bpftool vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the bpftool package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-50083

<0:6.1.115-126.197.amzn2023
  • H
CVE-2024-27415

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27413

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27417

<0:6.1.82-99.168.amzn2023
  • H
Missing Initialization of Resource

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27431

<0:6.1.82-99.168.amzn2023
  • H
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • H
Resource Injection

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27404

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27023

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26804

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26849

<0:6.1.82-99.168.amzn2023
  • H
Resource Leak

<0:6.1.82-99.168.amzn2023
  • H
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • H
Data Element containing Pointer Item without Proper Copy Control Element

<0:6.1.82-99.168.amzn2023
  • H
Double Free

<0:6.1.82-99.168.amzn2023
  • H
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26805

<0:6.1.82-99.168.amzn2023
  • H
Resource Exhaustion

<0:6.1.82-99.168.amzn2023
  • H
Double Free

<0:6.1.82-99.168.amzn2023
  • H
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26803

<0:6.1.82-99.168.amzn2023
  • H
Divide By Zero

<0:6.1.82-99.168.amzn2023
  • H
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Double Free

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26764

<0:6.1.82-99.168.amzn2023
  • H
Resource Injection

<0:6.1.82-99.168.amzn2023
  • H
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • H
Improper Handling of Undefined Parameters

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-1627

<0:6.1.82-99.168.amzn2023
  • H
Resource Injection

<0:6.1.109-118.189.amzn2023
  • H
Resource Injection

<0:6.1.82-99.168.amzn2023
  • H
Improper Resource Locking

<0:6.1.82-99.168.amzn2023
  • H
Resource Injection

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
Out-of-Bounds

<0:6.1.82-99.168.amzn2023
  • H
Improper Initialization

<0:6.1.109-118.189.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
CVE-2024-46711

<0:6.1.109-118.189.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • H
Heap-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27403

<0:6.1.82-99.168.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Deadlock

<0:6.1.109-118.189.amzn2023
  • M
Buffer Overflow

<0:6.1.119-129.201.amzn2023
  • H
Reachable Assertion

<0:6.1.84-99.169.amzn2023
  • H
Improper Neutralization of Null Byte or NUL Character

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27435

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26993

<0:6.1.90-99.173.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.90-99.173.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Excessive Platform Resource Consumption within a Loop

<0:6.1.84-99.169.amzn2023
  • H
Integer Underflow

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-38573

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-35927

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-27414

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Improper Locking

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • M
Improper Locking

<0:6.1.119-129.201.amzn2023
  • M
Use After Free

<0:6.1.115-126.197.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • M
CVE-2024-27017

<0:6.1.112-122.189.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.106-116.188.amzn2023
  • M
CVE-2024-35910

<0:6.1.87-99.174.amzn2023
  • M
Out-of-bounds Read

<0:6.1.87-99.174.amzn2023
  • M
Improper Input Validation

<0:6.1.91-99.172.amzn2023
  • M
Race Condition

<0:6.1.91-99.172.amzn2023
  • H
CVE-2024-35791

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26973

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35944

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35872

<0:6.1.87-99.174.amzn2023
  • H
CVE-2024-27004

<0:6.1.90-99.173.amzn2023
  • H
Missing Synchronization

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26988

<0:6.1.90-99.173.amzn2023
  • H
Buffer Overflow

<0:6.1.94-99.176.amzn2023
  • H
Double Free

<0:6.1.102-108.177.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.91-99.172.amzn2023
  • H
Double Free

<0:6.1.79-99.164.amzn2023
  • M
CVE-2024-35908

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35897

<0:6.1.87-99.174.amzn2023
  • H
Improper Write Handling in Limited-write Non-Volatile Memories

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.66-91.160.amzn2023
  • H
CVE-2024-35839

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52693

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Out-of-bounds Read

<0:6.1.66-91.160.amzn2023
  • H
Dead Code

<0:6.1.66-91.160.amzn2023
  • H
CVE-2023-52683

<0:6.1.75-99.163.amzn2023
  • H
Double Free

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Incomplete Cleanup

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Improper Input Validation

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Improper Locking

<0:6.1.15-28.43.amzn2023
  • H
Race Condition

<0:6.1.12-17.42.amzn2023
  • H
External Control of System or Configuration Setting

<0:6.1.15-28.43.amzn2023
  • H
Memory Leak

<0:6.1.15-28.43.amzn2023
  • M
Resource Leak

<0:6.1.115-126.197.amzn2023
  • M
Use of Uninitialized Resource

<0:6.1.115-126.197.amzn2023
  • M
CVE-2024-35963

<0:6.1.115-126.197.amzn2023
  • M
Improper Authentication

<0:6.1.115-126.197.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Buffer Overflow

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.111-120.187.amzn2023
  • H
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • H
Link Following

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Race Condition

<0:6.1.111-120.187.amzn2023
  • H
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.106-116.188.amzn2023
  • M
Reachable Assertion

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35849

<0:6.1.90-99.173.amzn2023
  • H
Incomplete Cleanup

<0:6.1.94-99.176.amzn2023
  • M
Improper Null Termination

<0:6.1.91-99.172.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.15-28.43.amzn2023
  • H
Use After Free

<0:6.1.12-17.42.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • H
Double Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • H
Double Free

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.111-120.187.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.112-122.189.amzn2023
  • M
Improper Locking

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • M
Race Condition

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.111-120.187.amzn2023
  • M
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • M
Allocation of Resources Without Limits or Throttling

<0:6.1.111-120.187.amzn2023
  • M
Link Following

<0:6.1.111-120.187.amzn2023
  • M
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Improper Initialization

<0:6.1.109-118.189.amzn2023
  • M
Resource Injection

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • M
CVE-2024-46711

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
Information Exposure

<0:6.1.97-104.177.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • H
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Deadlock

<0:6.1.97-104.177.amzn2023
  • H
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
CVE-2024-35807

<0:6.1.79-99.167.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • H
Double Free

<0:6.1.97-104.177.amzn2023
  • M
Memory Leak

<0:6.1.106-116.188.amzn2023
  • M
Out-of-bounds Write

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35826

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35823

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35827

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35815

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35804

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35800

<0:6.1.84-99.169.amzn2023
  • H
Double Free

<0:6.1.90-99.173.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-35888

<0:6.1.87-99.174.amzn2023
  • M
Divide By Zero

<0:6.1.87-99.174.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-27413

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27431

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27415

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27404

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-35840

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52675

<0:6.1.75-99.163.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Allocation of Resources Without Limits or Throttling

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Out-of-Bounds

<0:6.1.106-116.188.amzn2023
  • H
Improper Handling of Length Parameter Inconsistency

<0:6.1.102-108.177.amzn2023
  • H
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35805

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Resource Leak

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • H
CVE-2023-52656

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • H
Deadlock

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27395

<0:6.1.90-99.173.amzn2023
  • H
Resource Leak

<0:6.1.90-99.173.amzn2023
  • H
Use After Free

<0:6.1.94-99.176.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
Use After Free

<0:6.1.102-108.177.amzn2023
  • H
Resource Injection

<0:6.1.102-108.177.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.102-108.177.amzn2023
  • H
Out-of-bounds Read

<0:6.1.102-108.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • M
Information Exposure

<0:6.1.97-104.177.amzn2023
  • M
Deadlock

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Use After Free

<0:6.1.97-104.177.amzn2023
  • M
Buffer Underflow

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-27023

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27393

<0:6.1.87-99.174.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26804

<0:6.1.82-99.168.amzn2023
  • M
Divide By Zero

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26803

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26849

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26764

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
Missing Initialization of Resource

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
Data Element containing Pointer Item without Proper Copy Control Element

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
Resource Leak

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26805

<0:6.1.82-99.168.amzn2023
  • M
Use After Free

<0:6.1.82-99.168.amzn2023
  • M
Improper Resource Locking

<0:6.1.82-99.168.amzn2023
  • M
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Undefined Parameters

<0:6.1.82-99.168.amzn2023
  • M
Resource Exhaustion

<0:6.1.82-99.168.amzn2023
  • M
Out-of-Bounds

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26920

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26707

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Integer Underflow

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Divide By Zero

<0:6.1.79-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.79-99.164.amzn2023
  • H
Write-what-where Condition

<0:6.1.79-99.164.amzn2023
  • H
Resource Leak

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
Unchecked Input for Loop Condition

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Incorrect Calculation of Buffer Size

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52654

<0:6.1.72-96.166.amzn2023
  • H
CVE-2024-26960

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26977

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27390

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26951

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27065

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27389

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26950

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26946

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26938

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26935

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27015

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27016

<0:6.1.90-99.173.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26992

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26976

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26989

<0:6.1.90-99.173.amzn2023
  • H
Improper Locking

<0:6.1.90-99.173.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27018

<0:6.1.90-99.173.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • H
Double Free

<0:6.1.94-99.176.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Improper Initialization

<0:6.1.94-99.176.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.94-99.176.amzn2023
  • H
Out-of-bounds Write

<0:6.1.94-99.176.amzn2023
  • H
Out-of-bounds Read

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • H
Memory Leak

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.15-28.43.amzn2023
  • M
Use After Free

<0:6.1.94-99.176.amzn2023
  • M
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Write

<0:6.1.91-99.172.amzn2023
  • M
Double Free

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.90-99.173.amzn2023
  • M
Resource Injection

<0:6.1.91-99.172.amzn2023
  • M
Untrusted Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Use After Free

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Improper Initialization

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35947

<0:6.1.91-99.172.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • M
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • M
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Missing Lock Check

<0:6.1.75-99.163.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Resource Leak

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.75-99.163.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Improper Input Validation

<0:6.1.59-84.139.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.59-84.139.amzn2023
  • H
Race Condition

<0:6.1.56-82.125.amzn2023
  • H
Missing Encryption of Sensitive Data

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Unchecked Input for Loop Condition

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Incorrect Calculation of Buffer Size

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Improper Handling of Exceptional Conditions

<0:6.1.56-82.125.amzn2023
  • H
Memory Leak

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.41-63.109.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • M
Use of Uninitialized Variable

<0:6.1.91-99.172.amzn2023
  • M
Divide By Zero

<0:6.1.91-99.172.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.29-47.49.amzn2023
  • H
Improper Protection Against Physical Side Channels

<0:6.1.12-17.42.amzn2023
  • H
Use After Free

<0:6.1.15-28.43.amzn2023
  • M
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-27417

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
Memory Leak

<0:6.1.75-99.163.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52672

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52881

<0:6.1.72-96.166.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.59-84.139.amzn2023
  • H
Improper Protection Against Physical Side Channels

<0:6.1.59-84.139.amzn2023
  • H
Improper Resource Shutdown or Release

<0:6.1.59-84.139.amzn2023
  • H
Return of Stack Variable Address

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.87-99.174.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • M
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.79-99.164.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.72-96.166.amzn2023
  • M
Improper Locking

<0:6.1.87-99.174.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • M
CVE-2024-1627

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26602

<0:6.1.79-99.164.amzn2023
  • H
Range Error

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52462

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023
  • H
Out-of-bounds Write

<0:6.1.55-75.123.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • M
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2024-25744

<0:6.1.72-96.166.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2024-2193

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26581

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52433

<0:6.1.56-82.125.amzn2023
  • H
Untrusted Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
CVE-2024-23851

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-23850

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
Information Exposure

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
Improper Check for Unusual or Exceptional Conditions

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
Off-by-one Error

<0:6.1.77-99.164.amzn2023
  • H
Integer Underflow

<0:6.1.72-96.166.amzn2023
  • H
Deadlock

<0:6.1.59-84.139.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • H
Improper Handling of Values

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Deadlock

<0:6.1.41-63.109.amzn2023
  • H
Improperly Implemented Security Check for Standard

<0:6.1.21-1.45.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Resource Exhaustion

<0:6.1.10-15.42.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023
  • H
Out-of-bounds Read

<0:6.1.72-96.166.amzn2023
  • H
Resource Exhaustion

<0:6.1.66-93.164.amzn2023
  • H
Memory Leak

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.61-85.141.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.41-63.109.amzn2023
  • H
Deadlock

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Out-of-bounds Write

<0:6.1.55-75.123.amzn2023
  • H
Improper Privilege Management

<0:6.1.61-85.141.amzn2023
  • H
Out-of-bounds Write

<0:6.1.61-85.141.amzn2023
  • H
Improper Handling of Exceptional Conditions

<0:6.1.61-85.141.amzn2023
  • H
Use After Free

<0:6.1.12-17.42.amzn2023
  • H
Improper Input Validation

<0:6.1.59-84.139.amzn2023
  • H
Resource Exhaustion

<0:6.1.59-84.139.amzn2023
  • H
Buffer Overflow

<0:6.1.55-75.123.amzn2023
  • H
Integer Underflow

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Write

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Race Condition

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.49-69.116.amzn2023
  • H
Out-of-Bounds

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.41-63.109.amzn2023
  • M
Use After Free

<0:6.1.23-36.46.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.19-30.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.12-17.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.55-75.123.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.34-56.100.amzn2023
  • H
Out-of-Bounds

<0:6.1.52-71.125.amzn2023
  • H
Improper Locking

<0:6.1.52-71.125.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Resource Leak

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • M
Incorrect Calculation

<0:6.1.27-43.48.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.49-69.116.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.49-69.116.amzn2023
  • H
Out-of-bounds Read

<0:6.1.49-69.116.amzn2023
  • H
Divide By Zero

<0:6.1.49-69.116.amzn2023
  • H
Out-of-Bounds

<0:6.1.49-69.116.amzn2023
  • M
Information Exposure

<0:6.1.41-63.114.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Write

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Read

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.19-30.43.amzn2023
  • H
Sensitive Information Uncleared Before Release

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.41-63.114.amzn2023
  • H
Out-of-bounds Write

<0:6.1.41-63.114.amzn2023
  • M
Improper Zeroization of Hardware Register

<0:6.1.41-63.114.amzn2023
  • M
Out-of-bounds Read

<0:6.1.41-63.114.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Double Free

<0:6.1.38-59.109.amzn2023
  • M
Out-of-bounds Write

<0:6.1.23-36.46.amzn2023
  • H
Out-of-bounds Read

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Out-of-bounds Write

<0:6.1.34-56.100.amzn2023
  • H
Incorrect Bitwise Shift of Integer

<0:6.1.12-17.42.amzn2023
  • H
Use After Free

<0:6.1.15-28.43.amzn2023
  • M
Use After Free

<0:6.1.34-59.116.amzn2023
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:6.1.34-58.102.amzn2023
  • H
Out-of-bounds Write

<0:6.1.34-56.100.amzn2023
  • H
Reachable Assertion

<0:6.1.34-56.100.amzn2023
  • H
Double Free

<0:6.1.29-50.88.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.29-47.49.amzn2023
  • H
Improper Resource Locking

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.21-1.45.amzn2023
  • M
Out-of-bounds Write

<0:6.1.27-43.48.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Read

<0:6.1.25-37.47.amzn2023
  • H
Sensitive Information Uncleared Before Release

<0:6.1.19-30.43.amzn2023
  • H
Out-of-Bounds

<0:6.1.19-30.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.15-28.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Resource Leak

<0:6.1.10-15.42.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.23-36.46.amzn2023
  • M
Deadlock

<0:6.1.23-36.46.amzn2023
  • H
Use After Free

<0:6.1.21-1.45.amzn2023
  • H
Double Free

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.19-30.43.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.19-30.43.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.12-17.42.amzn2023
  • H
CVE-2022-27672

<0:6.1.12-17.42.amzn2023
  • H
Double Free

<0:6.1.15-28.43.amzn2023
  • H
Insecure Default Initialization of Resource

<0:6.1.15-28.43.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.10-15.42.amzn2023
  • H
Integer Underflow

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Deadlock

<0:6.1.10-15.42.amzn2023
  • H
Deadlock

<0:6.1.10-15.42.amzn2023
  • H
Improper Preservation of Permissions

<0:6.1.10-15.42.amzn2023
  • H
Arbitrary Code Injection

<0:6.1.10-15.42.amzn2023
  • H
Write-what-where Condition

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Race Condition During Access to Alternate Channel

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Out-of-Bounds

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.10-15.42.amzn2023
  • H
Missing Report of Error Condition

<0:6.1.10-15.42.amzn2023
  • H
Expected Behavior Violation

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-36946

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.10-15.42.amzn2023
  • H
Comparison Using Wrong Factors

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
Improper Locking

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Divide By Zero

<0:6.1.10-15.42.amzn2023
  • H
Incorrect Default Permissions

<0:6.1.10-15.42.amzn2023
  • H
Improper Locking

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Read

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-23960

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Release of Invalid Pointer or Reference

<0:6.1.10-15.42.amzn2023
  • H
Authentication Bypass by Primary Weakness

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Missing Initialization of Resource

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Improper Preservation of Permissions

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use of Uninitialized Resource

<0:6.1.10-15.42.amzn2023
  • H
Missing Authorization

<0:6.1.10-15.42.amzn2023
  • H
Integer Underflow

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-0002

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-0001

<0:6.1.10-15.42.amzn2023
  • H
Exposure of Resource to Wrong Sphere

<0:6.1.10-15.42.amzn2023
  • H
CVE-2021-26401

<0:6.1.10-15.42.amzn2023