Vulnerability Database

With exploit

dovecot / dovecot

Title Severity Exploit Date Affected Version
CVE-2011-4318 Medium Mar 7, 2013 == 2.0.9
== 2.0.14
== 2.0.7
== 2.0.12
== 2.0.4
== 2.0.2
== 2.0.1
== 2.0.10
== 2.0.11
== 2.0.13
== 2.0.8
== 2.0.3
== 2.0.0
== 2.0.15
== 2.0.5
== 2.0.6
CVE-2011-1929 Medium May 25, 2011 == 1.2.0
== 1.2.1
== 1.2.10
== 1.2.11
== 1.2.12
== 1.2.13
== 1.2.14
== 1.2.15
== 1.2.16
== 1.2.2
== 1.2.3
== 1.2.4
== 1.2.5
== 1.2.6
== 1.2.7
== 1.2.8
== 1.2.9
== 2.0-beta1
== 2.0.0
== 2.0.1
== 2.0.10
== 2.0.11
== 2.0.12
== 2.0.2
== 2.0.3
== 2.0.4
== 2.0.5
== 2.0.6
== 2.0.7
== 2.0.8
== 2.0.9
CVE-2011-2166 Medium May 25, 2011 == 2.0.9
== 2.0.7
== 2.0.12
== 2.0.4
== 2.0.2
== 2.0.1
== 2.0.10
== 2.0.11
== 2.0.8
== 2.0.3
== 2.0.0
== 2.0.5
== 2.0.6
CVE-2011-2167 Medium May 25, 2011 == 2.0.9
== 2.0.7
== 2.0.12
== 2.0.4
== 2.0.2
== 2.0.1
== 2.0.10
== 2.0.11
== 2.0.8
== 2.0.3
== 2.0.0
== 2.0.5
== 2.0.6
CVE-2010-3779 Low Oct 6, 2010 == 1.2.2
== 1.2.7
== 1.2.4
== 1.2.9
== 1.2.11
== 1.2.1
== 1.2.13
== 1.2.8
== 1.2.6
== 1.2.5
== 1.2.10
== 1.2.14
== 1.2.3
== 1.2.0
== 1.2.12
== 2.0-beta1
CVE-2010-3780 Low Oct 6, 2010 == 1.2.2
== 1.2.7
== 1.2.4
== 1.2.9
== 1.2.11
== 1.2.1
== 1.2.13
== 1.2.8
== 1.2.6
== 1.2.5
== 1.2.10
== 1.2.14
== 1.2.3
== 1.2.0
== 1.2.12
CVE-2010-3706 Medium Oct 6, 2010 == 1.2.2
== 1.2.7
== 1.2.4
== 1.2.9
== 1.2.11
== 1.2.1
== 1.2.13
== 1.2.8
== 1.2.6
== 1.2.5
== 1.2.10
== 1.2.14
== 1.2.3
== 1.2.0
== 1.2.12
== 2.0.4
== 2.0.2
== 2.0.1
== 2.0.3
== 2.0.0
CVE-2010-3707 Medium Oct 6, 2010 == 1.2.2
== 1.2.7
== 1.2.4
== 1.2.9
== 1.2.11
== 1.2.1
== 1.2.13
== 1.2.8
== 1.2.6
== 1.2.5
== 1.2.10
== 1.2.14
== 1.2.3
== 1.2.0
== 1.2.12
== 2.0.4
== 2.0.2
== 2.0.1
== 2.0.3
== 2.0.0
CVE-2010-3304 Medium Sep 24, 2010 == 1.2.2
== 1.2.7
== 1.2.4
== 1.2.9
== 1.2.11
== 1.2.1
== 1.2.8
== 1.2.6
== 1.2.5
== 1.2.10
== 1.2.3
== 1.2.0
== 1.2.12
CVE-2010-0745 Medium May 20, 2010 == 1.2.2
== 1.2.7
== 1.2.4
== 1.2.9
== 1.2.1
== 1.2.8
== 1.2.6
== 1.2.5
== 1.2.10
== 1.2.3
== 1.2.0