kernel-debuginfo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-50083

<0:6.1.115-126.197.amzn2023
  • H
CVE-2024-27417

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26849

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27404

<0:6.1.82-99.168.amzn2023
  • H
Resource Injection

<0:6.1.82-99.168.amzn2023
  • H
Data Element containing Pointer Item without Proper Copy Control Element

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27431

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27415

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27413

<0:6.1.82-99.168.amzn2023
  • H
Missing Initialization of Resource

<0:6.1.82-99.168.amzn2023
  • H
Resource Leak

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27023

<0:6.1.82-99.168.amzn2023
  • H
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • H
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • H
Double Free

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26803

<0:6.1.82-99.168.amzn2023
  • H
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • H
Double Free

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26805

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26804

<0:6.1.82-99.168.amzn2023
  • H
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Resource Injection

<0:6.1.82-99.168.amzn2023
  • H
Double Free

<0:6.1.82-99.168.amzn2023
  • H
Resource Exhaustion

<0:6.1.82-99.168.amzn2023
  • H
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • H
Out-of-Bounds

<0:6.1.82-99.168.amzn2023
  • H
Divide By Zero

<0:6.1.82-99.168.amzn2023
  • H
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26764

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • H
Improper Handling of Undefined Parameters

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
Resource Injection

<0:6.1.82-99.168.amzn2023
  • H
Improper Resource Locking

<0:6.1.82-99.168.amzn2023
  • H
Resource Injection

<0:6.1.82-99.168.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-46711

<0:6.1.109-118.189.amzn2023
  • H
CVE-2024-1627

<0:6.1.82-99.168.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • H
Improper Initialization

<0:6.1.109-118.189.amzn2023
  • H
Resource Injection

<0:6.1.109-118.189.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
CVE-2024-27403

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27414

<0:6.1.82-99.168.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Buffer Overflow

<0:6.1.119-129.201.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Heap-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • M
Improper Locking

<0:6.1.119-129.201.amzn2023
  • M
Use After Free

<0:6.1.115-126.197.amzn2023
  • M
CVE-2024-27017

<0:6.1.112-122.189.amzn2023
  • H
CVE-2024-27435

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Reachable Assertion

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
Excessive Platform Resource Consumption within a Loop

<0:6.1.84-99.169.amzn2023
  • H
Improper Neutralization of Null Byte or NUL Character

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27004

<0:6.1.90-99.173.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26973

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26988

<0:6.1.90-99.173.amzn2023
  • H
Deadlock

<0:6.1.109-118.189.amzn2023
  • H
Use After Free

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
Buffer Overflow

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-38573

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-35927

<0:6.1.94-99.176.amzn2023
  • H
Double Free

<0:6.1.102-108.177.amzn2023
  • M
CVE-2024-35908

<0:6.1.87-99.174.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35910

<0:6.1.87-99.174.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.106-116.188.amzn2023
  • M
Improper Input Validation

<0:6.1.91-99.172.amzn2023
  • H
CVE-2024-35791

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Integer Underflow

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35944

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35872

<0:6.1.87-99.174.amzn2023
  • H
Improper Locking

<0:6.1.90-99.173.amzn2023
  • H
Missing Synchronization

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26993

<0:6.1.90-99.173.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.91-99.172.amzn2023
  • M
Race Condition

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35897

<0:6.1.87-99.174.amzn2023
  • M
Out-of-bounds Read

<0:6.1.87-99.174.amzn2023
  • H
Double Free

<0:6.1.79-99.164.amzn2023
  • H
Double Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52693

<0:6.1.75-99.163.amzn2023
  • H
Improper Write Handling in Limited-write Non-Volatile Memories

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
CVE-2024-35839

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52683

<0:6.1.75-99.163.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Incomplete Cleanup

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Out-of-bounds Read

<0:6.1.66-91.160.amzn2023
  • H
Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Improper Input Validation

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Dead Code

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Memory Leak

<0:6.1.15-28.43.amzn2023
  • H
Improper Locking

<0:6.1.15-28.43.amzn2023
  • H
Race Condition

<0:6.1.12-17.42.amzn2023
  • H
External Control of System or Configuration Setting

<0:6.1.15-28.43.amzn2023
  • M
Resource Leak

<0:6.1.115-126.197.amzn2023
  • M
CVE-2024-35963

<0:6.1.115-126.197.amzn2023
  • M
Use of Uninitialized Resource

<0:6.1.115-126.197.amzn2023
  • M
Improper Authentication

<0:6.1.115-126.197.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<0:6.1.111-120.187.amzn2023
  • H
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.111-120.187.amzn2023
  • H
Buffer Overflow

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Link Following

<0:6.1.111-120.187.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.111-120.187.amzn2023
  • H
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Race Condition

<0:6.1.111-120.187.amzn2023
  • H
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • M
Reachable Assertion

<0:6.1.106-116.188.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35849

<0:6.1.90-99.173.amzn2023
  • H
Incomplete Cleanup

<0:6.1.94-99.176.amzn2023
  • M
Improper Null Termination

<0:6.1.91-99.172.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.12-17.42.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.15-28.43.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • H
Double Free

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Double Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.111-120.187.amzn2023
  • M
Allocation of Resources Without Limits or Throttling

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Buffer Overflow

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.112-122.189.amzn2023
  • M
Link Following

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • M
Race Condition

<0:6.1.111-120.187.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • M
Improper Locking

<0:6.1.111-120.187.amzn2023
  • M
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • M
CVE-2024-46711

<0:6.1.109-118.189.amzn2023
  • M
Resource Injection

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Improper Initialization

<0:6.1.109-118.189.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • H
Deadlock

<0:6.1.97-104.177.amzn2023
  • H
Information Exposure

<0:6.1.97-104.177.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • H
Double Free

<0:6.1.97-104.177.amzn2023
  • H
CVE-2024-35823

<0:6.1.84-99.169.amzn2023
  • M
Memory Leak

<0:6.1.106-116.188.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • M
CVE-2024-35807

<0:6.1.79-99.167.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • M
Out-of-bounds Write

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35827

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35826

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35815

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35804

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35800

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.90-99.173.amzn2023
  • H
Double Free

<0:6.1.90-99.173.amzn2023
  • M
Divide By Zero

<0:6.1.87-99.174.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35888

<0:6.1.87-99.174.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-27404

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27431

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27415

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27413

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-35840

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52675

<0:6.1.75-99.163.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Allocation of Resources Without Limits or Throttling

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Out-of-Bounds

<0:6.1.106-116.188.amzn2023
  • H
Improper Handling of Length Parameter Inconsistency

<0:6.1.102-108.177.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • H
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35805

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
Resource Leak

<0:6.1.84-99.169.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Resource Leak

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • H
Use After Free

<0:6.1.90-99.173.amzn2023
  • H
CVE-2023-52656

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • H
Deadlock

<0:6.1.90-99.173.amzn2023
  • H
Use After Free

<0:6.1.102-108.177.amzn2023
  • H
Use After Free

<0:6.1.94-99.176.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
Resource Injection

<0:6.1.102-108.177.amzn2023
  • H
Out-of-bounds Read

<0:6.1.102-108.177.amzn2023
  • M
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Information Exposure

<0:6.1.97-104.177.amzn2023
  • M
Deadlock

<0:6.1.97-104.177.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Use After Free

<0:6.1.97-104.177.amzn2023
  • M
Buffer Underflow

<0:6.1.87-99.174.amzn2023
  • M
Resource Leak

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27393

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-27023

<0:6.1.82-99.168.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Data Element containing Pointer Item without Proper Copy Control Element

<0:6.1.82-99.168.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26804

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Use After Free

<0:6.1.82-99.168.amzn2023
  • M
Divide By Zero

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26805

<0:6.1.82-99.168.amzn2023
  • M
Missing Initialization of Resource

<0:6.1.82-99.168.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26849

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26764

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Undefined Parameters

<0:6.1.82-99.168.amzn2023
  • M
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26803

<0:6.1.82-99.168.amzn2023
  • M
Improper Resource Locking

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Resource Exhaustion

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Out-of-Bounds

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26920

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Resource Leak

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Divide By Zero

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Write-what-where Condition

<0:6.1.79-99.164.amzn2023
  • H
Integer Underflow

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Unchecked Input for Loop Condition

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26707

<0:6.1.79-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Incorrect Calculation of Buffer Size

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52654

<0:6.1.72-96.166.amzn2023
  • H
CVE-2024-27389

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26976

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27065

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26935

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26951

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26960

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26946

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26938

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27390

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27018

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26992

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27016

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27015

<0:6.1.90-99.173.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26977

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.90-99.173.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26950

<0:6.1.84-99.169.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • H
Out-of-bounds Read

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-26989

<0:6.1.90-99.173.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.94-99.176.amzn2023
  • H
Improper Initialization

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Out-of-bounds Write

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • H
Double Free

<0:6.1.94-99.176.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • H
Memory Leak

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.15-28.43.amzn2023
  • M
Use After Free

<0:6.1.94-99.176.amzn2023
  • M
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Double Free

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Improper Initialization

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
Resource Injection

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Untrusted Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • M
Use After Free

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-35947

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Write

<0:6.1.91-99.172.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.84-99.169.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • M
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Resource Leak

<0:6.1.75-99.163.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.75-99.163.amzn2023
  • H
Missing Lock Check

<0:6.1.75-99.163.amzn2023
  • H
Improper Input Validation

<0:6.1.75-99.163.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Deadlock

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.59-84.139.amzn2023
  • H
Improper Input Validation

<0:6.1.59-84.139.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Memory Leak

<0:6.1.56-82.125.amzn2023
  • H
Unchecked Input for Loop Condition

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Incorrect Calculation of Buffer Size

<0:6.1.56-82.125.amzn2023
  • H
Race Condition

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Missing Encryption of Sensitive Data

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Improper Handling of Exceptional Conditions

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.41-63.109.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • M
Use of Uninitialized Variable

<0:6.1.91-99.172.amzn2023
  • M
Divide By Zero

<0:6.1.91-99.172.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.29-47.49.amzn2023
  • H
Improper Protection Against Physical Side Channels

<0:6.1.12-17.42.amzn2023
  • H
Use After Free

<0:6.1.15-28.43.amzn2023
  • M
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-27417

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.75-99.163.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52672

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52881

<0:6.1.72-96.166.amzn2023
  • H
Improper Protection Against Physical Side Channels

<0:6.1.59-84.139.amzn2023
  • H
Improper Resource Shutdown or Release

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Return of Stack Variable Address

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.56-82.125.amzn2023
  • M
Race Condition

<0:6.1.87-99.174.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • M
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.79-99.164.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.72-96.166.amzn2023
  • M
Improper Locking

<0:6.1.87-99.174.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • M
CVE-2024-1627

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26602

<0:6.1.79-99.164.amzn2023
  • H
Range Error

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52462

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023
  • H
Out-of-bounds Write

<0:6.1.55-75.123.amzn2023
  • M
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • M
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2024-25744

<0:6.1.72-96.166.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2024-26581

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-2193

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52433

<0:6.1.56-82.125.amzn2023
  • H
Untrusted Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-23851

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-23850

<0:6.1.79-99.164.amzn2023
  • H
Information Exposure

<0:6.1.79-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.79-99.164.amzn2023
  • H
Improper Check for Unusual or Exceptional Conditions

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
Off-by-one Error

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Deadlock

<0:6.1.59-84.139.amzn2023
  • H
Deadlock

<0:6.1.41-63.109.amzn2023
  • H
Improperly Implemented Security Check for Standard

<0:6.1.21-1.45.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Resource Exhaustion

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • H
Integer Underflow

<0:6.1.72-96.166.amzn2023
  • H
Improper Handling of Values

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Out-of-bounds Read

<0:6.1.72-96.166.amzn2023
  • H
Resource Exhaustion

<0:6.1.66-93.164.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023
  • H
Memory Leak

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.61-85.141.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.41-63.109.amzn2023
  • H
Deadlock

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Out-of-bounds Write

<0:6.1.55-75.123.amzn2023
  • H
Improper Privilege Management

<0:6.1.61-85.141.amzn2023
  • H
Out-of-bounds Write

<0:6.1.61-85.141.amzn2023
  • H
Improper Handling of Exceptional Conditions

<0:6.1.61-85.141.amzn2023
  • H
Use After Free

<0:6.1.12-17.42.amzn2023
  • H
Improper Input Validation

<0:6.1.59-84.139.amzn2023
  • H
Resource Exhaustion

<0:6.1.59-84.139.amzn2023
  • H
Buffer Overflow

<0:6.1.55-75.123.amzn2023
  • H
Integer Underflow

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Write

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Race Condition

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.49-69.116.amzn2023
  • H
Out-of-Bounds

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.41-63.109.amzn2023
  • M
Use After Free

<0:6.1.23-36.46.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.19-30.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.12-17.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.55-75.123.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.34-56.100.amzn2023
  • H
Out-of-Bounds

<0:6.1.52-71.125.amzn2023
  • H
Improper Locking

<0:6.1.52-71.125.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Resource Leak

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • M
Incorrect Calculation

<0:6.1.27-43.48.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.49-69.116.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.49-69.116.amzn2023
  • H
Out-of-bounds Read

<0:6.1.49-69.116.amzn2023
  • H
Divide By Zero

<0:6.1.49-69.116.amzn2023
  • H
Out-of-Bounds

<0:6.1.49-69.116.amzn2023
  • M
Information Exposure

<0:6.1.41-63.114.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Write

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Read

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.19-30.43.amzn2023
  • H
Sensitive Information Uncleared Before Release

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.41-63.114.amzn2023
  • H
Out-of-bounds Write

<0:6.1.41-63.114.amzn2023
  • M
Improper Zeroization of Hardware Register

<0:6.1.41-63.114.amzn2023
  • M
Out-of-bounds Read

<0:6.1.41-63.114.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Double Free

<0:6.1.38-59.109.amzn2023
  • M
Out-of-bounds Write

<0:6.1.23-36.46.amzn2023
  • H
Out-of-bounds Read

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Out-of-bounds Write

<0:6.1.34-56.100.amzn2023
  • H
Incorrect Bitwise Shift of Integer

<0:6.1.12-17.42.amzn2023
  • H
Use After Free

<0:6.1.15-28.43.amzn2023
  • M
Use After Free

<0:6.1.34-59.116.amzn2023
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:6.1.34-58.102.amzn2023
  • H
Out-of-bounds Write

<0:6.1.34-56.100.amzn2023
  • H
Reachable Assertion

<0:6.1.34-56.100.amzn2023
  • H
Double Free

<0:6.1.29-50.88.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.29-47.49.amzn2023
  • H
Improper Resource Locking

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.21-1.45.amzn2023
  • M
Out-of-bounds Write

<0:6.1.27-43.48.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Read

<0:6.1.25-37.47.amzn2023
  • H
Sensitive Information Uncleared Before Release

<0:6.1.19-30.43.amzn2023
  • H
Out-of-Bounds

<0:6.1.19-30.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.15-28.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Resource Leak

<0:6.1.10-15.42.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.23-36.46.amzn2023
  • M
Deadlock

<0:6.1.23-36.46.amzn2023
  • H
Use After Free

<0:6.1.21-1.45.amzn2023
  • H
Double Free

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.19-30.43.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.19-30.43.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.12-17.42.amzn2023
  • H
CVE-2022-27672

<0:6.1.12-17.42.amzn2023
  • H
Double Free

<0:6.1.15-28.43.amzn2023
  • H
Insecure Default Initialization of Resource

<0:6.1.15-28.43.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.10-15.42.amzn2023
  • H
Integer Underflow

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Deadlock

<0:6.1.10-15.42.amzn2023
  • H
Deadlock

<0:6.1.10-15.42.amzn2023
  • H
Improper Preservation of Permissions

<0:6.1.10-15.42.amzn2023
  • H
Arbitrary Code Injection

<0:6.1.10-15.42.amzn2023
  • H
Write-what-where Condition

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Race Condition During Access to Alternate Channel

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Out-of-Bounds

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.10-15.42.amzn2023
  • H
Missing Report of Error Condition

<0:6.1.10-15.42.amzn2023
  • H
Expected Behavior Violation

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-36946

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.10-15.42.amzn2023
  • H
Comparison Using Wrong Factors

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
Improper Locking

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Divide By Zero

<0:6.1.10-15.42.amzn2023
  • H
Incorrect Default Permissions

<0:6.1.10-15.42.amzn2023
  • H
Improper Locking

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Read

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-23960

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Release of Invalid Pointer or Reference

<0:6.1.10-15.42.amzn2023
  • H
Authentication Bypass by Primary Weakness

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Missing Initialization of Resource

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Improper Preservation of Permissions

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use of Uninitialized Resource

<0:6.1.10-15.42.amzn2023
  • H
Missing Authorization

<0:6.1.10-15.42.amzn2023
  • H
Integer Underflow

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-0002

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-0001

<0:6.1.10-15.42.amzn2023
  • H
Exposure of Resource to Wrong Sphere

<0:6.1.10-15.42.amzn2023
  • H
CVE-2021-26401

<0:6.1.10-15.42.amzn2023