Search for packages
| purl | pkg:deb/debian/cyrus-sasl2@2.1.23.dfsg1-7 |
| Next non-vulnerable version | 2.1.27+dfsg-2.1+deb11u1 |
| Latest non-vulnerable version | 2.1.27+dfsg-2.1+deb11u1 |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2hdg-fauv-7bhv
Aliases: CVE-2013-4122 |
A NULL pointer dereference in Cyrus-SASL may allow remote attackers to cause a Denial of Service condition. |
Affected by 3 other vulnerabilities. Affected by 2 other vulnerabilities. |
|
VCID-ca3b-g7k5-yucm
Aliases: CVE-2019-19906 |
security update |
Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-ukce-7qpu-c7cm
Aliases: CVE-2022-24407 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement. |
Affected by 2 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-fthp-w8mb-nkgr | A buffer overflow in Cyrus-SASL might allow for the execution of arbitrary code in applications or daemons that authenticate using SASL. |
CVE-2009-0688
|