CVE-2024-35835 | |
Memory Leak | |
Use After Free | |
Double Free | |
Resource Injection | |
Improper Write Handling in Limited-write Non-Volatile Memories | |
Resource Injection | |
CVE-2024-27413 | |
CVE-2023-52691 | |
CVE-2023-52675 | |
Improper Cross-boundary Removal of Sensitive Data | |
Memory Leak | |
CVE-2024-26920 | |
Improper Input Validation | |
Race Condition | |
Improper Input Validation | |
Resource Injection | |
Resource Injection | |
Race Condition | |
Improper Handling of Values | |
Double Free | |
Resource Leak | |
CVE-2024-26805 | |
Improper Handling of Values | |
Improper Handling of Length Parameter Inconsistency | |
Divide By Zero | |
Use After Free | |
CVE-2024-26764 | |
Improper Resource Locking | |
Improper Input Validation | |
Deadlock | |
NULL Pointer Dereference | |
Resource Leak | |
Resource Injection | |
Improper Input Validation | |
Race Condition | |
Improper Input Validation | |
NULL Pointer Dereference | |
Improper Resource Locking | |
Improper Input Validation | |
Stack-based Buffer Overflow | |
Information Exposure | |
Deadlock | |
Resource Injection | |
Missing Initialization of a Variable | |
Resource Exhaustion | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Handling of Values | |
Buffer Access with Incorrect Length Value | |
Deadlock | |
CVE-2023-52698 | |
Use After Free | |
Use After Free | |