CVE-2024-11053 | |
CVE-2024-6197 | |
CVE-2024-2379 | |
CVE-2024-2398 | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Allocation of Resources Without Limits or Throttling | |
Insufficient Comparison | |
Out-of-bounds Write | |
CVE-2023-46218 | |
CVE-2024-2466 | |
CVE-2023-38546 | |
CVE-2024-2004 | |
CVE-2023-28322 | |
Race Condition | |
Improper Authentication | |
Improper Certificate Validation | |
Arbitrary Code Injection | |
Missing Encryption of Sensitive Data | |
Cleartext Transmission of Sensitive Information | |
Directory Traversal | |
Improper Authentication | |
Improper Certificate Validation | |
CVE-2024-8096 | |
Use After Free | |
Double Free | |
Cleartext Transmission of Sensitive Information | |
Double Free | |
Server-Side Request Forgery (SSRF) | |
Improper Certificate Validation | |
Out-of-bounds Write | |
Allocation of Resources Without Limits or Throttling | |
Cleartext Transmission of Sensitive Information | |
Insufficient Verification of Data Authenticity | |
Exposure of Resource to Wrong Sphere | |
CVE-2022-35252 | |
Double Free | |
Cleartext Transmission of Sensitive Information | |
Insufficiently Protected Credentials | |
Improper Authentication | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Cleartext Transmission of Sensitive Information | |
Insufficiently Protected Credentials | |
Use After Free | |
CVE-2022-27779 | |
Use of Incorrectly-Resolved Name or Reference | |
Allocation of Resources Without Limits or Throttling | |
Improper Validation of Integrity Check Value | |
Out-of-bounds Write | |
Allocation of Resources Without Limits or Throttling | |
Incorrect Default Permissions | |
Missing Authentication for Critical Function | |
Use of Incorrectly-Resolved Name or Reference | |
CVE-2020-8284 | |
CVE-2022-27775 | |
Use After Free | |
Information Exposure | |
Use of Uninitialized Resource | |
Use After Free | |
Out-of-bounds Write | |
Missing Initialization of Resource | |
Insufficiently Protected Credentials | |
Authentication Bypass | |
Cleartext Transmission of Sensitive Information | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Double Free | |
Out-of-bounds Read | |
Improper Certificate Validation | |
Buffer Overflow | |
Improper Certificate Validation | |
Improper Initialization | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Arbitrary Code Injection | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Read | |
Use After Free | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Certificate Validation | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Double Free | |
Information Exposure | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Out-of-Bounds | |
Cryptographic Issues | |
Resource Injection | |
Double Free | |
Use After Free | |
Out-of-bounds Write | |
Credentials Management | |
Cryptographic Issues | |
Improper Input Validation | |
Out-of-bounds Read | |
Improper Authorization | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Improper Authentication | |
Improper Authentication | |
Use After Free | |