Direct Vulnerabilities

Known vulnerabilities in the https://dovecot.org|dovecot package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Directory Traversal

[,2.4.0)
  • M
LDAP Injection

[,2.4.3)
  • C
SQL Injection

[,2.4.3)
  • H
Replay Attack

[,2.4.3)
  • M
Allocation of Resources Without Limits or Throttling

[,2.4.3)
  • M
Allocation of Resources Without Limits or Throttling

[,2.4.3)
  • C
Timing Attack

[,2.4.3)
  • M
XML External Entity (XXE) Injection

[,2.4.3)
  • M
Improper Validation of Syntactic Correctness of Input

[,2.4.3)
  • H
Allocation of Resources Without Limits or Throttling

[,2.3.21.1)
  • H
Allocation of Resources Without Limits or Throttling

[,2.3.21.1)
  • M
Improper Access Control

[0,2.4.0)
  • M
Improper Input Validation

[,2.3.10.1)
  • M
Improper Input Validation

[,2.0.16)
  • M
Arbitrary Command Injection

[,2.3.14.1)
  • M
Resource Management Errors

[,1.2.11)
  • H
Out-of-bounds Read

[,2.2.34)
  • H
NULL Pointer Dereference

[,2.3.10.1)
  • H
Out-of-Bounds

[,1.0.4)[1.1.0,1.1.7)
  • M
Improper Authentication

[0,2.2.13)
  • H
CVE-2019-11494

[2.3.3,2.3.6)
  • M
Access Restriction Bypass

[,1.2.13)
  • M
Improper Input Validation

[,2.2.28)
  • M
Directory Traversal

[0.99.13,1.1.5]
  • H
Out-of-Bounds

[,2.2.36.3)[2.3.0,2.3.5.1)
  • M
Access Restriction Bypass

[,1.2.8)
  • M
Directory Traversal

[,2.0.13)
  • H
Buffer Overflow

[,2.3.11.3)
  • H
Access Restriction Bypass

[2.3.3,2.3.6)
  • L
Access Restriction Bypass

[,1.2.15)
  • H
Denial of Service (DoS)

[,2.3.5.2)
  • M
Resource Management Errors

[,2.2.34)
  • H
Improper Input Validation

[,2.3.13)
  • M
Cross-site Scripting (XSS)

[,2.0.13)
  • M
Improper Authentication

[,2.2.7)
  • H
Improper Input Validation

[2.2.26,2.2.29)
  • M
Improper Input Validation

[2.3.9,2.3.9.3)
  • M
Improper Certificate Validation

[,2.2.17)
  • M
Directory Traversal

[2.3.11,2.3.14.1)
  • M
Use After Free

[,2.3.10.1)
  • H
Out-of-bounds Read

[,2.3.11.3)
  • M
Improper Input Validation

[,1.2.17)[2.0.0,2.0.13)
  • M
Information Exposure

[2.2.26,2.3.13)
  • M
Access Restriction Bypass

[,1.2.15)[2.0.0,2.0.5)
  • M
Improper Input Validation

[,2.2.2)
  • M
NULL Pointer Dereference

[,2.3.9.2)
  • H
Out-of-bounds Read

[,2.3.11.3)
  • M
Access Restriction Bypass

[,1.2.0)
  • M
Improper Certificate Validation

[1.1.0,2.2.36.1)[2.3.0,2.3.4.1)
  • H
Denial of Service (DoS)

[2.3.9,2.3.9.3)
  • M
Incorrect Comparison

[,2.3.15)
  • M
Access Restriction Bypass

[,1.2.15)[2.0.0,2.0.5)
  • M
Denial of Service (DoS)

[,1.2.15)
  • H
Improper Authentication

[2.0.0,2.2.33.1)
  • M
Access Restriction Bypass

[,1.2.0)
  • C
Out-of-bounds Write

[,2.2.36.4)[2.3.0,2.3.7.2)