seamonkey vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://ftp.mozilla.org|seamonkey package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Access Restriction Bypass

[,1.1.19)
  • M
Cross-site Scripting (XSS)

[0,)
  • M
Information Exposure

[,1.1.12)
  • H
Out-of-Bounds

[,2.13)
  • H
Improper Input Validation

[,2.0.11)
  • M
Improper Input Validation

[,2.31)
  • M
Cross-site Scripting (XSS)

[,2.0.7)
  • M
Improper Certificate Validation

[,2.16)
  • M
Cross-site Scripting (XSS)

[,2.9.1)
  • L
Access Restriction Bypass

[,2.4)
  • H
Denial of Service (DoS)

[,1.0.1)
  • H
Integer Overflow or Wraparound

[,2.15)
  • M
Cross-site Scripting (XSS)

[,2.9.1)
  • C
Out-of-Bounds

[,2.12)
  • H
Use After Free

[,2.14)
  • M
Cross-site Scripting (XSS)

[,2.21)
  • H
Improper Authentication

[1.0,1.1.13)
  • C
Denial of Service (DoS)

[,1.1.12)
  • C
Out-of-bounds Read

[,2.15)
  • M
Cross-site Scripting (XSS)

[,2.7.1)
  • H
Denial of Service (DoS)

[,2.0.7)
  • M
Information Exposure

[,2.0.14)
  • H
Resource Management Errors

[,2.0.7)
  • H
Use After Free

[,2.15)
  • C
Use After Free

[,2.12)
  • C
Resource Management Errors

[,1.1.14)
  • H
Resource Management Errors

[,2.0.1)
  • H
Denial of Service (DoS)

[,1.0.3)
  • C
Remote Code Execution (RCE)

[,2.23)
  • M
Resource Management Errors

[1.0,1.1.14)
  • C
Out-of-bounds Write

[,2.24)
  • H
Use After Free

[,2.15)
  • C
Denial of Service (DoS)

[,2.22.1)
  • M
Out-of-Bounds

[,2.22.1)
  • M
Cross-site Scripting (XSS)

[,1.1.8)
  • H
Out-of-bounds Write

[,2.15)
  • C
Denial of Service (DoS)

[1.0,1.1.13)
  • H
CVE-2006-1727

[,1.0.1)
  • H
Out-of-Bounds

[,2.21)
  • M
Improper Input Validation

[,2.10.1)
  • M
Access Restriction Bypass

[,2.0.14)
  • H
Denial of Service (DoS)

[,2.22.1)
  • M
Out-of-Bounds

[,2.21)
  • M
Denial of Service (DoS)

[,2.0.0.19)[3.0.0,3.0.5)
  • H
Denial of Service (DoS)

[,2.0.7)
  • C
Denial of Service (DoS)

[,2.4)
  • H
CVE-2013-0797

[,2.17.1)
  • C
Denial of Service (DoS)

[,2.17.1)
  • C
Denial of Service (DoS)

[,2.6)
  • M
Out-of-Bounds

[,2.0.14)
  • C
Use After Free

[,2.14)
  • H
Arbitrary Code Execution

[,2.12)
  • C
Resource Management Errors

[,2.0.14)
  • L
CVE-2008-5503

[,1.1.14)
  • C
Resource Management Errors

[,2.35)
  • C
Resource Management Errors

[1.0,1.1.13)
  • M
Cross-site Scripting (XSS)

[,2.14)
  • H
Denial of Service (DoS)

[,2.0.5)
  • M
Access Restriction Bypass

[,2.7.1)
  • H
Out-of-bounds Read

[,2.26)
  • H
Access Restriction Bypass

[,2.35)
  • H
Out-of-Bounds

[,2.10.1)
  • H
Denial of Service (DoS)

[,1.0.1)
  • H
Resource Management Errors

[,2.0.4)
  • M
Cross-site Scripting (XSS)

[,1.0.3)
  • H
Denial of Service (DoS)

[,2.16)
  • H
Resource Management Errors

[1.0,1.1.13)
  • H
Denial of Service (DoS)

[,1.1.7)
  • M
Resource Management Errors

[,1.1.9)
  • M
Information Exposure

[,2.7.1)
  • M
Access Restriction Bypass

[,2.12)
  • C
Arbitrary Code Execution

[,2.22.1)
  • H
Denial of Service (DoS)

[,2.26)
  • C
Denial of Service (DoS)

[,2.24)
  • H
Denial of Service (DoS)

[,2.0.6)
  • C
Use After Free

[,2.25)
  • H
CVE-2012-1943

[,2.9]
  • C
Use After Free

[,2.12)
  • M
Information Exposure

[,1.0.8)
  • M
Cross-site Scripting (XSS)

[,2.12)
  • H
Improper Input Validation

[,2.15)
  • C
Use After Free

[,2.23)
  • M
Improper Input Validation

[,2.0.12)
  • M
Information Exposure

[,2.23)
  • H
Remote Code Execution (RCE)

[,2.4)
  • C
Out-of-Bounds

[,2.21)
  • M
Improper Input Validation

[,2.31)
  • M
Access Restriction Bypass

[,2.8)
  • C
Out-of-bounds Write

[,2.23)
  • M
Cross-site Scripting (XSS)

[,3.0.9)
  • C
Out-of-Bounds

[,2.21)
  • H
Out-of-Bounds

[,2.9.1)
  • M
Remote Code Execution (RCE)

[,1.1.9)
  • C
Resource Management Errors

[1.0,1.1.14)
  • H
Privilege Escalation

[,2.13.1)
  • H
Out-of-bounds Write

[,2.24)
  • H
Resource Management Errors

[,2.9.1)
  • H
Denial of Service (DoS)

[,1.1.17)
  • M
Remote Code Execution (RCE)

[1.0,1.0.8)[1.1,1.1.1)
  • C
Out-of-Bounds

[,2.13)
  • H
Resource Management Errors

[,2.0.5)
  • H
Resource Management Errors

[,2.0.11)
  • C
Use After Free

[,2.23)
  • H
Out-of-bounds Write

[,2.15)
  • C
Out-of-Bounds

[2.0,2.2]
  • H
Access Restriction Bypass

[,2.16)
  • H
Resource Management Errors

[,2.8)
  • M
Denial of Service (DoS)

[0,1.0.6-0.6.2.fc6)
  • C
Denial of Service (DoS)

[,2.0.12)
  • C
Resource Management Errors

[,2.10.1)
  • M
Authentication Bypass

[,2.0.1)
  • M
Cross-site Scripting (XSS)

[,2.23)
  • M
Cross-site Scripting (XSS)

[,2.14)
  • H
Resource Management Errors

[,1.1.8)
  • H
Denial of Service (DoS)

[,2.35)
  • M
Information Exposure

[,2.10.1)
  • M
Out-of-Bounds

[,2.22.1)
  • M
Authentication Bypass

[,2.25)
  • C
Use After Free

[,2.12)
  • H
Remote Code Execution (RCE)

[,2.0.4)
  • M
Improper Verification of Cryptographic Signature

[,2.25)
  • H
Denial of Service (DoS)

[,2.15)
  • H
Access Restriction Bypass

[,2.24)
  • C
Arbitrary Code Execution

[,2.10.1)
  • M
Cross-site Scripting (XSS)

[,2.0.11)
  • C
Out-of-Bounds

[,2.25)
  • H
Denial of Service (DoS)

[,2.0.6)
  • C
Denial of Service (DoS)

[,2.0.14)
  • C
Access Restriction Bypass

[,2.17.1)
  • H
Use After Free

[,2.13)
  • M
Cross-site Scripting (XSS)

[1.0,1.1.14)
  • C
Out-of-Bounds

[,2.0.12)
  • H
Directory Traversal

[,1.1.12)
  • M
Authentication Bypass

[0,firefox-1.5.0.12-4.fc6)
  • M
Access Restriction Bypass

[,2.2)
  • M
Information Exposure

[,1.1.13)
  • H
Out-of-bounds Write

[,2.14)
  • H
Integer Overflow or Wraparound

[,2.23)
  • H
Remote Code Execution (RCE)

[,1.0.7)
  • M
Out-of-Bounds

[,2.21)
  • H
Use After Free

[,2.26)
  • H
Out-of-bounds Write

[,2.12)
  • H
Use After Free

[,2.16)
  • H
Resource Management Errors

[,2.10.1)
  • M
Improper Input Validation

[,2.0.4)
  • C
Out-of-Bounds

[,2.12)
  • M
Arbitrary Code Execution

[,1.0.3)
  • M
User Impersonation

[,2.13.1)
  • C
Out-of-Bounds

[2.0,2.2]
  • H
Access Restriction Bypass

[0,)
  • M
Denial of Service (DoS)

[,1.0.3)
  • M
Cross-site Scripting (XSS)

[,2.14)
  • M
Arbitrary Code Execution

[,2.31)
  • M
Insecure Encryption

[,2.22.1)
  • M
Denial of Service (DoS)

[,1.0.8)
  • H
Denial of Service (DoS)

[,2.0.1)
  • H
Use After Free

[,2.16)
  • H
Improper Input Validation

[,2.8)
  • M
Cross-site Request Forgery (CSRF)

[,2.35)
  • H
Information Exposure

[,1.0.3)[1.5.0.0,1.5.0.5)[1.5.0.0,1.5.0.5)
  • M
Cross-site Scripting (XSS)

[,1.0.8)
  • M
Cross-site Scripting (XSS)

[0,)
  • C
Use After Free

[,2.12)
  • M
Cross-site Scripting (XSS)

[,2.0.3)
  • H
Resource Management Errors

[,1.1.8)
  • H
Access Restriction Bypass

[,2.0.14)
  • C
Use After Free

[,2.23)
  • H
Denial of Service (DoS)

[,1.0.8)
  • M
Resource Management Errors

[0,)
  • M
Information Exposure

[,2.0.5)
  • M
Cross-site Scripting (XSS)

[0,)
  • H
Out-of-Bounds

[,1.0.8)
  • C
Use After Free

[,2.26)
  • M
Cross-site Scripting (XSS)

[,1.1.5)
  • H
Denial of Service (DoS)

[,2.7)
  • L
Access Restriction Bypass

[,2.25)
  • C
Denial of Service (DoS)

[,2.4)
  • M
CVE-2013-0774

[,2.16)
  • M
Cross-site Scripting (XSS)

[,2.21)
  • H
Arbitrary Code Execution

[,1.0.1)
  • C
Out-of-Bounds

[,2.0.12)
  • C
Denial of Service (DoS)

[,2.0.14)
  • C
Resource Management Errors

[,3.0.12)
  • M
Access Restriction Bypass

[,2.0.3)
  • M
Access Restriction Bypass

[,2.21)
  • M
Improper Authentication

[,2.15)
  • M
Access Restriction Bypass

[,2.7.1)
  • M
Access Restriction Bypass

[,2.21)
  • C
Privilege Escalation

[,2.25)
  • L
Access Restriction Bypass

[,2.9.1)
  • C
Resource Management Errors

[,1.1.15)
  • H
Denial of Service (DoS)

[,2.35)
  • H
Access Restriction Bypass

[,2.7.1)
  • H
Resource Management Errors

[,2.0.4)
  • H
Out-of-Bounds

[,2.0.7)
  • M
Denial of Service (DoS)

[,1.0.1)
  • H
Resource Management Errors

[,2.6)
  • H
Resource Management Errors

[,2.6)
  • M
Cross-site Scripting (XSS)

[,1.1.10)
  • H
Use After Free

[,2.14)
  • H
Denial of Service (DoS)

[,2.0.6)
  • M
Cross-site Scripting (XSS)

[,2.13)
  • M
Cross-site Scripting (XSS)

[,2.10.1)
  • C
Resource Management Errors

[,1.1.10)
  • M
Symlink Attack

[,1.1.9)
  • C
Resource Management Errors

[,2.10.1)
  • H
Remote Code Execution (RCE)

[,2.0.1)
  • C
Denial of Service (DoS)

[,2.7.1)
  • M
Information Exposure

[,2.4.1)
  • M
Improper Access Control

[,2.31)
  • M
Authentication Bypass

[,1.1.15)
  • H
Remote Code Execution (RCE)

[,2.14)
  • H
Resource Management Errors

[,2.7.1)
  • M
Out-of-Bounds

[,2.21)
  • H
Buffer Overflow

[,2.15)
  • H
Improper Input Validation

[,1.1.10)
  • C
Denial of Service (DoS)

[,2.0.14)
  • H
CVE-2010-3182

[,2.0.9)
  • M
Improper Input Validation

[,1.1.17)
  • H
Denial of Service (DoS)

[,2.0.9)
  • H
Remote Code Execution (RCE)

[,1.1.17)
  • M
Information Exposure

[,1.1.5)
  • H
Resource Management Errors

[,1.1.15)
  • H
Out-of-Bounds

[0,firefox-1.5.0.12-4.fc6)
  • M
Race Condition

[,2.2)
  • C
Remote Code Execution (RCE)

[2.0,2.9]
  • H
Out-of-Bounds

[,2.13)
  • H
Access Restriction Bypass

[,2.24)
  • M
Directory Traversal

[,1.1.8)
  • M
Access Restriction Bypass

[,2.0.1)
  • L
Authentication Bypass

[,1.0.1)
  • M
Access Restriction Bypass

[,1.1.10)
  • M
Cross-site Scripting (XSS)

[,2.26)
  • H
Information Exposure

[,2.25)
  • M
Improper Input Validation

[,1.1.5)
  • M
Information Exposure

[,2.0.6)
  • H
CVE-2007-3845

[,1.1.4)
  • H
Cryptographic Issues

[,2.0.9)
  • C
Use After Free

[,2.12)
  • M
Denial of Service (DoS)

[,2.31)
  • C
Resource Management Errors

[,2.0.12)
  • C
Out-of-Bounds

[,1.1.12)
  • C
Resource Management Errors

[,2.0.14)
  • M
Cross-site Scripting (XSS)

[,2.14)
  • H
Arbitrary Code Execution

[,2.0)
  • M
Resource Management Errors

[,1.1.14)
  • M
Cross-site Scripting (XSS)

[1.0,1.1.14)
  • M
Arbitrary Code Injection

[,2.13.2)
  • M
Insufficiently Protected Credentials

[1.0,2.1]
  • H
Resource Management Errors

[,2.16.1)
  • M
Improper Input Validation

[,3.0.9)
  • M
Arbitrary Code Execution

[,2.0.11)
  • H
Out-of-Bounds

[,2.0.7)
  • M
Cross-site Scripting (XSS)

[,1.1.16)
  • H
Improper Input Validation

[1.0,1.1.13)
  • H
Cross-site Scripting (XSS)

[,1.0.3)
  • C
Denial of Service (DoS)

[,2.0.4)
  • H
Use After Free

[,2.16)
  • H
Resource Management Errors

[,2.8)
  • M
Access Restriction Bypass

[,2.0.6)
  • M
Access Restriction Bypass

[1.0,1.1.14)
  • M
Privilege Escalation

[,2.26)
  • H
Denial of Service (DoS)

[,1.0.1)
  • M
Remote Code Execution (RCE)

[,2.4)
  • H
Out-of-Bounds

[,2.7)
  • M
Improper Input Validation

[0,firefox-1.5.0.12-4.fc6)
  • M
Denial of Service (DoS)

[,2.9.1)
  • M
Authentication Bypass

[,2.0.1)
  • M
Out-of-bounds Write

[,2.26)
  • H
Access Restriction Bypass

[,1.1.12)
  • M
Information Management Errors

[,2.31)
  • H
Arbitrary Code Execution

[,1.0.3)
  • M
Improper Input Validation

[,2.22.1)
  • M
Improper Input Validation

[,1.0.1)
  • H
Information Exposure

[,1.1.8)
  • H
Resource Management Errors

[,2.0.14)
  • M
Denial of Service (DoS)

[,1.0.7)
  • M
Access Restriction Bypass

[,2.21)
  • M
Improper Input Validation

[,2.13)
  • C
Out-of-Bounds

[,2.9.1)
  • H
Out-of-bounds Read

[,2.16)
  • C
Resource Management Errors

[,2.0.3)
  • C
Resource Management Errors

[,2.10.1)
  • C
Use After Free

[,2.12)
  • M
Denial of Service (DoS)

[,2.21)
  • M
Race Condition

[,2.35)
  • C
Out-of-Bounds

[,2.9.1)
  • H
Out-of-Bounds

[,2.22.1)
  • H
Use After Free

[,2.15)
  • M
Information Exposure

[,2.8)
  • H
Denial of Service (DoS)

[,2.0.9)
  • H
Denial of Service (DoS)

[,2.0.11)
  • M
Code

[,2.35)
  • M
Access Restriction Bypass

[,2.15.1)
  • H
Out-of-bounds Write

[,2.14)
  • M
Information Exposure

[0,)
  • H
Resource Management Errors

[,2.21)
  • C
Denial of Service (DoS)

[,2.0.3)
  • C
Use After Free

[,2.24)
  • M
Cross-site Scripting (XSS)

[,2.20)
  • C
Denial of Service (DoS)

[,2.0.14)
  • M
Access Restriction Bypass

[1.0,1.1.14)
  • M
Cross-site Scripting (XSS)

[,1.1.7)
  • L
Access Restriction Bypass

[,2.0.6)
  • M
Cross-site Scripting (XSS)

[,1.1.7)
  • C
Out-of-Bounds

[2.0,2.2]
  • C
Denial of Service (DoS)

[,2.0.14)
  • M
Authentication Bypass

[,2.17.1)
  • M
Improper Input Validation

[,1.1.10)
  • M
Cryptographic Issues

[,2.35)
  • H
Denial of Service (DoS)

[,2.0.1)
  • M
Cross-site Scripting (XSS)

[,2.0.3)
  • H
Resource Management Errors

[,2.21)
  • M
Out-of-Bounds

[,1.0.2)
  • M
Information Exposure

[,2.12)
  • C
Use After Free

[,2.12)
  • H
Resource Management Errors

[,1.1.8)
  • M
Security Features

[,1.0.7)
  • H
Out-of-Bounds

[,2.15)
  • C
Resource Management Errors

[1.0,1.1.14)
  • H
Access Restriction Bypass

[,1.1.12)
  • C
Use After Free

[,2.12)
  • C
Out-of-Bounds

[,2.4)
  • M
CVE-2008-1240

[,1.1.9)
  • M
Access Restriction Bypass

[,2.10.1)
  • H
Denial of Service (DoS)

[,1.0.8)
  • M
Information Exposure

[,1.1.17)
  • M
Denial of Service (DoS)

[,1.1]
  • H
Use After Free

[,2.14)
  • H
Denial of Service (DoS)

[,2.25)
  • M
Resource Management Errors

[,1.1.9)
  • M
Denial of Service (DoS)

[,1.0.8)[1.5.0.0,1.5.0.10)[1.5.0.0,1.5.0.10)[2.0.0.0,2.0.0.2)
  • M
Information Exposure

[,2.15)
  • M
Improper Authentication

[,1.1.17)
  • C
Use After Free

[,2.12)
  • H
Buffer Overflow

[,2.25)
  • H
Use After Free

[,2.13)
  • H
Arbitrary Code Execution

[,1.0.6)[1.5.0.0,1.5.0.8)[1.5.0.0,1.5.0.8)
  • M
User Impersonation

[,2.25)
  • H
Out-of-Bounds

[,2.14)
  • H
Out-of-Bounds

[,1.0.8)
  • H
Remote Code Execution (RCE)

[,1.1.17)
  • H
Improper Input Validation

[,2.0.12)
  • L
CVE-2006-4570

[,1.0.5)
  • H
Access Restriction Bypass

[,1.1.12)
  • C
Out-of-Bounds

[2.0,2.1]
  • C
Resource Management Errors

[,2.12)
  • M
Information Exposure

[0,)
  • C
Out-of-Bounds

[1.0,2.1]
  • H
Access Restriction Bypass

[,2.13)
  • H
Out-of-Bounds

[,2.21)
  • M
Denial of Service (DoS)

[1.0,1.1.14)
  • C
Resource Management Errors

[,2.12)
  • H
Out-of-Bounds

[,2.9.1)
  • M
Improper Input Validation

[,2.31)
  • H
Access Restriction Bypass

[,2.9.1)
  • H
Use After Free

[,2.15)
  • H
Denial of Service (DoS)

[,2.0.1)
  • M
Improper Input Validation

[,1.1.6)
  • M
Cross-site Scripting (XSS)

[,2.13)
  • C
Resource Management Errors

[,1.1.15)
  • C
Denial of Service (DoS)

[1.0,2.1]
  • H
Access Restriction Bypass

[,2.21)
  • H
Out-of-bounds Read

[,2.13)
  • H
Remote Code Execution (RCE)

[,2.15)
  • H
Out-of-Bounds

[,2.13)
  • M
Access Restriction Bypass

[,1.1.14)
  • M
Information Exposure

[,1.1.13)
  • M
Resource Management Errors

[,1.1.14)
  • M
Directory Traversal

[,1.1.12)
  • C
Denial of Service (DoS)

[,2.17.1)
  • M
Authentication Bypass

[,2.10.1)
  • M
Information Exposure

[,2.14)
  • H
Out-of-Bounds

[,2.13)
  • C
Out-of-Bounds

[,2.21)
  • H
Denial of Service (DoS)

[,2.0.5)
  • M
Information Exposure

[1.0,1.1.14)
  • C
Out-of-Bounds

[,2.0.12)
  • M
Improper Input Validation

[0,1.1.10-1.fc9)
  • C
Denial of Service (DoS)

[,1.0.5)
  • H
Out-of-Bounds

[,2.9.1)
  • M
Denial of Service (DoS)

[,1.0.7)
  • C
Denial of Service (DoS)

[,2.22.1)
  • M
CVE-2012-5354

[,2.13)
  • H
Out-of-Bounds

[1.0,1.1.13)
  • H
Out-of-Bounds

[,2.0.9)
  • H
Arbitrary Code Execution

[,2.0.7)
  • H
Remote Code Execution (RCE)

[,2.15)
  • H
Arbitrary Code Execution

[,1.0.3)[1.5.0.0,1.5.0.5)[1.5.0.0,1.5.0.5)
  • M
Cross-site Scripting (XSS)

[,2.0.5)
  • M
Information Exposure

[,2.17.1)
  • M
Cross-site Scripting (XSS)

[,1.0.8)
  • H
Denial of Service (DoS)

[,2.10.1)
  • H
Denial of Service (DoS)

[,2.7.1)
  • M
Cross-site Scripting (XSS)

[,1.5.0.12)[2.0.0.0,2.0.0.4)
  • C
Denial of Service (DoS)

[,2.17.1)
  • C
Out-of-Bounds

[,2.12)
  • H
Resource Management Errors

[,2.0.9)
  • H
Resource Management Errors

[,2.6)
  • M
Access Restriction Bypass

[,1.0.7)
  • H
Use After Free

[,2.13)
  • H
Out-of-Bounds

[,2.0.11)
  • H
Access Restriction Bypass

[2.0,2.1]
  • L
Access Restriction Bypass

[,1.0.1)
  • H
Remote Code Execution (RCE)

[,1.1.17)
  • M
Cross-site Scripting (XSS)

[0,1.1.10-1.fc9)
  • M
Cross-site Scripting (XSS)

[,1.1.8)
  • H
Out-of-Bounds

[,2.0.10)[3.0.0,3.0.10)[3.1.0,3.1.6)
  • H
Out-of-Bounds

[,2.4)
  • H
Use After Free

[,2.14)
  • M
Cross-site Scripting (XSS)

[,1.0.1)
  • H
Denial of Service (DoS)

[,1.0.1)
  • M
Remote Code Execution (RCE)

[,2.7.1)
  • C
Resource Management Errors

[,1.1.10)
  • M
Cross-site Scripting (XSS)

[,1.0.8)[1.7.0,1.7.13)
  • M
Arbitrary Code Execution

[,1.0.7)
  • H
Access Restriction Bypass

[,1.0.1)[1.5.0.0,1.5.0.2)
  • M
Access Restriction Bypass

[,1.1.13)[2.0.0.0,2.0.0.18)
  • H
Arbitrary Code Execution

[,1.0.8)[1.5.0.0,1.5.0.10)
  • H
Access Restriction Bypass

[,1.0.8)
  • H
Arbitrary Code Execution

[,2.24)
  • M
Resource Management Errors

[,1.1.13)
  • M
Denial of Service (DoS)

[,2.25)
  • M
Cross-site Scripting (XSS)

[,2.21)
  • M
Improper Input Validation

[,1.1.15)
  • M
Out-of-Bounds

[,2.21)
  • C
Denial of Service (DoS)

[,2.21)
  • H
Denial of Service (DoS)

[,1.1.11)
  • C
Out-of-Bounds

[,1.1.12)
  • H
Resource Management Errors

[,2.0.5)
  • M
Access Restriction Bypass

[,2.21)
  • C
Remote Code Execution (RCE)

[,2.0.3)[3.0.0,3.0.2)[3.0.0,3.0.18)[3.5.0,3.5.8)
  • M
Cross-site Scripting (XSS)

[,2.0.7)
  • M
Denial of Service (DoS)

[,1.0.6)[1.5.0.0,1.5.0.8)[1.5.0.0,1.5.0.8)
  • M
Information Exposure

[,2.12)
  • M
Cross-site Scripting (XSS)

[,1.1.12)
  • H
Resource Management Errors

[,2.0.6)
  • H
Information Exposure

[,2.16)
  • C
Denial of Service (DoS)

[,2.22.1)
  • M
CVE-2010-0169

[,2.0.3)
  • H
Use After Free

[,2.14)
  • M
CVE-2007-3511

[,1.1.5)
  • H
Open Redirect

[,2.0.11)
  • H
Out-of-Bounds

[,2.13)
  • C
Privilege Escalation

[,2.25)
  • H
Denial of Service (DoS)

[,2.10.1)
  • H
User Impersonation

[,2.24)
  • M
Information Exposure

[,2.9)
  • L
Information Exposure

[,2.9.1)
  • H
Out-of-bounds Write

[,2.26)
  • M
Access Restriction Bypass

[,1.1.10)
  • M
Out-of-Bounds

[,2.31)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,2.24)
  • M
Denial of Service (DoS)

[,2.1)
  • C
Arbitrary Code Execution

[,2.22.1)
  • M
Denial of Service (DoS)

[,2.35)
  • M
Incorrect Calculation

[,2.9)
  • C
Out-of-Bounds

[,2.21)
  • C
Out-of-bounds Write

[,2.25)
  • H
Use After Free

[,2.15)
  • M
Cross-site Scripting (XSS)

[,1.1.17]
  • M
Improper Input Validation

[,2.0.14)
  • M
Improper Input Validation

[,1.1.5)
  • M
Cross-site Scripting (XSS)

[,2.0.9)
  • H
Improper Input Validation

[,2.21)
  • C
Use After Free

[,2.12)
  • M
Directory Traversal

[,2.0.14)
  • M
Improper Input Validation

[,2.0.6)
  • M
Access Restriction Bypass

[,1.0.1)
  • H
Denial of Service (DoS)

[,2.0.1)
  • H
Arbitrary Code Execution

[,1.5.0.1)
  • H
Denial of Service (DoS)

[,2.0.6)
  • H
Denial of Service (DoS)

[,1.0.1)[1.0.0,1.0.8)[1.5.0.0,1.5.0.2)[1.7.0,1.7.13)
  • C
Resource Management Errors

[,2.0.14)
  • H
Denial of Service (DoS)

[,2.16)
  • M
Cryptographic Issues

[,2.0.5)
  • C
Denial of Service (DoS)

[,2.21)
  • M
Access Restriction Bypass

[,2.13]
  • M
Denial of Service (DoS)

[,2.6)
  • H
Denial of Service (DoS)

[,2.12)
  • M
Out-of-Bounds

[,1.1.8]
  • M
Cross-site Scripting (XSS)

[,2.13)
  • H
Use After Free

[,2.15)
  • C
Out-of-bounds Write

[,2.12)
  • M
Improper Input Validation

[1.0,1.1.14)
  • M
Denial of Service (DoS)

[,1.0.5)
  • C
Improper Input Validation

[,2.21)
  • M
Denial of Service (DoS)

[,1.0]
  • H
Out-of-Bounds

[,2.0.11)
  • H
Out-of-Bounds

[,1.0.8)[1.7.0,1.7.13)
  • H
Use After Free

[,2.15)
  • H
Out-of-Bounds

[,2.0.9)
  • H
Denial of Service (DoS)

[,2.15)
  • M
Information Exposure

[,2.0.6)
  • H
Denial of Service (DoS)

[,2.26)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,2.24)
  • H
Denial of Service (DoS)

[,2.10)
  • C
Remote Code Execution (RCE)

[,2.3)
  • M
Improper Input Validation

[,1.0.2)
  • H
Resource Management Errors

[,2.0.1)
  • C
Denial of Service (DoS)

[,2.0.14)
  • M
Authentication Bypass

[,2.9.1)
  • H
Use After Free

[,2.14)
  • C
Improper Input Validation

[1.0,1.1.13)
  • M
Arbitrary Code Execution

[,1.0]
  • H
Resource Management Errors

[,2.0.6)
  • H
Denial of Service (DoS)

[,1.0.1)[1.5.0.0,1.5.0.2)
  • M
Improper Input Validation

[1.0,1.1.14)
  • H
Use After Free

[,2.16)
  • H
Denial of Service (DoS)

[,1.0.3)[1.5.0.0,1.5.0.5)[1.5.0.0,1.5.0.5)
  • H
Information Exposure

[,2.0.1)
  • C
Integer Overflow or Wraparound

[,2.14)
  • H
Out-of-Bounds

[,2.9.1)
  • M
Arbitrary Code Execution

[,1.1.7]
  • M
Cross-site Scripting (XSS)

[,1.5.0.13)
  • M
Authentication Bypass

[,2.13)
  • C
Use After Free

[,2.14)
  • M
Cryptographic Issues

[,2.23)
  • M
Improper Access Control

[,2.31)
  • M
Improper Input Validation

[,1.1.8)
  • H
Out-of-bounds Write

[,2.25)
  • H
Resource Management Errors

[,1.1.13)
  • M
Out-of-Bounds

[,2.21)
  • H
Arbitrary Code Execution

[,1.1.9)
  • H
Denial of Service (DoS)

[,2.8)
  • H
Denial of Service (DoS)

[,2.0.11)
  • C
Resource Management Errors

[,2.0.12)
  • M
Information Exposure

[,2.2)
  • M
Arbitrary Code Execution

[,2.17)
  • H
Out-of-Bounds

[,1.1.8)
  • M
Access Restriction Bypass

[,2.7.1)
  • M
Cross-site Scripting (XSS)

[,2.13.2)
  • H
Use After Free

[,2.13)
  • H
Insecure Encryption

[,2.16)
  • M
Authentication Bypass

[,1.0.8)[1.5.0.0,1.5.0.10)[2.0.0.0,2.0.0.2)
  • C
CVE-2013-5615

[,2.23)
  • C
Resource Management Errors

[,2.12)
  • C
Remote Code Execution (RCE)

[2.0,2.1]
  • C
Buffer Overflow

[,2.26)
  • H
Resource Management Errors

[,2.0.7)
  • H
Access Restriction Bypass

[,1.0.1)
  • M
Cross-site Scripting (XSS)

[,1.0.5)
  • C
Out-of-Bounds

[,2.0)
  • H
Out-of-Bounds

[,2.4)
  • H
Remote Code Execution (RCE)

[,1.1.17)
  • H
Denial of Service (DoS)

[,2.14)
  • M
Cross-site Scripting (XSS)

[,3.0.9)
  • C
Arbitrary Code Execution

[,2.24)
  • H
Access Restriction Bypass

[,1.1.10)
  • M
Information Exposure

[,1.1.10)
  • M
Cross-site Scripting (XSS)

[,2.0.7)
  • C
Resource Management Errors

[,1.1.10)
  • M
Cross-site Request Forgery (CSRF)

[,2.14)
  • M
Access Restriction Bypass

[,2.10.1)
  • M
Access Restriction Bypass

[,2.4)
  • M
Improper Input Validation

[,1.0)
  • H
Out-of-Bounds

[,2.0.11)
  • M
Directory Traversal

[,1.1.8)
  • H
Remote Code Execution (RCE)

[,1.1.17)
  • H
Access Restriction Bypass

[,1.1.5)
  • M
Cross-site Scripting (XSS)

[,2.9.1)
  • H
Remote Code Execution (RCE)

[,2.0.7)
  • H
XML External Entity (XXE) Injection

[1.0,1.1.13)
  • M
Privilege Escalation

[,2.25)
  • H
Improper Input Validation

[,1.1.6)
  • H
Cross-site Scripting (XSS)

[,2.0)
  • H
Resource Management Errors

[,2.10.1)
  • C
Improper Input Validation

[,2.0.14)
  • H
Out-of-bounds Read

[,2.25)
  • M
Information Exposure

[1.0,2.9]
  • M
Information Exposure

[,1.1.15)
  • H
Arbitrary Code Execution

[,1.0.6)
  • M
Improper Input Validation

[,1.1.5)
  • H
Arbitrary Code Execution

[,2.35)
  • H
Resource Management Errors

[,2.7)
  • H
Denial of Service (DoS)

[,2.15)
  • H
Denial of Service (DoS)

[,2.9.1)
  • H
Out-of-Bounds

[,2.14)
  • M
Out-of-Bounds

[,1.0.7)
  • H
Denial of Service (DoS)

[,2.13)
  • C
Resource Management Errors

[,2.0.14)
  • H
Out-of-Bounds

[,2.13)
  • H
Resource Management Errors

[,1.1.10)
  • H
Resource Management Errors

[,2.9.1)
  • M
Arbitrary Code Execution

[,1.0.1)
  • M
Improper Input Validation

[,2.4)
  • M
Information Exposure

[,1.5.0.1)
  • H
Denial of Service (DoS)

[,1.0.3)
  • H
Remote Code Execution (RCE)

[,2.35)
  • H
Out-of-bounds Write

[,2.16)
  • H
CVE-2008-3837

[,1.1.12)
  • M
Authentication Bypass

[,2.0.5)
  • M
Improper Input Validation

[,1.5.0.1)
  • C
Denial of Service (DoS)

[,2.0.14)
  • M
Out-of-Bounds

[,2.16)
  • H
Arbitrary Code Execution

[,1.0.1)
  • H
Use After Free

[,2.15)
  • C
Resource Management Errors

[,1.1.14)
  • H
Resource Management Errors

[,1.0.1)
  • H
Out-of-bounds Write

[,2.14)
  • M
Resource Management Errors

[,1.1.19)
  • H
Denial of Service (DoS)

[,2.15)
  • H
Resource Management Errors

[,2.21)
  • H
Use After Free

[,2.14)
  • M
Information Exposure

[,2.6)
  • M
CVE-2010-3773

[,2.0.11)
  • M
Cross-site Scripting (XSS)

[,1.0.8)
  • H
Denial of Service (DoS)

[,2.0.5)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,2.23)
  • H
Denial of Service (DoS)

[,2.14)
  • H
Out-of-Bounds

[,2.0.12)
  • M
Cross-site Scripting (XSS)

[,2.13.2)
  • H
Resource Management Errors

[,1.1.15)
  • H
Use After Free

[,2.13)
  • H
Resource Management Errors

[,2.0.4)
  • C
Out-of-Bounds

[,2.22.1)
  • M
Access Restriction Bypass

[,2.35)
  • M
Information Exposure

[,1.1.18)
  • H
Arbitrary Code Execution

[,1.0.3)
  • M
Remote Code Execution (RCE)

[,1.1.5)
  • M
Improper Input Validation

[,2.0.4)
  • M
Resource Management Errors

[,1.1.14)
  • H
Out-of-bounds Read

[,2.16)
  • H
Privilege Escalation

[,2.26)
  • H
Resource Management Errors

[,2.5]
  • M
Access Restriction Bypass

[,2.0.9)
  • M
Improper Access Control

[,2.31)
  • M
CVE-2007-4879

[,1.1.9)
  • H
Use After Free

[,2.7)
  • M
Remote Code Execution (RCE)

[,2.0.3)
  • H
Use After Free

[,2.15)
  • C
Out-of-bounds Read

[,2.25)
  • M
Cross-site Scripting (XSS)

[,2.13)
  • M
Improper Input Validation

[,2.0.11)
  • M
Denial of Service (DoS)

[,1.1.8)
  • M
Access Restriction Bypass

[,2.2)
  • H
Denial of Service (DoS)

[,2.0.4)
  • M
Cross-site Scripting (XSS)

[,2.9.1)
  • M
Cross-site Scripting (XSS)

[,2.7.1)
  • C
Denial of Service (DoS)

[,2.22.1)
  • H
Out-of-Bounds

[,2.14)
  • H
Out-of-Bounds

[,2.0.7)
  • H
Denial of Service (DoS)

[,2.12)
  • H
Out-of-Bounds

[,1.0.5)
  • M
Cross-site Scripting (XSS)

[,2.17.1)
  • M
Cross-site Scripting (XSS)

[,1.1.9)
  • M
Access Restriction Bypass

[,2.0.7)
  • M
Cross-site Request Forgery (CSRF)

[,2.0.12)
  • C
Resource Management Errors

[,2.9.1)
  • M
Denial of Service (DoS)

[,1.0.7)[1.5.0.0,1.5.0.9)[1.5.0.0,1.5.0.9)[2.0.0.0,2.0.0.1)
  • H
Remote Code Execution (RCE)

[,1.5.0.12)[,1.5.0.12)[2.0.0.0,2.0.0.4)[2.0.0.0,2.0.0.4)
  • C
Denial of Service (DoS)

[,2.9.1)
  • H
Arbitrary Code Execution

[1.5.0.0,1.5.0.5)
  • C
Resource Management Errors

[,2.0.14)
  • H
Use After Free

[,2.13)
  • C
Denial of Service (DoS)

[,2.23)
  • H
Access Restriction Bypass

[,2.9]
  • H
Out-of-Bounds

[,2.0.7)
  • C
Out-of-Bounds

[,2.7)
  • M
Improper Authentication

[,1.1.9)
  • H
Out-of-Bounds

[,2.0.3)
  • H
Denial of Service (DoS)

[,2.0.5)
  • C
Resource Management Errors

[,1.1.12)
  • L
CVE-2006-3812

[0,1.0.4)
  • C
Denial of Service (DoS)

[,2.0.14)
  • M
Information Exposure

[,1.1.17)
  • H
Improper Authentication

[,1.1.10)
  • C
Denial of Service (DoS)

[2.0,2.2]
  • M
Cross-site Scripting (XSS)

[,1.1.17]
  • C
Resource Management Errors

[,1.1.15)
  • C
Use After Free

[,2.12)
  • H
Resource Management Errors

[,2.21)
  • M
Denial of Service (DoS)

[,1.1.19)
  • M
Improper Input Validation

[,2.15)
  • C
Denial of Service (DoS)

[,2.0.14)
  • M
Information Exposure

[1.0,2.1]
  • C
Denial of Service (DoS)

[,2.22.1)
  • M
Information Exposure

[,2.12)
  • M
Cross-site Scripting (XSS)

[,1.0.3)[1.5.0.0,1.5.0.5)[1.5.0.0,1.5.0.5)
  • H
CVE-2010-3181

[,2.0.9)
  • M
Information Exposure

[,2.35)
  • H
Cross-site Scripting (XSS)

[,3.0)
  • H
Denial of Service (DoS)

[,2.0.5)
  • M
Denial of Service (DoS)

[,2.0)
  • L
CVE-2006-1736

[,1.0.1)
  • M
Cryptographic Issues

[,2.0.9)
  • M
Access Restriction Bypass

[,2.4)
  • H
Out-of-bounds Write

[,2.13.1)
  • M
Out-of-Bounds

[,2.9.1)
  • H
Race Condition

[,2.24)
  • M
Insecure Encryption

[,2.24)
  • M
Improper Input Validation

[,1.0.5)
  • M
Improper Input Validation

[,1.1.18)
  • M
CVE-2006-5462

[,1.0.6)
  • M
Out-of-Bounds

[,1.0.8)
  • M
Denial of Service (DoS)

[,1.0.8)
  • M
Out-of-Bounds

[,2.17.1)
  • H
Cryptographic Issues

[,2.31)
  • C
Buffer Overflow

[,2.0.6)
  • L
Cryptographic Issues

[,2.35]