qemu vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
CVE-2023-0330

*
  • M
Integer Overflow or Wraparound

<1:7.2+dfsg-1
  • M
Out-of-bounds Read

<1:7.2+dfsg-1
  • H
Off-by-one Error

*
  • M
Integer Underflow

<1:7.2+dfsg-1
  • H
Out-of-bounds Write

<1:7.1+dfsg-2
  • L
Use of Uninitialized Resource

<1:7.1+dfsg-1
  • M
Use After Free

<1:7.1+dfsg-1
  • H
Race Condition

<1:7.0+dfsg-1
  • H
Integer Overflow or Wraparound

<1:7.0+dfsg-1
  • H
Use After Free

<1:7.1+dfsg-2
  • L
Missing Release of Resource after Effective Lifetime

<1:7.0+dfsg-1
  • H
Missing Release of Resource after Effective Lifetime

<1:7.0+dfsg-1
  • H
Improper Check for Dropped Privileges

<1:7.0+dfsg-1
  • M
NULL Pointer Dereference

<1:6.2+dfsg-2
  • M
NULL Pointer Dereference

<1:6.2+dfsg-1
  • H
Use After Free

<1:7.0+dfsg-1
  • M
Out-of-bounds Read

<1:6.2+dfsg-1
  • M
Off-by-one Error

<1:6.2+dfsg-1
  • H
Use After Free

<1:7.0+dfsg-1
  • H
Use After Free

<1:6.1+dfsg-6
  • M
Resource Exhaustion

*
  • H
Out-of-bounds Write

<1:6.1+dfsg-2
  • H
Release of Invalid Pointer or Reference

<1:6.0+dfsg-3
  • M
Out-of-bounds Write

<1:6.1+dfsg-6
  • M
Out-of-bounds Write

<1:7.0+dfsg-1
  • M
Integer Overflow or Wraparound

<1:5.2+dfsg-11
  • M
Access of Uninitialized Pointer

<1:5.2+dfsg-11
  • M
Out-of-Bounds

<1:5.2+dfsg-11
  • L
Access of Uninitialized Pointer

<1:4.1-2
  • L
Access of Uninitialized Pointer

<1:4.1-2
  • L
Access of Uninitialized Pointer

<1:4.1-2
  • L
Access of Uninitialized Pointer

<1:4.1-2
  • M
Information Exposure

<1:6.1+dfsg-1
  • M
Memory Leak

<1:6.1+dfsg-1
  • H
Out-of-bounds Write

<1:6.1+dfsg-1
  • M
Allocation of Resources Without Limits or Throttling

<1:5.2+dfsg-11
  • M
Out-of-Bounds

<1:7.1+dfsg-1
  • L
Improper Preservation of Permissions

<1:5.2+dfsg-9
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:5.2+dfsg-9
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:5.2+dfsg-9
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-Bounds

<1:5.2+dfsg-10
  • M
Out-of-bounds Read

<1:5.2+dfsg-4
  • L
Use After Free

<1:5.2+dfsg-10
  • H
Use After Free

<1:5.2+dfsg-4
  • L
Integer Overflow or Wraparound

<1:6.2+dfsg-1
  • M
NULL Pointer Dereference

<1:6.2+dfsg-1
  • H
Improper Privilege Management

<1:5.2+dfsg-5
  • L
Out-of-bounds Read

<1:5.2+dfsg-11
  • L
Out-of-bounds Read

<1:4.2-7
  • M
NULL Pointer Dereference

<1:6.0+dfsg-3
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

<1:6.0+dfsg-3
  • M
Use After Free

<1:6.0+dfsg-3
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:7.1+dfsg-1
  • M
Out-of-bounds Write

<1:5.2+dfsg-3
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:5.2+dfsg-1
  • M
Out-of-bounds Read

<1:4.1-2
  • M
Out-of-bounds Read

<1:4.1-2
  • L
Reachable Assertion

<1:5.2+dfsg-1
  • M
Incorrect Calculation

<1:5.2+dfsg-1
  • M
Reachable Assertion

<1:5.2+dfsg-1
  • M
Divide By Zero

<1:5.2+dfsg-1
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:5.2+dfsg-1
  • M
Out-of-bounds Read

<1:5.2+dfsg-1
  • L
Use After Free

<1:5.2+dfsg-1
  • M
Out-of-bounds Write

<1:5.2+dfsg-1
  • M
Out-of-bounds Read

<1:5.1+dfsg-4
  • L
Out-of-Bounds

*
  • M
Out-of-bounds Write

<1:5.2+dfsg-10
  • L
Reachable Assertion

<1:5.1+dfsg-1
  • M
Out-of-bounds Write

<1:5.0-12
  • L
Use After Free

<1:5.2+dfsg-1
  • L
NULL Pointer Dereference

<1:6.0+dfsg-3
  • L
Divide By Zero

<1:5.0-1
  • M
Reachable Assertion

<1:5.0-6
  • M
Out-of-bounds Read

<1:4.1-2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:5.0-6
  • M
Out-of-bounds Read

<1:5.0-6
  • M
Out-of-bounds Write

<1:4.2-1
  • L
NULL Pointer Dereference

<1:5.0-6
  • M
Out-of-Bounds

<1:5.0-6
  • M
Out-of-bounds Read

<1:4.2-1
  • L
Out-of-bounds Write

<1:5.0-6
  • L
Out-of-bounds Read

<1:5.0-6
  • M
Out-of-bounds Read

<1:5.0-8
  • L
Integer Overflow or Wraparound

<1:5.0-12
  • M
Resource Exhaustion

<1:5.0-5
  • L
Integer Overflow or Wraparound

<1:5.0-1
  • M
Use After Free

<1:4.1-2
  • M
Out-of-bounds Write

<1:4.2-4
  • M
CVE-2020-10702

<1:4.2-5
  • M
Buffer Overflow

<1:4.1-1
  • L
Memory Leak

<1:4.2-1
  • M
Buffer Overflow

<1:4.1-2
  • M
Out-of-bounds Write

<1:4.2-2
  • M
Out-of-bounds Write

<1:4.1-2
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • H
Use After Free

<1:4.1-2
  • L
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:4.1-2
  • H
Out-of-bounds Write

<1:4.1-1
  • H
CVE-2019-13164

<1:4.1-1
  • L
OS Command Injection

*
  • L
OS Command Injection

*
  • H
NULL Pointer Dereference

<1:3.1+dfsg-8
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

<1:3.1+dfsg-8
  • C
Out-of-Bounds

<1:3.1+dfsg-7
  • M
Use of Uninitialized Resource

<1:3.1+dfsg-6
  • L
Improper Data Handling

<1:4.1-1
  • M
Out-of-bounds Read

<1:3.1+dfsg-5
  • H
Out-of-bounds Write

<1:3.1+dfsg-3
  • M
Out-of-bounds Read

<1:3.1+dfsg-3
  • L
Unchecked Return Value

<1:4.1-1
  • L
NULL Pointer Dereference

<1:4.1-1
  • L
Missing Release of Resource after Effective Lifetime

<1:4.1-1
  • L
Out-of-bounds Read

<1:4.1-1
  • L
NULL Pointer Dereference

<1:4.1-1
  • L
Missing Release of Resource after Effective Lifetime

<1:4.1-1
  • M
Time-of-check Time-of-use (TOCTOU)

<1:3.1+dfsg-2
  • H
Race Condition

<1:3.1+dfsg-1
  • L
Integer Overflow or Wraparound

<1:3.1+dfsg-2
  • M
Race Condition

<1:3.1+dfsg-1
  • M
Use After Free

<1:3.1+dfsg-1
  • L
Out-of-bounds Read

<1:3.1+dfsg-1
  • H
Out-of-bounds Read

<1:3.1+dfsg-1
  • M
Out-of-bounds Read

<1:3.1+dfsg-1
  • M
Integer Overflow or Wraparound

<1:3.1+dfsg-1
  • H
Integer Overflow or Wraparound

<1:3.1+dfsg-1
  • M
Integer Overflow or Wraparound

<1:3.1+dfsg-1
  • H
Out-of-Bounds

<1:3.1+dfsg-1
  • C
Integer Overflow or Wraparound

<1:3.1+dfsg-1
  • L
CVE-2018-15746

<1:3.1+dfsg-1
  • H
Improper Privilege Management

<1.5.0+dfsg-1
  • H
Stack-based Buffer Overflow

<1:2.8+dfsg-3
  • C
Out-of-bounds Write

<1:2.11+dfsg-1
  • L
Improper Privilege Management

<2.1+dfsg-1
  • C
Out-of-bounds Read

<1:2.8+dfsg-3
  • L
Improper Input Validation

<2.1+dfsg-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.1+dfsg-1
  • H
Improper Input Validation

<2.0.0+dfsg-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.0.0+dfsg-1
  • M
Buffer Overflow

<1:2.4+dfsg-1a
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.4+dfsg-2
  • L
Out-of-Bounds

<2.1+dfsg-1
  • C
Out-of-Bounds

<1:2.8+dfsg-4
  • C
Incorrect Permission Assignment for Critical Resource

<1:2.8+dfsg-5
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.4+dfsg-3
  • M
Out-of-bounds Read

<2.1+dfsg-1
  • H
Resource Exhaustion

<1:2.11+dfsg-1
  • M
Integer Overflow or Wraparound

<2.0.0+dfsg-1
  • L
Out-of-bounds Read

<1:2.8+dfsg-3
  • L
Integer Overflow or Wraparound

<1:3.1+dfsg-1
  • H
Out-of-bounds Write

<1:3.1+dfsg-1
  • H
Link Following

<1:2.8+dfsg-3
  • M
Out-of-bounds Read

<1:2.12~rc3+dfsg-1
  • H
Out-of-bounds Read

<1:2.12~rc3+dfsg-1
  • M
Integer Overflow or Wraparound

<1:2.10.0+dfsg-2
  • M
Out-of-bounds Read

<1:2.8+dfsg-4
  • M
Out-of-bounds Read

<1:2.12~rc3+dfsg-1
  • M
Use After Free

<2.1+dfsg-1
  • H
Improper Input Validation

<1:2.12~rc3+dfsg-1
  • M
Information Exposure

<1:2.12~rc3+dfsg-1
  • M
Divide By Zero

<1:2.11+dfsg-1
  • C
Improper Input Validation

<1:2.12~rc3+dfsg-1
  • M
NULL Pointer Dereference

<1:2.5+dfsg-1
  • H
Out-of-bounds Write

<1:2.5+dfsg-1
  • M
Out-of-bounds Write

<1:2.11+dfsg-1
  • H
Missing Release of Resource after Effective Lifetime

<1:2.11+dfsg-1
  • M
Race Condition

<1:2.10.0+dfsg-2
  • H
Integer Overflow or Wraparound

<1:2.10.0-1
  • L
Out-of-bounds Read

<1:2.10.0-1
  • H
Use After Free

<1:2.10.0-1
  • M
Reachable Assertion

<1:2.10.0+dfsg-2
  • C
Out-of-Bounds

<1:2.8+dfsg-5
  • M
NULL Pointer Dereference

<1:2.10.0-1
  • H
Out-of-Bounds

<2.0.0+dfsg-1
  • H
Integer Overflow or Wraparound

<2.0.0+dfsg-1
  • M
Divide By Zero

<2.0.0+dfsg-1
  • M
NULL Pointer Dereference

<2.0.0+dfsg-1
  • M
Out-of-bounds Write

<1:2.8+dfsg-7
  • M
Out-of-bounds Read

<1:2.8+dfsg-7
  • H
CVE-2017-10664

<1:2.8+dfsg-7
  • M
Out-of-bounds Read

<1:2.8+dfsg-7
  • H
Out-of-Bounds

<1:2.8+dfsg-4
  • H
Improper Input Validation

<1:2.8+dfsg-7
  • M
Information Exposure

<1:2.8+dfsg-7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.10.0-1
  • L
NULL Pointer Dereference

<1:2.10.0-1
  • M
Memory Leak

<1:2.8+dfsg-7
  • M
Memory Leak

<1:2.8+dfsg-7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.8+dfsg-7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.8+dfsg-7
  • L
Memory Leak

<1:2.10.0-1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-5
  • H
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-5
  • H
Incorrect Permission Assignment for Critical Resource

<1:2.8+dfsg-6
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-5
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.8+dfsg-5
  • L
Arbitrary Code Injection

<1:2.10.0-1
  • M
Out-of-bounds Read

<1:2.8+dfsg-4
  • M
Resource Management Errors

<1:2.5+dfsg-1
  • H
Memory Leak

<1:2.5+dfsg-3
  • H
Out-of-bounds Write

<1:2.5+dfsg-5
  • M
Missing Release of Resource after Effective Lifetime

<1:2.5+dfsg-3
  • H
Out-of-bounds Write

<1:2.5+dfsg-1
  • M
Out-of-bounds Write

<1:2.5+dfsg-3
  • M
Divide By Zero

<1:2.5+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.8+dfsg-3
  • M
Divide By Zero

<1:2.8+dfsg-1
  • H
Integer Overflow or Wraparound

<1:2.8+dfsg-3
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.8+dfsg-3
  • H
Buffer Overflow

<1:2.8+dfsg-3
  • M
Memory Leak

<1:2.8+dfsg-3
  • L
Memory Leak

<1:2.8+dfsg-3
  • M
Out-of-bounds Read

<1:2.8+dfsg-3
  • M
Integer Overflow or Wraparound

<1:2.8+dfsg-3
  • L
Memory Leak

<1:2.10.0-1
  • L
Memory Leak

<1:2.8+dfsg-2
  • L
Memory Leak

<1:2.10.0-1
  • M
Memory Leak

<1:2.8+dfsg-2
  • M
Memory Leak

<1:2.8+dfsg-3
  • M
Memory Leak

<1:2.8+dfsg-2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.8+dfsg-4
  • L
Out-of-bounds Read

<1:2.10.0-1
  • M
Out-of-bounds Read

<1:2.7+dfsg-1
  • M
NULL Pointer Dereference

<1:2.5+dfsg-4
  • M
NULL Pointer Dereference

<1:2.6+dfsg-1
  • M
NULL Pointer Dereference

<1:2.6+dfsg-1
  • M
Memory Leak

<1:2.8+dfsg-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.5+dfsg-5
  • M
Memory Leak

<1:2.8+dfsg-1
  • M
CVE-2015-8818

<1:2.4+dfsg-1a
  • M
Memory Leak

<1:2.8+dfsg-1
  • M
Off-by-one Error

<1:2.5+dfsg-3
  • M
Out-of-bounds Read

<1:2.4+dfsg-1a
  • M
Information Exposure

<1:2.8+dfsg-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.8+dfsg-1
  • M
Reachable Assertion

<1:2.5+dfsg-1
  • M
Out-of-Bounds

<1:2.8+dfsg-1
  • M
Memory Leak

<1:2.8+dfsg-1
  • M
Improper Input Validation

<1:2.5+dfsg-1
  • H
Out-of-bounds Read

<1:2.5+dfsg-2
  • M
Divide By Zero

<1:2.8+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-1
  • M
Use After Free

<1:2.8+dfsg-1
  • L
Information Exposure

<1:2.8+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-1
  • M
Excessive Iteration

<1:2.7+dfsg-1
  • M
Integer Overflow or Wraparound

<1:2.6+dfsg-3.1
  • M
Incorrect Type Conversion or Cast

<1:2.6+dfsg-3.1
  • M
Use After Free

<1:2.6+dfsg-3.1
  • M
Buffer Overflow

<1:2.6+dfsg-3.1
  • M
CVE-2016-4964

<1:2.6+dfsg-2
  • M
CVE-2016-7157

<1:2.6+dfsg-3.1
  • M
CVE-2016-6835

<1:2.6+dfsg-3.1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-1
  • M
Buffer Overflow

<1:2.7+dfsg-1
  • M
Improper Validation of Array Index

<1:2.8+dfsg-1
  • M
Directory Traversal

<1:2.6+dfsg-3.1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.7+dfsg-1
  • M
Buffer Overflow

<1:2.6+dfsg-3.1
  • M
Improper Initialization

<1:2.6+dfsg-3.1
  • M
CVE-2016-7155

<1:2.6+dfsg-3.1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-1
  • M
Information Exposure

<1:2.8+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-1
  • M
Integer Overflow or Wraparound

<1:2.8+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-1
  • M
Allocation of Resources Without Limits or Throttling

<1:2.8+dfsg-1
  • M
CVE-2016-8578

<1:2.8+dfsg-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.8+dfsg-1
  • M
Buffer Overflow

<1:2.8+dfsg-1
  • M
Divide By Zero

<1:2.8+dfsg-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.8+dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<1:2.8+dfsg-1
  • M
Divide By Zero

<1:2.8+dfsg-4
  • M
CVE-2016-7423

<1:2.7+dfsg-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.8+dfsg-1
  • M
Improper Input Validation

<1:2.8+dfsg-3
  • C
Out-of-bounds Write

<1:2.7+dfsg-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.8+dfsg-1
  • M
CVE-2016-6351

<1:2.6+dfsg-3.1
  • M
Out-of-bounds Write

<1:2.6+dfsg-2
  • M
Out-of-bounds Write

<1:2.6+dfsg-2
  • M
Out-of-bounds Read

<1:2.6+dfsg-2
  • M
Use of Uninitialized Resource

<1:2.6+dfsg-2
  • M
Resource Exhaustion

<1:2.6+dfsg-3.1
  • M
Improper Input Validation

<1:2.6+dfsg-1
  • M
NULL Pointer Dereference

<1:2.6+dfsg-1
  • M
CVE-2016-2392

<1:2.6+dfsg-1
  • H
Numeric Errors

<1:2.6+dfsg-1
  • M
CVE-2016-5337

<1:2.6+dfsg-2
  • M
Out-of-bounds Write

<1:2.6+dfsg-3
  • H
CVE-2016-5338

<1:2.6+dfsg-2
  • M
Out-of-Bounds

<1:2.6+dfsg-3
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.6+dfsg-3
  • H
Out-of-bounds Write

<1:2.6+dfsg-2
  • M
CVE-2016-4020

<1:2.6+dfsg-2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.5+dfsg-2
  • M
Resource Exhaustion

<1:2.6+dfsg-1
  • H
Buffer Overflow

<1:2.6+dfsg-1
  • M
Out-of-Bounds

<1:2.6+dfsg-2
  • M
Out-of-Bounds

<1:2.6+dfsg-2
  • H
Out-of-Bounds

<1:2.6+dfsg-1
  • M
Integer Overflow or Wraparound

<1:2.6+dfsg-1
  • C
Buffer Overflow

<1:2.6+dfsg-2
  • H
Improper Access Control

<1:2.5+dfsg-2
  • H
Out-of-Bounds

<1:2.6+dfsg-1
  • H
Use After Free

<1:2.5+dfsg-2
  • M
Out-of-bounds Write

<1:2.4+dfsg-1a
  • M
Insufficient Entropy

<1:2.6+dfsg-1
  • H
Out-of-Bounds

<1:2.5+dfsg-4
  • H
Resource Exhaustion

<1:2.3+dfsg-1
  • C
Buffer Overflow

<1:2.5+dfsg-1
  • M
Out-of-Bounds

<1:2.4+dfsg-4
  • H
Out-of-Bounds

<1:2.4+dfsg-1a
  • H
Divide By Zero

<1:2.4+dfsg-2
  • H
Out-of-Bounds

<1:2.4+dfsg-3
  • H
Out-of-Bounds

<1:2.4+dfsg-1a
  • L
Code

<1:2.3+dfsg-5
  • H
Information Exposure

<1:2.4+dfsg-1a
  • H
Access Restriction Bypass

<1:2.4+dfsg-1a
  • H
Out-of-Bounds

<1:2.4+dfsg-1a
  • H
Out-of-bounds Write

<1:2.3+dfsg-6
  • M
Incorrect Authorization

<1:2.3+dfsg-5
  • M
Access Restriction Bypass

<1:2.3+dfsg-5
  • M
Resource Management Errors

<1:2.3+dfsg-5
  • H
Access Restriction Bypass

<1:2.3+dfsg-5
  • H
Out-of-Bounds

<1:2.3+dfsg-3
  • L
Resource Management Errors

<1:2.3+dfsg-1
  • M
Access Restriction Bypass

<1:2.3+dfsg-3
  • L
Improper Input Validation

<2.1+dfsg-8
  • M
Out-of-Bounds

<2.1+dfsg-9
  • M
Off-by-one Error

<2.1+dfsg-5
  • H
Improper Privilege Management

<2.1+dfsg-6
  • M
Improper Input Validation

<2.1+dfsg-7
  • M
NULL Pointer Dereference

<2.1+dfsg-5
  • L
Arbitrary Code Injection

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • M
Out-of-Bounds

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Numeric Errors

<2.1+dfsg-1
  • H
Numeric Errors

<2.0.0+dfsg-6
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Arbitrary Code Injection

<2.1+dfsg-1
  • H
Out-of-Bounds

<2.1+dfsg-1
  • M
Numeric Errors

<2.0.0+dfsg-6
  • L
Arbitrary Code Injection

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • L
Out-of-Bounds

<2.1+dfsg-1
  • M
Information Exposure

<2.1+dfsg-5
  • M
Out-of-Bounds

<2.1+dfsg-1
  • M
Improper Input Validation

<2.0.0+dfsg-1
  • H
Numeric Errors

<2.0.0+dfsg-1
  • M
Numeric Errors

<1.7.0+dfsg-8
  • H
Out-of-Bounds

<0.15.1+dfsg-2
  • L
Resource Management Errors

<1.7.0+dfsg-1
  • L
Resource Management Errors

<1.7.0+dfsg-4
  • L
Buffer Overflow

<1.6.0+dfsg-2
  • L
Access Restriction Bypass

<1.5.0+dfsg-1
  • H
Buffer Overflow

<1.1.2+dfsg-4
  • H
Improper Input Validation

<1.1.2+dfsg-1
  • M
CVE-2012-2652

<1.1.0+dfsg-1
  • M
Resource Management Errors

<0.11.0-1
  • L
Out-of-Bounds

<0.9.1+svn20081101-1
  • L
Numeric Errors

<0.9.1-10
  • M
Resource Management Errors

<0.9.1-9
  • L
Link Following

<0.9.1-6
  • L
CVE-2008-1945

<0.9.1-5
  • M
Information Exposure

<0.9.1-5
  • L
Access Restriction Bypass

<0.9.1+svn20081207-1
  • H
Out-of-bounds Write

<0.9.0-2
  • H
Out-of-Bounds

<0.9.0-2
  • H
CVE-2007-1321

<0.9.0-2
  • H
Out-of-bounds Write

<0.9.0-2
  • M
CVE-2007-1366

<0.9.0-2
  • M
CVE-2007-1322

<0.9.0-2