dovecot vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://dovecot.org|dovecot package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Allocation of Resources Without Limits or Throttling

[,2.3.21.1)
  • H
Allocation of Resources Without Limits or Throttling

[,2.3.21.1)
  • M
Improper Access Control

[0,)
  • M
Improper Input Validation

[,2.3.10.1)
  • M
Improper Input Validation

[,2.0.16)
  • M
Arbitrary Command Injection

[,2.3.14.1)
  • M
Resource Management Errors

[,1.2.11)
  • H
Out-of-bounds Read

[,2.2.34)
  • H
NULL Pointer Dereference

[,2.3.10.1)
  • H
Out-of-Bounds

[,1.0.4)[1.1.0,1.1.7)
  • M
Improper Authentication

[0,2.2.13)
  • H
CVE-2019-11494

[2.3.3,2.3.6)
  • M
Access Restriction Bypass

[,1.2.13)
  • M
Improper Input Validation

[,2.2.28)
  • M
Directory Traversal

[0.99.13,1.1.5]
  • H
Out-of-Bounds

[,2.2.36.3)[2.3.0,2.3.5.1)
  • M
Access Restriction Bypass

[,1.2.8)
  • M
Directory Traversal

[,2.0.13)
  • H
Buffer Overflow

[,2.3.11.3)
  • H
Access Restriction Bypass

[2.3.3,2.3.6)
  • L
Access Restriction Bypass

[,1.2.15)
  • H
Denial of Service (DoS)

[,2.3.5.2)
  • M
Resource Management Errors

[,2.2.34)
  • H
Improper Input Validation

[,2.3.13)
  • M
Cross-site Scripting (XSS)

[,2.0.13)
  • M
Improper Authentication

[,2.2.7)
  • H
Improper Input Validation

[2.2.26,2.2.29)
  • M
Improper Input Validation

[2.3.9,2.3.9.3)
  • M
Improper Certificate Validation

[,2.2.17)
  • M
Directory Traversal

[2.3.11,2.3.14.1)
  • M
Use After Free

[,2.3.10.1)
  • H
Out-of-bounds Read

[,2.3.11.3)
  • M
Improper Input Validation

[,1.2.17)[2.0.0,2.0.13)
  • M
Information Exposure

[2.2.26,2.3.13)
  • M
Access Restriction Bypass

[,1.2.15)[2.0.0,2.0.5)
  • M
Improper Input Validation

[,2.2.2)
  • M
NULL Pointer Dereference

[,2.3.9.2)
  • H
Out-of-bounds Read

[,2.3.11.3)
  • M
Access Restriction Bypass

[,1.2.0)
  • M
Improper Certificate Validation

[1.1.0,2.2.36.1)[2.3.0,2.3.4.1)
  • H
Denial of Service (DoS)

[2.3.9,2.3.9.3)
  • M
Incorrect Comparison

[,2.3.15)
  • M
Access Restriction Bypass

[,1.2.15)[2.0.0,2.0.5)
  • M
Denial of Service (DoS)

[,1.2.15)
  • H
Improper Authentication

[2.0.0,2.2.33.1)
  • M
Access Restriction Bypass

[,1.2.0)
  • C
Out-of-bounds Write

[,2.2.36.4)[2.3.0,2.3.7.2)