Input Validation

<5.6.12+dfsg-0+deb8u1
  • C
CVE-2015-4601

<5.6.9+dfsg-0+deb8u1
  • H
CVE-2015-4644

<5.6.12+dfsg-0+deb8u1
  • C
Numeric Errors

<5.6.22+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.19+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.19+dfsg-0+deb8u1
  • C
Out-of-Bounds

<5.6.14+dfsg-0+deb8u1
  • H
CVE-2015-6832

<5.6.12+dfsg-0+deb8u1
  • H
CVE-2015-6831

<5.6.12+dfsg-0+deb8u1
  • H
Directory Traversal

<5.6.12+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.12+dfsg-0+deb8u1
  • H
CVE-2015-6836

<5.6.13+dfsg-0+deb8u1
  • M
CVE-2015-7803

<5.6.14+dfsg-0+deb8u1
  • M
Numeric Errors

<5.6.14+dfsg-0+deb8u1
  • H
Out-of-Bounds

<5.6.9+dfsg-0+deb8u1
  • M
Resource Management Errors

<5.6.9+dfsg-0+deb8u1
  • M
Out-of-Bounds

<5.6.9+dfsg-0+deb8u1
  • M
Numeric Errors

<5.6.9+dfsg-0+deb8u1
  • M
Improper Input Validation

<5.6.7+dfsg-1
  • H
Out-of-Bounds

<5.6.9+dfsg-0+deb8u1
  • H
Improper Data Handling

<5.6.9+dfsg-0+deb8u1
  • H
Improper Data Handling

<5.6.7+dfsg-1
  • H
Numeric Errors

<5.6.9+dfsg-0+deb8u1
  • M
Improper Input Validation

<5.6.7+dfsg-1
  • H
Improper Data Handling

<5.6.9+dfsg-0+deb8u1
  • H
Use After Free

<5.6.6+dfsg-2
  • H
Numeric Errors

<5.6.7+dfsg-1
  • H
Out-of-Bounds

<5.6.6+dfsg-1
  • M
Out-of-Bounds

<5.6.5+dfsg-1
  • H
CVE-2015-2301

<5.6.6+dfsg-1
  • M
Arbitrary Code Injection

*
  • M
Out-of-Bounds

<5.6.5+dfsg-1
  • M
CVE-2015-1352

<5.6.6+dfsg-2
  • M
Access Restriction Bypass

<5.6.7+dfsg-1
  • M
Numeric Errors

<5.6.6+dfsg-1
  • H
CVE-2015-2787

<5.6.7+dfsg-1
  • H
CVE-2015-0273

<5.6.6+dfsg-1
  • M
CVE-2015-0232

<5.6.5+dfsg-1
  • H
CVE-2015-0231

<5.6.5+dfsg-1
  • M
Resource Management Errors

<5.6.5+dfsg-1
  • H
Out-of-Bounds

<5.6.5+dfsg-1
  • H
CVE-2014-9425

*
  • H
CVE-2014-8142

<5.6.5+dfsg-1
  • M
Resource Management Errors

<5.6.4+dfsg-2
  • M
Resource Management Errors

<5.6.4+dfsg-2
  • H
Out-of-Bounds

<5.2.9.dfsg.1-1
  • M
Improper Input Validation

<5.6.3+dfsg-1
  • M
Out-of-Bounds

<5.6.2+dfsg-1
  • H
Numeric Errors

<5.6.2+dfsg-1
  • M
Out-of-Bounds

<5.6.2+dfsg-1
  • M
Link Following

*
  • M
Numeric Errors

<5.6.0+dfsg-1
  • M
Improper Input Validation

<5.4.0-1
  • M
Out-of-Bounds

<5.6.0+dfsg-1
  • M
CVE-2014-4670

<5.6.0~rc3+dfsg-1
  • M
CVE-2014-4698

<5.6.0~rc3+dfsg-1
  • M
Out-of-Bounds

<5.6.0~rc1+dfsg-1
  • M
Numeric Errors

<5.6.0~rc1+dfsg-1
  • M
Improper Input Validation

<5.6.0~rc1+dfsg-1
  • M
Out-of-Bounds

<5.6.0~beta4+dfsg-1
  • M
Improper Input Validation

<5.6.0~rc1+dfsg-1
  • H
CVE-2014-3515

<5.6.0~rc2+dfsg-1
  • L
Information Exposure

<5.6.0~rc1+dfsg-2
  • M
Resource Management Errors

<5.6.0~rc4+dfsg-1
  • M
Out-of-Bounds

<5.6.0~beta4+dfsg-3
  • M
Link Following

<5.6.0~rc1+dfsg-1
  • M
Resource Management Errors

<5.6.0~beta4+dfsg-1
  • M
Out-of-Bounds

<5.6.0~beta4+dfsg-1
  • H
Access Restriction Bypass

<5.5.12+dfsg-1
  • M
Access Restriction Bypass

<5.6.0+dfsg-1
  • M
Resource Management Errors

<5.6.0~rc4+dfsg-1
  • M
Out-of-Bounds

<5.5.10+dfsg-1
  • M
Resource Management Errors

<5.5.10+dfsg-1
  • M
Numeric Errors

<5.5.9+dfsg-1
  • M
Numeric Errors

<5.5.9+dfsg-1
  • M
Improper Input Validation

<5.5.9+dfsg-1
  • M
Numeric Errors

<5.5.9+dfsg-1
  • M
Information Exposure

*
  • H
Out-of-Bounds

<5.5.6+dfsg-2
  • M
Out-of-Bounds

<5.5.6+dfsg-2
  • M
Information Exposure

<5.4.4-14
  • M
Improper Input Validation

<5.5.3+dfsg-1
  • M
Access Restriction Bypass

<5.5.2+dfsg-1
  • M
Out-of-Bounds

<5.5.0+dfsg-15
  • M
Numeric Errors

<5.5.0+dfsg-1
  • M
Improper Input Validation

<5.5.0+dfsg-1
  • M
Out-of-Bounds

<5.5.0~rc3+dfsg-1
  • M
Improper Input Validation

*
  • M
Information Exposure

<5.4.4-14
  • H
Access Restriction Bypass

<5.4.4-14
  • M
Information Exposure

<5.4.0~beta2-1
  • M
Improper Input Validation

<5.4.1~rc1-1
  • M
Improper Input Validation

<5.4.0~rc5-1
  • M
Cryptographic Issues

<5.3.6-1
  • L
CVE-2012-3450

<5.4.4-1
  • M
Access Restriction Bypass

*
  • C
CVE-2012-2688

<5.4.4-4
  • H
Numeric Errors

<5.4.4~rc1-1
  • M
Cryptographic Issues

<5.3.3-1
  • M
Improper Input Validation

<5.4.0-1
  • C
Improper Input Validation

<5.4.3-1
  • M
Improper Input Validation

<5.4.3
  • H
SQL Injection

<5.4.3-1
  • M
Out-of-Bounds

<5.4.3-1
  • M
Resource Management Errors

<5.3.9-1
  • M
Improper Input Validation

<5.3.9-1
  • M
Improper Input Validation

<5.3.10-1
  • H
Resource Management Errors

<5.3.10-1
  • M
Access Restriction Bypass

<5.3.9-1
  • M
Improper Input Validation

<5.3.9-1
  • M
Resource Management Errors

<5.3.9-1
  • M
Improper Input Validation

<5.3.9-1
  • M
Numeric Errors

<5.3.9-1
  • H
Arbitrary Code Injection

<5.3.9-1
  • C
Out-of-Bounds

<5.3.8-1
  • M
Resource Management Errors

<5.3.7-1
  • M
Resource Management Errors

<5.3.7-1
  • M
Cryptographic Issues

<5.3.6-13
  • M
CVE-2011-3182

<5.3.7-1
  • M
Cryptographic Issues

<5.3.8-1
  • M
Access Restriction Bypass

<5.3.6-12
  • H
Out-of-Bounds

<5.3.6-13
  • H
Link Following

<5.3.6-1
  • M
CVE-2011-0421

<5.3.6-1
  • M
Improper Input Validation

<5.3.6-1
  • M
Out-of-Bounds

<5.3.6-1
  • M
Numeric Errors

<5.3.6-1
  • M
CVE-2011-1467

<5.3.6-1
  • M
CVE-2011-1469

<5.3.6-1
  • M
Numeric Errors

<5.3.6-1
  • M
Resource Management Errors

<5.3.6-1
  • M
Out-of-Bounds

<5.3.6-1
  • H
Resource Management Errors

<5.4.0-1
  • H
Use of Externally-Controlled Format String

<5.3.6-1
  • H
Numeric Errors

<5.4.0-1
  • M
Link Following

<5.3.6-1
  • M
CVE-2011-0420

<5.3.6-1
  • M
Improper Input Validation

<5.3.3-7
  • M
Numeric Errors

<5.3.5-1
  • M
Race Condition

<5.3.5-1
  • M
Numeric Errors

<5.3.5-1
  • M
Out-of-Bounds

<5.3.3-7
  • M
Resource Management Errors

<5.3.5-1
  • M
Improper Input Validation

<5.3.3-6
  • M
Numeric Errors

<5.3.3-7
  • M
Resource Management Errors

<5.3.3-7
  • M
Numeric Errors

<5.3.3-6
  • M
Numeric Errors

<5.3.3-4
  • M
Improper Input Validation

<5.3.3-4
  • M
Improper Input Validation

<5.3.3-4
  • M
Improper Input Validation

<5.3.3-4
  • M
Access Restriction Bypass

<5.3.3-4
  • M
Resource Management Errors

<5.3.3-3
  • M
Use of Externally-Controlled Format String

<5.3.3-2
  • M
Information Exposure

<5.3.3-1
  • M
Information Exposure

<5.3.3-2
  • M
Access Restriction Bypass

<5.3.3-1
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Information Exposure

*
  • H
Resource Management Errors

<5.3.3-1
  • M
Information Exposure

*
  • M
Out-of-Bounds

<5.3.3-1
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Use of Externally-Controlled Format String

<5.3.3-1
  • M
Information Exposure

*
  • M
Resource Management Errors

<5.3.3-1
  • M
Information Exposure

*
  • M
Resource Management Errors

<5.3.3-1
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Management Errors

*
  • M
Information Exposure

<5.3.3-1
  • C
Numeric Errors

<5.3.3-1
  • M
Information Exposure

<5.3.3-1
  • H
Arbitrary Code Injection

*
  • M
Access Restriction Bypass

<5.3.2-1
  • M
Cryptographic Issues

<5.3.2-1
  • H
Improper Input Validation

<5.3.2-1
  • M
CVE-2010-0397

<5.3.2-1
  • M
Numeric Errors

*
  • M
Cross-site Scripting (XSS)

<5.2.12.dfsg.1-1
  • C
CVE-2009-4143

<5.2.12.dfsg.1-1
  • M
CVE-2009-2626

<5.2.11.dfsg.1-1
  • H
Access Restriction Bypass

<5.2.11.dfsg.1-1
  • M
CVE-2009-4017

<5.2.11.dfsg.1-2
  • M
Access Restriction Bypass

<5.2.12.dfsg.1-1
  • M
Access Restriction Bypass

<5.2.12.dfsg.1-1
  • H
CVE-2009-3559

*
  • H
CVE-2009-3292

<5.2.11.dfsg.1-1
  • H
Improper Input Validation

<5.2.11.dfsg.1-1
  • M
Improper Input Validation

<5.2.6.dfsg.1-3
  • H
Access Restriction Bypass

*
  • M
Improper Input Validation

<5.2.10.dfsg.1-2
  • M
CVE-2009-1271

<5.2.9.dfsg.1-1
  • M
Improper Input Validation

<5.2.6.dfsg.1-3
  • M
Use of Externally-Controlled Format String

<5.2.9.dfsg.1-2
  • L
Cross-site Scripting (XSS)

<5.2.11.dfsg.1-1
  • C
Out-of-Bounds

<5.2.6.dfsg.1-1
  • H
Directory Traversal

<5.2.6.dfsg.1-3
  • H
Access Restriction Bypass

<5.2.6.dfsg.1-1
  • H
Access Restriction Bypass

*
  • M
Numeric Errors

*
  • H
Out-of-Bounds

<5.2.6-4
  • M
Out-of-Bounds

<5.2.6-4
  • M
Improper Input Validation

<5.2.6-4
  • M
Out-of-Bounds

<5.2.6-2
  • M
Directory Traversal

<5.2.6.dfsg.1-3
  • M
Directory Traversal

*
  • C
Numeric Errors

<5.2.2-1
  • H
Numeric Errors

<5.2.2-1
  • C
Out-of-Bounds

<5.2.6-1
  • C
CVE-2008-2051

<5.2.6-1
  • C
CVE-2008-0599

<5.2.6-1
  • M
Numeric Errors

<5.2.6-1
  • M
Access Restriction Bypass

<5.2.6-1
  • M
Information Exposure

<5.2.5-1
  • M
Improper Input Validation

<5.2.5-1
  • M
CVE-2007-5898

<5.2.5-1
  • H
CVE-2007-5424

*
  • M
CVE-2007-4889

*
  • M
Improper Input Validation

<5.2.5-1
  • H
Directory Traversal

<5.2.5-1
  • M
Arbitrary Code Injection

<5.2.3-1
  • M
Improper Input Validation

<5.2.5-1
  • M
Improper Input Validation

<5.2.5-1
  • M
CVE-2007-4670

<5.2.4-1
  • H
CVE-2007-4659

<5.2.4-1
  • H
Out-of-Bounds

<5.2.4-1
  • H
Out-of-Bounds

<5.2.4-1
  • H
Out-of-Bounds

<5.2.4-1
  • H
CVE-2007-4658

<5.2.4-1
  • H
Resource Management Errors

<5.2.4-1
  • H
Directory Traversal

<5.2.4-1
  • M
Link Following

<5.2.4-1
  • M
Improper Input Validation

<5.2.4-1
  • H
Access Restriction Bypass

<5.2.4-1
  • H
Arbitrary Code Injection

*
  • H
CVE-2007-4255

*
  • M
Improper Input Validation

<5.2.4-1
  • M
Improper Input Validation

<5.2.4-1
  • M
Access Restriction Bypass

<5.2.4-1
  • H
Out-of-Bounds

*
  • M
CVE-2007-3205

*
  • M
Access Restriction Bypass

<5.2.3-1
  • M
Numeric Errors

<5.2.3-1
  • C
CVE-2007-0448

*
  • M
CVE-2006-7205

*
  • M
CVE-2007-2519

<5.2.3-1
  • L
CVE-2007-2727

<5.2.2-1
  • M
CVE-2007-2728

<5.2.3-1
  • H
CVE-2007-2511

<5.2.2-1
  • L
Improper Input Validation

<5.2.2-1
  • M
Out-of-Bounds

<5.2.2-1
  • H
Out-of-Bounds

<5.2.2-1
  • M
CVE-2007-1900

<5.2.0-11
  • H
CVE-2007-1887

<5.2.0-11
  • H
CVE-2007-1883

*
  • H
CVE-2007-1889

<5.2.0-11
  • H
CVE-2007-1890

*
  • M
CVE-2007-1835

*
  • M
CVE-2007-1824

<5.2.0-11
  • H
CVE-2007-1777

<5.2.0-11
  • H
CVE-2007-1718

<5.2.0-11
  • M
CVE-2007-1717

<5.2.2-1
  • M
CVE-2007-1711

<5.2.0-9
  • M
CVE-2007-1710

*
  • H
CVE-2007-1700

<5.2.0-9
  • M
Deserialization of Untrusted Data

<5.2.0-9
  • H
CVE-2007-1649

<5.2.2-1
  • M
CVE-2007-1582

*
  • H
Arbitrary Code Injection

*
  • M
CVE-2007-1583

<5.2.0-11
  • M
CVE-2007-1522

<5.2.2-1
  • M
CVE-2007-1521

<5.2.0-11
  • M
CVE-2007-1484

<5.2.2-1
  • M
CVE-2007-1454

<5.2.0-11
  • H
CVE-2007-1453

<5.2.0-11
  • H
Access Restriction Bypass

<5.2.2-1
  • M
Access Restriction Bypass

<5.2.2-1
  • H
Out-of-Bounds

*
  • M
CVE-2007-1396

<5.2.2-1
  • C
CVE-2007-1399

<5.2.2-1
  • H
CVE-2007-1376

<5.2.0-11
  • M
CVE-2007-1380

<5.2.0-11
  • M
CVE-2007-1375

<5.2.0-11
  • H
Out-of-Bounds

<5.2.2-1
  • M
CVE-2007-1286

<5.2.0-11
  • M
Out-of-Bounds

<5.2.0-9
  • C
CVE-2007-0910

<5.2.0-9
  • H
CVE-2007-0909

<5.2.0-9
  • H
CVE-2007-0905

<5.2.0-9
  • H
CVE-2007-0911

<5.2.2-1
  • M
Improper Input Validation

<5.2.0-9
  • H
Out-of-Bounds

<5.2.0-9
  • M
CVE-2007-0907

<5.2.0-9
  • M
Improper Input Validation

*
  • H
CVE-2006-5706

<5.2.0-1
  • H
CVE-2006-5465

<5.1.6-6
  • C
Arbitrary Code Injection

<5.1.6-5
  • H
Race Condition

<5.2.0-1
  • M
CVE-2006-4625

<5.2.0-1
  • H
CVE-2006-4481

<5.1.6-1
  • C
CVE-2006-4485

<5.1.6-1
  • H
CVE-2006-4483

<5.1.6-1
  • H
Out-of-Bounds

<5.1.6-1
  • L
Numeric Errors

<5.1.6-1
  • H
CVE-2006-4433

<5.1.4-0.1
  • M
CVE-2006-4023

*
  • M
CVE-2006-4020

<5.1.6-1
  • M
Access Restriction Bypass

<5.1.6-1
  • H
CVE-2006-3016

<5.1.4-0.1
  • H
CVE-2006-3018

<5.1.4-0.1
  • H
CVE-2006-3017

<5.1.4-0.1
  • M
CVE-2006-2660

<5.1.6-1
  • M
CVE-2006-2563

<5.1.6-1
  • M
CVE-2006-1990

<5.1.4-0.1
  • M
Resource Management Errors

<5.1.4-0.1
  • M
Resource Management Errors

<5.1.4-0.1
  • L
CVE-2006-1494

<5.1.4-0.1
  • M
CVE-2006-1608

<5.1.4-0.1
  • M
Cross-site Scripting (XSS)

<5.1.4-0.1
  • M
CVE-2006-1490

<5.1.4-0.1
  • M
CVE-2006-1015

<5.1.4-0.1
  • M
CVE-2006-1014

<5.1.4-0.1
  • M
Directory Traversal

*
  • M
Arbitrary Code Injection

<5.1.2-1
  • L
Cross-site Scripting (XSS)

<5.1.2-1
  • H
Use of Externally-Controlled Format String

<5.1.2-1
  • M
CVE-2005-4154

<5.1.1-1
  • M
CVE-2005-3883

<5.1.1-1
  • M
CVE-2005-3353

<5.1.1-1
  • M
CVE-2005-3388

<5.1.1-1
  • H
CVE-2005-3392

<5.1.1-1
  • M
CVE-2005-3389

<5.1.1-1
  • H
CVE-2005-3390

<5.1.1-1
  • H
CVE-2005-3391

<5.1.1-1
  • M
CVE-2005-3319

<5.1.1-1
  • M
CVE-2005-3054

<5.0.5-2
  • M
CVE-2005-2498

<5.0.5-1
  • M
CVE-2002-1954

<5.1.1-1