Use After Free | |
Reachable Assertion | |
CVE-2022-3736 | |
Memory Leak | |
Memory Leak | |
Out-of-bounds Read | |
CVE-2022-3080 | |
Memory Leak | |
CVE-2022-2795 | |
HTTP Request Smuggling | |
Improper Resource Shutdown or Release | |
CVE-2021-25219 | |
Reachable Assertion | |
Reachable Assertion | |
Reachable Assertion | |
Reachable Assertion | |
Buffer Overflow | |
Improper Privilege Management | |
Improper Privilege Management | |
Reachable Assertion | |
Improper Input Validation | |
Reachable Assertion | |
Improper Resource Shutdown or Release | |
Reachable Assertion | |
Resource Exhaustion | |
Reachable Assertion | |
Resource Exhaustion | |
Reachable Assertion | |
Insufficient Verification of Data Authenticity | |
Race Condition | |
Reachable Assertion | |
Allocation of Resources Without Limits or Throttling | |
Missing Release of Resource after Effective Lifetime | |
Incorrect Permission Assignment for Critical Resource | |
Use of a Broken or Risky Cryptographic Algorithm | |
Reachable Assertion | |
Use After Free | |
Reachable Assertion | |
Reachable Assertion | |
Reachable Assertion | |
Reachable Assertion | |
Information Exposure | |
Reachable Assertion | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |