kernel-libbpf-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-libbpf-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-27403

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Improper Locking

<0:6.1.119-129.201.amzn2023
  • H
CVE-2024-27414

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • H
Deadlock

<0:6.1.109-118.189.amzn2023
  • M
Buffer Overflow

<0:6.1.119-129.201.amzn2023
  • M
Use After Free

<0:6.1.115-126.197.amzn2023
  • H
CVE-2024-27435

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27047

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
Improper Neutralization of Null Byte or NUL Character

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35791

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26973

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27004

<0:6.1.90-99.173.amzn2023
  • H
Reachable Assertion

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26988

<0:6.1.90-99.173.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
Integer Underflow

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Heap-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • H
Missing Synchronization

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • H
CVE-2024-26983

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • M
CVE-2024-27017

<0:6.1.112-122.189.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.106-116.188.amzn2023
  • H
Excessive Platform Resource Consumption within a Loop

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35944

<0:6.1.87-99.174.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35910

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35897

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35896

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35872

<0:6.1.87-99.174.amzn2023
  • H
CVE-2024-26993

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27003

<0:6.1.90-99.173.amzn2023
  • H
Buffer Overflow

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-38573

<0:6.1.94-99.176.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-35927

<0:6.1.94-99.176.amzn2023
  • H
Double Free

<0:6.1.102-108.177.amzn2023
  • M
Improper Input Validation

<0:6.1.91-99.172.amzn2023
  • M
Race Condition

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35908

<0:6.1.87-99.174.amzn2023
  • H
Improper Write Handling in Limited-write Non-Volatile Memories

<0:6.1.79-99.164.amzn2023
  • H
CVE-2023-52683

<0:6.1.75-99.163.amzn2023
  • H
Double Free

<0:6.1.79-99.164.amzn2023
  • H
Out-of-bounds Read

<0:6.1.66-91.160.amzn2023
  • H
CVE-2024-35839

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
CVE-2023-52693

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52679

<0:6.1.75-99.163.amzn2023
  • H
Improper Input Validation

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Dead Code

<0:6.1.66-91.160.amzn2023
  • H
Incomplete Cleanup

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Improper Input Validation

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Improper Locking

<0:6.1.15-28.43.amzn2023
  • H
External Control of System or Configuration Setting

<0:6.1.15-28.43.amzn2023
  • H
Race Condition

<0:6.1.12-17.42.amzn2023
  • H
Memory Leak

<0:6.1.15-28.43.amzn2023
  • M
Use of Uninitialized Resource

<0:6.1.115-126.197.amzn2023
  • M
Improper Authentication

<0:6.1.115-126.197.amzn2023
  • M
Resource Leak

<0:6.1.115-126.197.amzn2023
  • M
CVE-2024-35963

<0:6.1.115-126.197.amzn2023
  • H
CVE-2024-46783

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46777

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • H
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46855

<0:6.1.111-120.187.amzn2023
  • H
Race Condition

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46745

<0:6.1.111-120.187.amzn2023
  • H
Link Following

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • M
Reachable Assertion

<0:6.1.106-116.188.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35849

<0:6.1.90-99.173.amzn2023
  • H
Incomplete Cleanup

<0:6.1.94-99.176.amzn2023
  • M
Improper Null Termination

<0:6.1.91-99.172.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.12-17.42.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.15-28.43.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46840

<0:6.1.111-120.187.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46828

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46840

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46828

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.112-122.189.amzn2023
  • M
CVE-2024-46783

<0:6.1.111-120.187.amzn2023
  • M
Improper Locking

<0:6.1.111-120.187.amzn2023
  • M
Link Following

<0:6.1.111-120.187.amzn2023
  • M
CVE-2024-46777

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • M
CVE-2024-46745

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • M
Race Condition

<0:6.1.111-120.187.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • M
Resource Injection

<0:6.1.109-118.189.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • M
CVE-2024-46711

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Improper Initialization

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Deadlock

<0:6.1.97-104.177.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • H
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • H
Information Exposure

<0:6.1.97-104.177.amzn2023
  • M
CVE-2024-35807

<0:6.1.79-99.167.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • H
Double Free

<0:6.1.97-104.177.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • M
Memory Leak

<0:6.1.106-116.188.amzn2023
  • M
Out-of-bounds Write

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35827

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35826

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35823

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35815

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35800

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35804

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-35847

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-35925

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35861

<0:6.1.87-99.174.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35888

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-27431

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27415

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27404

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27413

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-35840

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52675

<0:6.1.75-99.163.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.106-116.188.amzn2023
  • M
Out-of-Bounds

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Allocation of Resources Without Limits or Throttling

<0:6.1.106-116.188.amzn2023
  • H
Improper Handling of Length Parameter Inconsistency

<0:6.1.102-108.177.amzn2023
  • H
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35805

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27038

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Resource Leak

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27395

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • H
Deadlock

<0:6.1.90-99.173.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • H
CVE-2023-52656

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • H
Resource Leak

<0:6.1.90-99.173.amzn2023
  • H
Use After Free

<0:6.1.94-99.176.amzn2023
  • H
Use After Free

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.102-108.177.amzn2023
  • H
Resource Injection

<0:6.1.102-108.177.amzn2023
  • H
Out-of-bounds Read

<0:6.1.102-108.177.amzn2023
  • M
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • M
Information Exposure

<0:6.1.97-104.177.amzn2023
  • M
Deadlock

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Use After Free

<0:6.1.97-104.177.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
CVE-2024-27393

<0:6.1.87-99.174.amzn2023
  • M
Buffer Underflow

<0:6.1.87-99.174.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26849

<0:6.1.82-99.168.amzn2023
  • M
Data Element containing Pointer Item without Proper Copy Control Element

<0:6.1.82-99.168.amzn2023
  • M
Resource Leak

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27023

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26805

<0:6.1.82-99.168.amzn2023
  • M
Missing Initialization of Resource

<0:6.1.82-99.168.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
Divide By Zero

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26803

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Undefined Parameters

<0:6.1.82-99.168.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26764

<0:6.1.82-99.168.amzn2023
  • M
Resource Exhaustion

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26804

<0:6.1.82-99.168.amzn2023
  • M
Improper Resource Locking

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Use After Free

<0:6.1.82-99.168.amzn2023
  • M
Out-of-Bounds

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Integer Underflow

<0:6.1.79-99.164.amzn2023
  • H
Unchecked Input for Loop Condition

<0:6.1.79-99.164.amzn2023
  • H
Resource Leak

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Write-what-where Condition

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26707

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26920

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
Divide By Zero

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Incorrect Calculation of Buffer Size

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52654

<0:6.1.72-96.166.amzn2023
  • H
CVE-2024-26958

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27389

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26950

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26977

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26960

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26964

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26976

<0:6.1.84-99.169.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27016

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26935

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27018

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27390

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27025

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27065

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26992

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26989

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26951

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26946

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26938

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-27015

<0:6.1.90-99.173.amzn2023
  • H
Double Free

<0:6.1.94-99.176.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Out-of-bounds Write

<0:6.1.94-99.176.amzn2023
  • H
Out-of-bounds Read

<0:6.1.94-99.176.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • H
Improper Initialization

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • H
Memory Leak

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.15-28.43.amzn2023
  • M
Use After Free

<0:6.1.94-99.176.amzn2023
  • M
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Untrusted Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Double Free

<0:6.1.91-99.172.amzn2023
  • M
Resource Injection

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Improper Initialization

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Write

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35947

<0:6.1.91-99.172.amzn2023
  • M
Use After Free

<0:6.1.91-99.172.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.90-99.173.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • M
Resource Injection

<0:6.1.84-99.169.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.75-99.163.amzn2023
  • H
Missing Lock Check

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.75-99.163.amzn2023
  • H
Resource Leak

<0:6.1.75-99.163.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.77-99.164.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Improper Input Validation

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.59-84.139.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.59-84.139.amzn2023
  • H
Incorrect Calculation of Buffer Size

<0:6.1.56-82.125.amzn2023
  • H
Unchecked Input for Loop Condition

<0:6.1.56-82.125.amzn2023
  • H
Race Condition

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Improper Handling of Exceptional Conditions

<0:6.1.56-82.125.amzn2023
  • H
Missing Encryption of Sensitive Data

<0:6.1.56-82.125.amzn2023
  • H
Memory Leak

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.41-63.109.amzn2023
  • M
Use of Uninitialized Variable

<0:6.1.91-99.172.amzn2023
  • M
Divide By Zero

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.29-47.49.amzn2023
  • H
Improper Protection Against Physical Side Channels

<0:6.1.12-17.42.amzn2023
  • H
Use After Free

<0:6.1.15-28.43.amzn2023
  • M
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-27417

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • H
CVE-2023-52698

<0:6.1.75-99.163.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52672

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52881

<0:6.1.72-96.166.amzn2023
  • H
Improper Protection Against Physical Side Channels

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.59-84.139.amzn2023
  • H
Improper Resource Shutdown or Release

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.56-82.125.amzn2023
  • H
Return of Stack Variable Address

<0:6.1.56-82.125.amzn2023
  • M
Race Condition

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-26782

<0:6.1.82-99.168.amzn2023
  • M
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.79-99.164.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.72-96.166.amzn2023
  • M
Improper Locking

<0:6.1.87-99.174.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • M
CVE-2024-1627

<0:6.1.82-99.168.amzn2023
  • H
Range Error

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26602

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52462

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023
  • H
Out-of-bounds Write

<0:6.1.55-75.123.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • M
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2024-25744

<0:6.1.72-96.166.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2024-26581

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-2193

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52433

<0:6.1.56-82.125.amzn2023
  • H
Untrusted Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
CVE-2024-23851

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-23850

<0:6.1.79-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.79-99.164.amzn2023
  • H
Information Exposure

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
Improper Check for Unusual or Exceptional Conditions

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
Off-by-one Error

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
Deadlock

<0:6.1.59-84.139.amzn2023
  • H
Integer Underflow

<0:6.1.72-96.166.amzn2023
  • H
Improper Handling of Values

<0:6.1.66-91.160.amzn2023
  • H
Deadlock

<0:6.1.41-63.109.amzn2023
  • H
Improperly Implemented Security Check for Standard

<0:6.1.21-1.45.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Resource Exhaustion

<0:6.1.10-15.42.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023
  • H
Resource Exhaustion

<0:6.1.66-93.164.amzn2023
  • H
Out-of-bounds Read

<0:6.1.72-96.166.amzn2023
  • H
Memory Leak

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.61-85.141.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.41-63.109.amzn2023
  • H
Deadlock

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Out-of-bounds Write

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Write

<0:6.1.61-85.141.amzn2023
  • H
Improper Privilege Management

<0:6.1.61-85.141.amzn2023
  • H
Improper Handling of Exceptional Conditions

<0:6.1.61-85.141.amzn2023
  • H
Use After Free

<0:6.1.12-17.42.amzn2023
  • H
Improper Input Validation

<0:6.1.59-84.139.amzn2023
  • H
Resource Exhaustion

<0:6.1.59-84.139.amzn2023
  • H
Buffer Overflow

<0:6.1.55-75.123.amzn2023
  • H
Integer Underflow

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Write

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Race Condition

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.49-69.116.amzn2023
  • H
Out-of-Bounds

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.41-63.109.amzn2023
  • M
Use After Free

<0:6.1.23-36.46.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.19-30.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.12-17.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.55-75.123.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.34-56.100.amzn2023
  • H
Out-of-Bounds

<0:6.1.52-71.125.amzn2023
  • H
Improper Locking

<0:6.1.52-71.125.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Resource Leak

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • M
Incorrect Calculation

<0:6.1.27-43.48.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.49-69.116.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.49-69.116.amzn2023
  • H
Out-of-bounds Read

<0:6.1.49-69.116.amzn2023
  • H
Divide By Zero

<0:6.1.49-69.116.amzn2023
  • H
Out-of-Bounds

<0:6.1.49-69.116.amzn2023
  • M
Information Exposure

<0:6.1.41-63.114.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Write

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Read

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.19-30.43.amzn2023
  • H
Sensitive Information Uncleared Before Release

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.41-63.114.amzn2023
  • H
Out-of-bounds Write

<0:6.1.41-63.114.amzn2023
  • M
Improper Zeroization of Hardware Register

<0:6.1.41-63.114.amzn2023
  • M
Out-of-bounds Read

<0:6.1.41-63.114.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Double Free

<0:6.1.38-59.109.amzn2023
  • M
Out-of-bounds Write

<0:6.1.23-36.46.amzn2023
  • H
Out-of-bounds Read

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Out-of-bounds Write

<0:6.1.34-56.100.amzn2023
  • H
Incorrect Bitwise Shift of Integer

<0:6.1.12-17.42.amzn2023
  • H
Use After Free

<0:6.1.15-28.43.amzn2023
  • M
Use After Free

<0:6.1.34-59.116.amzn2023
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:6.1.34-58.102.amzn2023
  • H
Out-of-bounds Write

<0:6.1.34-56.100.amzn2023
  • H
Reachable Assertion

<0:6.1.34-56.100.amzn2023
  • H
Double Free

<0:6.1.29-50.88.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.29-47.49.amzn2023
  • H
Improper Resource Locking

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.21-1.45.amzn2023
  • M
Out-of-bounds Write

<0:6.1.27-43.48.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Read

<0:6.1.25-37.47.amzn2023
  • H
Sensitive Information Uncleared Before Release

<0:6.1.19-30.43.amzn2023
  • H
Out-of-Bounds

<0:6.1.19-30.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.15-28.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Resource Leak

<0:6.1.10-15.42.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.23-36.46.amzn2023
  • M
Deadlock

<0:6.1.23-36.46.amzn2023
  • H
Use After Free

<0:6.1.21-1.45.amzn2023
  • H
Double Free

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.19-30.43.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.19-30.43.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.12-17.42.amzn2023
  • H
CVE-2022-27672

<0:6.1.12-17.42.amzn2023
  • H
Double Free

<0:6.1.15-28.43.amzn2023
  • H
Insecure Default Initialization of Resource

<0:6.1.15-28.43.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.10-15.42.amzn2023
  • H
Integer Underflow

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Deadlock

<0:6.1.10-15.42.amzn2023
  • H
Deadlock

<0:6.1.10-15.42.amzn2023
  • H
Improper Preservation of Permissions

<0:6.1.10-15.42.amzn2023
  • H
Arbitrary Code Injection

<0:6.1.10-15.42.amzn2023
  • H
Write-what-where Condition

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Race Condition During Access to Alternate Channel

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Out-of-Bounds

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.10-15.42.amzn2023
  • H
Missing Report of Error Condition

<0:6.1.10-15.42.amzn2023
  • H
Expected Behavior Violation

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-36946

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.10-15.42.amzn2023
  • H
Comparison Using Wrong Factors

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
Improper Locking

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Divide By Zero

<0:6.1.10-15.42.amzn2023
  • H
Incorrect Default Permissions

<0:6.1.10-15.42.amzn2023
  • H
Improper Locking

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Read

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-23960

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Release of Invalid Pointer or Reference

<0:6.1.10-15.42.amzn2023
  • H
Authentication Bypass by Primary Weakness

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Missing Initialization of Resource

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Improper Preservation of Permissions

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use of Uninitialized Resource

<0:6.1.10-15.42.amzn2023
  • H
Missing Authorization

<0:6.1.10-15.42.amzn2023
  • H
Integer Underflow

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-0002

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-0001

<0:6.1.10-15.42.amzn2023
  • H
Exposure of Resource to Wrong Sphere

<0:6.1.10-15.42.amzn2023
  • H
CVE-2021-26401

<0:6.1.10-15.42.amzn2023