perf vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the perf package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Input Validation

<0:4.14.352-267.564.amzn2
  • M
CVE-2024-46780

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Race Condition

<0:4.14.352-267.564.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
Improper Locking

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46745

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46840

<0:4.14.355-271.569.amzn2
  • M
Link Following

<0:4.14.355-271.569.amzn2
  • M
Improper Locking

<0:4.14.355-271.569.amzn2
  • M
Out-of-bounds Read

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
NULL Pointer Dereference

<0:4.14.352-268.569.amzn2
  • M
Race Condition

<0:4.14.350-266.564.amzn2
  • H
Incomplete Cleanup

<0:4.14.349-266.564.amzn2
  • M
Race Condition During Access to Alternate Channel

<0:4.14.350-266.564.amzn2
  • H
CVE-2024-35849

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-35960

<0:4.14.348-265.562.amzn2
  • H
Improper Validation of Array Index

<0:4.14.334-252.552.amzn2
  • H
Improper Validation of Array Index

<0:4.14.334-252.552.amzn2
  • H
Improper Validation of Array Index

<0:4.14.262-200.489.amzn2
  • H
Out-of-bounds Write

<0:4.14.238-182.421.amzn2
  • M
Memory Leak

<0:4.14.353-270.569.amzn2
  • M
Resource Leak

<0:4.14.353-270.569.amzn2
  • H
Use After Free

<0:4.14.352-268.568.amzn2
  • M
CVE-2024-35807

<0:4.14.336-257.566.amzn2
  • H
CVE-2024-35815

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35925

<0:4.14.345-262.561.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.349-266.564.amzn2
  • H
CVE-2024-35847

<0:4.14.348-265.562.amzn2
  • M
CVE-2023-52691

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-27413

<0:4.14.343-259.562.amzn2
  • M
CVE-2023-52675

<0:4.14.343-259.562.amzn2
  • H
Double Free

<0:4.14.273-207.502.amzn2
  • H
Use After Free

<0:4.14.273-207.502.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Resource Leak

<0:4.14.238-182.421.amzn2
  • M
Information Exposure

<0:4.14.350-266.564.amzn2
  • M
Use After Free

<0:4.14.350-266.564.amzn2
  • M
Use of Uninitialized Variable

<0:4.14.350-266.564.amzn2
  • M
Deadlock

<0:4.14.350-266.564.amzn2
  • H
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35809

<0:4.14.345-262.561.amzn2
  • H
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.14.345-262.561.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Memory Leak

<0:4.14.343-259.562.amzn2
  • H
Improper Input Validation

<0:4.14.348-265.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26805

<0:4.14.343-259.562.amzn2
  • M
Double Free

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Resource Leak

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26920

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Length Parameter Inconsistency

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26764

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
Improper Resource Locking

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Resource Leak

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
Divide By Zero

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • H
Off-by-one Error

<0:4.14.296-222.539.amzn2
  • H
CVE-2022-48695

<0:4.14.294-220.533.amzn2
  • H
CVE-2022-48704

<0:4.14.294-220.533.amzn2
  • H
Memory Leak

<0:4.14.281-212.502.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.273-207.502.amzn2
  • H
Out-of-bounds Read

<0:4.14.268-205.500.amzn2
  • H
Integer Underflow

<0:4.14.268-205.500.amzn2
  • H
Resource Leak

<0:4.14.268-205.500.amzn2
  • M
Improper Input Validation

<0:4.14.256-197.484.amzn2
  • M
Incorrect Synchronization

<0:4.14.256-197.484.amzn2
  • M
Excessive Platform Resource Consumption within a Loop

<0:4.14.256-197.484.amzn2
  • M
NULL Pointer Dereference

<0:4.14.256-197.484.amzn2
  • H
NULL Pointer Dereference

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-26976

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-27059

<0:4.14.345-262.561.amzn2
  • H
Return of Wrong Status Code

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-26956

<0:4.14.345-262.561.amzn2
  • H
Improper Handling of Overlap Between Protected Memory Ranges

<0:4.14.345-262.561.amzn2
  • H
Double Free

<0:4.14.349-266.564.amzn2
  • H
Out-of-bounds Read

<0:4.14.349-266.564.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.349-266.564.amzn2
  • H
Improper Locking

<0:4.14.349-266.564.amzn2
  • H
Improper Input Validation

<0:4.14.349-266.564.amzn2
  • H
Use After Free

<0:4.14.349-266.564.amzn2
  • H
Incomplete Cleanup

<0:4.14.348-265.565.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-26981

<0:4.14.348-265.562.amzn2
  • M
Improper Resource Locking

<0:4.14.343-259.562.amzn2
  • M
Out-of-bounds Write

<0:4.14.327-246.539.amzn2
  • H
Race Condition

<0:4.14.328-248.540.amzn2
  • M
Improper Input Validation

<0:4.14.327-246.539.amzn2
  • M
Unchecked Return Value

<0:4.14.327-246.539.amzn2
  • M
Use After Free

<0:4.14.327-246.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.309-231.529.amzn2
  • H
Resource Exhaustion

<0:4.14.296-222.539.amzn2
  • H
Reachable Assertion

<0:4.14.296-222.539.amzn2
  • H
Missing Synchronization

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Read

<0:4.14.268-205.500.amzn2
  • H
Use After Free

<0:4.14.268-205.500.amzn2
  • H
Buffer Underflow

<0:4.14.268-205.500.amzn2
  • H
Resource Leak

<0:4.14.268-205.500.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Write

<0:4.14.262-200.489.amzn2
  • H
Deadlock

<0:4.14.262-200.489.amzn2
  • H
Improper Update of Reference Count

<0:4.14.262-200.489.amzn2
  • H
Divide By Zero

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Double Free

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Improper Cleanup on Thrown Exception

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
CVE-2021-47055

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Improper Cleanup on Thrown Exception

<0:4.14.238-182.421.amzn2
  • H
Memory Leak

<0:4.14.238-182.421.amzn2
  • C
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
Improper Access Control

<0:4.14.59-68.43.amzn2
  • M
CVE-2024-35809

<0:4.14.345-262.561.amzn2
  • H
Divide By Zero

<0:4.14.348-265.562.amzn2
  • H
Resource Injection

<0:4.14.348-265.565.amzn2
  • H
CVE-2024-35947

<0:4.14.348-265.562.amzn2
  • H
Resource Leak

<0:4.14.348-265.562.amzn2
  • M
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Resource Leak

<0:4.14.348-265.562.amzn2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.14.344-262.563.amzn2
  • H
NULL Pointer Dereference

<0:4.14.348-265.562.amzn2
  • M
Resource Injection

<0:4.14.345-262.561.amzn2
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.14.345-262.561.amzn2
  • H
Double Free

<0:4.14.348-265.562.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • H
Use After Free

<0:4.14.348-265.562.amzn2
  • H
Out-of-bounds Write

<0:4.14.348-265.562.amzn2
  • H
Out-of-bounds Read

<0:4.14.348-265.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Stack-based Buffer Overflow

<0:4.14.343-259.562.amzn2
  • M
Missing Initialization of a Variable

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Information Exposure

<0:4.14.343-259.562.amzn2
  • M
Resource Exhaustion

<0:4.14.343-259.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • H
CVE-2024-23851

<0:4.14.336-257.562.amzn2
  • H
Deadlock

<0:4.14.334-252.552.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Resource Injection

<0:4.14.348-265.562.amzn2
  • H
Sensitive Information Uncleared Before Release

<0:4.14.276-211.499.amzn2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.276-211.499.amzn2
  • H
Improperly Implemented Security Check for Standard

<0:4.14.348-265.562.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.330-250.540.amzn2
  • H
Use After Free

<0:4.14.192-147.314.amzn2
  • M
CVE-2023-52698

<0:4.14.343-259.562.amzn2
  • M
Buffer Access with Incorrect Length Value

<0:4.14.343-259.562.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • H
CVE-2023-52881

<0:4.14.334-252.552.amzn2
  • H
NULL Pointer Dereference

<0:4.14.328-248.540.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.301-224.520.amzn2
  • H
Out-of-Bounds

<0:4.14.296-222.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Incorrect Check of Function Return Value

<0:4.14.238-182.421.amzn2
  • M
Use After Free

<0:4.14.158-129.185.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Memory Leak

<0:4.14.238-182.421.amzn2
  • H
Out-of-bounds Read

<0:4.14.238-182.421.amzn2
  • H
Return of Wrong Status Code

<0:4.14.238-182.421.amzn2
  • M
Improper Input Validation

<0:4.14.232-176.381.amzn2
  • M
Unchecked Error Condition

<0:4.14.232-176.381.amzn2
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.14.219-161.340.amzn2
  • H
Out-of-bounds Write

<0:4.14.343-261.564.amzn2
  • H
Race Condition

<0:4.14.165-131.185.amzn2
  • M
CVE-2024-26602

<0:4.14.336-257.568.amzn2
  • M
CVE-2024-2193

<0:4.14.336-257.568.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Deadlock

<0:4.14.238-182.421.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Double Free

<0:4.14.238-182.421.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Resource Leak

<0:4.14.238-182.421.amzn2
  • M
Divide By Zero

<0:4.14.232-176.381.amzn2
  • M
NULL Pointer Dereference

<0:4.14.232-176.381.amzn2
  • M
NULL Pointer Dereference

<0:4.14.232-176.381.amzn2
  • H
Off-by-one Error

<0:4.14.336-257.562.amzn2
  • H
Improper Update of Reference Count

<0:4.14.336-257.562.amzn2
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.14.336-257.562.amzn2
  • H
Use After Free

<0:4.14.336-256.559.amzn2
  • M
Out-of-bounds Write

<0:4.14.305-227.531.amzn2
  • H
Race Condition

<0:4.14.336-255.557.amzn2
  • H
Out-of-bounds Write

<0:4.14.336-255.557.amzn2
  • H
Out-of-Bounds

<0:4.14.336-255.557.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Deadlock

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.299-223.520.amzn2
  • H
Race Condition

<0:4.14.299-223.520.amzn2
  • M
Use After Free

<0:4.14.276-211.499.amzn2
  • H
Resource Exhaustion

<0:4.14.281-212.502.amzn2
  • H
Out-of-bounds Read

<0:4.14.336-253.554.amzn2
  • H
Resource Exhaustion

<0:4.14.334-252.552.amzn2
  • H
Memory Leak

<0:4.14.309-231.529.amzn2
  • H
Race Condition

<0:4.14.334-252.552.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • M
Use After Free

<0:4.14.330-250.540.amzn2
  • H
Integer Underflow

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.173-137.228.amzn2
  • H
Use After Free

<0:4.14.328-248.540.amzn2
  • H
Out-of-bounds Write

<0:4.14.328-248.540.amzn2
  • M
Resource Exhaustion

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Buffer Overflow

<0:4.14.326-245.539.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.309-231.529.amzn2
  • H
Out-of-bounds Read

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
NULL Pointer Dereference

<0:4.14.322-244.536.amzn2
  • H
Out-of-Bounds

<0:4.14.322-244.536.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.326-245.539.amzn2
  • M
Divide By Zero

<0:4.14.322-244.539.amzn2
  • H
Information Exposure

<0:4.14.320-243.544.amzn2
  • H
NULL Pointer Dereference

<0:4.14.281-212.502.amzn2
  • H
Use After Free

<0:4.14.281-212.502.amzn2
  • M
Use After Free

<0:4.14.322-244.536.amzn2
  • M
Out-of-Bounds

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • M
Sensitive Information Uncleared Before Release

<0:4.14.276-211.499.amzn2
  • H
Use After Free

<0:4.14.320-243.544.amzn2
  • H
Double Free

<0:4.14.320-243.544.amzn2
  • H
Out-of-bounds Write

<0:4.14.320-243.544.amzn2
  • H
Out-of-bounds Write

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.320-242.534.amzn2
  • H
Use After Free

<0:4.14.320-242.534.amzn2
  • H
Out-of-bounds Write

<0:4.14.318-240.529.amzn2
  • H
Race Condition

<0:4.14.313-235.533.amzn2
  • H
Incorrect Bitwise Shift of Integer

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • H
Externally Controlled Reference to a Resource in Another Sphere

<0:4.14.304-226.531.amzn2
  • H
Out-of-Bounds

<0:4.14.241-184.433.amzn2
  • H
CVE-2022-20565

<0:4.14.198-152.320.amzn2
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.14.318-241.531.amzn2
  • H
Out-of-bounds Read

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Improper Resource Locking

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Comparison Using Wrong Factors

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.313-235.533.amzn2
  • H
Use After Free

<0:4.14.314-238.539.amzn2
  • M
Out-of-bounds Write

<0:4.14.314-237.533.amzn2
  • M
Use After Free

<0:4.14.314-237.533.amzn2
  • H
Execution with Unnecessary Privileges

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.313-235.533.amzn2
  • H
Sensitive Information Uncleared Before Release

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • H
Out-of-Bounds

<0:4.14.309-231.529.amzn2
  • H
NULL Pointer Dereference

<0:4.14.309-231.529.amzn2
  • H
Resource Leak

<0:4.14.304-226.531.amzn2
  • H
Incorrect Conversion between Numeric Types

<0:4.14.281-212.502.amzn2
  • H
Deadlock

<0:4.14.304-226.531.amzn2
  • H
Deadlock

<0:4.14.304-226.531.amzn2
  • H
Double Free

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Out-of-bounds Write

<0:4.14.273-207.502.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Incomplete Cleanup

<0:4.14.186-146.268.amzn2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.304-226.531.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.304-226.531.amzn2
  • H
Arbitrary Code Injection

<0:4.14.304-226.531.amzn2
  • M
Improper Locking

<0:4.14.248-189.473.amzn2
  • M
Missing Initialization of Resource

<0:4.14.248-189.473.amzn2
  • M
Use After Free

<0:4.14.248-189.473.amzn2
  • H
Access of Uninitialized Pointer

<0:4.14.299-223.520.amzn2
  • H
Out-of-bounds Write

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Race Condition

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Memory Leak

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.301-224.520.amzn2
  • H
Memory Leak

<0:4.14.301-224.520.amzn2
  • H
Use After Free

<0:4.14.299-223.520.amzn2
  • H
Information Exposure

<0:4.14.299-223.520.amzn2
  • H
Out-of-bounds Write

<0:4.14.299-223.520.amzn2
  • H
Improper Initialization

<0:4.14.296-222.539.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.296-222.539.amzn2
  • H
Improper Update of Reference Count

<0:4.14.296-222.539.amzn2
  • H
Memory Leak

<0:4.14.296-222.539.amzn2
  • H
Logging of Excessive Data

<0:4.14.296-222.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.296-222.539.amzn2
  • H
Out-of-bounds Write

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Improper Update of Reference Count

<0:4.14.294-220.533.amzn2
  • H
Improper Locking

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Incomplete Cleanup

<0:4.14.294-220.533.amzn2
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.14.294-220.533.amzn2
  • H
CVE-2022-36946

<0:4.14.294-220.533.amzn2
  • H
NULL Pointer Dereference

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.294-220.533.amzn2
  • H
Race Condition

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Privilege Dropping / Lowering Errors

<0:4.14.133-113.105.amzn2
  • H
CVE-2022-36946

<0:4.14.291-218.527.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Integer Underflow

<0:4.14.291-218.527.amzn2
  • H
NULL Pointer Dereference

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • M
Incomplete Cleanup

<0:4.14.290-217.505.amzn2
  • M
Out-of-bounds Write

<0:4.14.290-217.505.amzn2
  • M
Improper Update of Reference Count

<0:4.14.290-217.505.amzn2
  • H
Information Exposure

<0:4.14.287-215.504.amzn2
  • H
Information Exposure

<0:4.14.287-215.504.amzn2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.287-215.504.amzn2
  • H
CVE-2022-33744

<0:4.14.287-215.504.amzn2
  • H
Memory Leak

<0:4.14.287-215.504.amzn2
  • H
Use After Free

<0:4.14.287-215.504.amzn2
  • H
Use of Insufficiently Random Values

<0:4.14.285-215.501.amzn2
  • H
Buffer Overflow

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.285-215.501.amzn2
  • H
Information Exposure

<0:4.14.285-215.501.amzn2
  • H
Memory Leak

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Incorrect Default Permissions

<0:4.14.281-212.502.amzn2
  • H
Race Condition

<0:4.14.281-212.502.amzn2
  • H
Use After Free

<0:4.14.281-212.502.amzn2
  • H
NULL Pointer Dereference

<0:4.14.281-212.502.amzn2
  • H
Memory Leak

<0:4.14.281-212.502.amzn2
  • M
Double Free

<0:4.14.276-211.499.amzn2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.276-211.499.amzn2
  • M
Double Free

<0:4.14.276-211.499.amzn2
  • M
NULL Pointer Dereference

<0:4.14.276-211.499.amzn2
  • M
Use After Free

<0:4.14.276-211.499.amzn2
  • H
CVE-2022-28356

<0:4.14.275-207.503.amzn2
  • H
Heap-based Buffer Overflow

<0:4.14.275-207.503.amzn2
  • H
Buffer Overflow

<0:4.14.275-207.503.amzn2
  • H
Out-of-bounds Write

<0:4.14.273-207.502.amzn2
  • H
Missing Initialization of Resource

<0:4.14.273-207.502.amzn2
  • H
CVE-2022-23960

<0:4.14.268-205.500.amzn2
  • H
CVE-2021-26401

<0:4.14.268-205.500.amzn2
  • H
Exposure of Resource to Wrong Sphere

<0:4.14.268-205.500.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.268-205.500.amzn2
  • H
Improper Preservation of Permissions

<0:4.14.268-205.500.amzn2
  • H
NULL Pointer Dereference

<0:4.14.268-205.500.amzn2
  • H
CVE-2022-0002

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Write

<0:4.14.268-205.500.amzn2
  • H
Improper Preservation of Permissions

<0:4.14.268-205.500.amzn2
  • H
CVE-2022-0001

<0:4.14.268-205.500.amzn2
  • H
Improper Authentication

<0:4.14.268-205.500.amzn2
  • H
Improper Initialization

<0:4.14.268-205.500.amzn2
  • H
Buffer Overflow

<0:4.14.268-205.500.amzn2
  • H
Incomplete Cleanup

<0:4.14.268-205.500.amzn2
  • H
Missing Authorization

<0:4.14.262-200.489.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.262-200.489.amzn2
  • H
Incorrect Calculation of Buffer Size

<0:4.14.262-200.489.amzn2
  • H
Race Condition

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-200.489.amzn2
  • M
Incomplete Cleanup

<0:4.14.256-197.484.amzn2
  • M
Improper Validation of Integrity Check Value

<0:4.14.256-197.484.amzn2
  • M
Race Condition

<0:4.14.256-197.484.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.252-195.481.amzn2
  • H
CVE-2021-38300

<0:4.14.252-195.481.amzn2
  • H
Memory Leak

<0:4.14.252-195.481.amzn2
  • H
Memory Leak

<0:4.14.252-195.481.amzn2
  • H
Double Free

<0:4.14.252-195.481.amzn2
  • H
Race Condition

<0:4.14.252-195.481.amzn2
  • H
Improper Initialization

<0:4.14.252-195.481.amzn2
  • M
Race Condition

<0:4.14.248-189.473.amzn2
  • M
Race Condition

<0:4.14.246-187.474.amzn2
  • M
Out-of-bounds Read

<0:4.14.246-187.474.amzn2
  • M
CVE-2021-38198

<0:4.14.246-187.474.amzn2
  • M
Information Exposure

<0:4.14.246-187.474.amzn2
  • M
Missing Authorization

<0:4.14.246-187.474.amzn2
  • M
Missing Authorization

<0:4.14.246-187.474.amzn2
  • H
Out-of-Bounds

<0:4.14.243-185.433.amzn2
  • H
Missing Initialization of Resource

<0:4.14.241-184.433.amzn2
  • H
Information Exposure

<0:4.14.241-184.433.amzn2
  • H
Information Exposure

<0:4.14.241-184.433.amzn2
  • H
Buffer Overflow

<0:4.14.238-182.422.amzn2
  • H
Double Free

<0:4.14.238-182.421.amzn2
  • H
Information Exposure

<0:4.14.238-182.421.amzn2
  • H
Race Condition

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Race Condition

<0:4.14.238-182.421.amzn2
  • H
Improper Authentication

<0:4.14.238-182.421.amzn2
  • H
Improper Authentication

<0:4.14.238-182.421.amzn2
  • H
Improper Locking

<0:4.14.238-182.421.amzn2
  • M
Out-of-bounds Read

<0:4.14.232-177.418.amzn2
  • M
Incorrect Authorization

<0:4.14.232-176.381.amzn2
  • M
Out-of-bounds Read

<0:4.14.232-176.381.amzn2
  • M
Race Condition

<0:4.14.232-176.381.amzn2
  • M
Race Condition

<0:4.14.232-176.381.amzn2
  • L
ALAS2-2021-1634

<0:4.14.231-173.361.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
CVE-2021-29647

<0:4.14.231-173.360.amzn2
  • H
Race Condition

<0:4.14.231-173.360.amzn2
  • H
Arbitrary Command Injection

<0:4.14.231-173.360.amzn2
  • H
Race Condition

<0:4.14.231-173.360.amzn2
  • H
Improper Initialization

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.231-173.360.amzn2
  • H
Buffer Overflow

<0:4.14.231-173.360.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.231-173.360.amzn2
  • H
Memory Leak

<0:4.14.231-173.360.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
Off-by-one Error

<0:4.14.231-173.360.amzn2
  • H
Numeric Errors

<0:4.14.231-173.360.amzn2
  • H
Memory Leak

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-27363

<0:4.14.225-168.357.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-168.357.amzn2
  • H
Out-of-bounds Read

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-26932

<0:4.14.225-168.357.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-26930

<0:4.14.225-168.357.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Use After Free

<0:4.14.219-161.340.amzn2
  • H
Directory Traversal

<0:4.14.219-161.340.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Directory Traversal

<0:4.14.219-161.340.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.214-160.339.amzn2
  • H
Out-of-bounds Write

<0:4.14.214-160.339.amzn2
  • H
Out-of-Bounds

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
CVE-2020-8694

<0:4.14.209-160.335.amzn2
  • H
Out-of-bounds Read

<0:4.14.209-160.335.amzn2
  • H
Release of Invalid Pointer or Reference

<0:4.14.209-160.335.amzn2
  • H
Missing Authorization

<0:4.14.209-160.335.amzn2
  • H
Race Condition

<0:4.14.209-160.335.amzn2
  • H
CVE-2020-27673

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Race Condition

<0:4.14.209-160.335.amzn2
  • H
Resource Exhaustion

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
CVE-2020-24490

<0:4.14.203-156.332.amzn2
  • H
Improper Input Validation

<0:4.14.203-156.332.amzn2
  • H
Missing Initialization of Resource

<0:4.14.203-156.332.amzn2
  • H
Use After Free

<0:4.14.203-156.332.amzn2
  • H
Buffer Overflow

<0:4.14.203-156.332.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.200-155.322.amzn2
  • H
Incorrect Authorization

<0:4.14.200-155.322.amzn2
  • H
Improper Input Validation

<0:4.14.200-155.322.amzn2
  • H
Out-of-bounds Write

<0:4.14.200-155.322.amzn2
  • H
Out-of-bounds Write

<0:4.14.198-152.320.amzn2
  • H
Buffer Overflow

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Write

<0:4.14.198-152.320.amzn2
  • H
Race Condition

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Read

<0:4.14.198-152.320.amzn2
  • H
Use After Free

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Write

<0:4.14.193-149.317.amzn2
  • H
Resource Exhaustion

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Race Condition

<0:4.14.192-147.314.amzn2
  • H
Out-of-bounds Read

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Resource Exhaustion

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
NULL Pointer Dereference

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
NULL Pointer Dereference

<0:4.14.192-147.314.amzn2
  • H
CVE-2017-18232

<0:4.14.192-147.314.amzn2
  • H
Improper Locking

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10768

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10766

<0:4.14.186-146.268.amzn2
  • H
Out-of-Bounds

<0:4.14.186-146.268.amzn2
  • H
NULL Pointer Dereference

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10767

<0:4.14.186-146.268.amzn2
  • H
Information Exposure

<0:4.14.186-146.268.amzn2
  • H
Improper Input Validation

<0:4.14.186-146.268.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.177-139.253.amzn2
  • H
Use After Free

<0:4.14.177-139.253.amzn2
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.14.181-140.257.amzn2
  • H
CVE-2020-12770

<0:4.14.181-140.257.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.181-140.257.amzn2
  • H
Use After Free

<0:4.14.181-140.257.amzn2
  • H
Out-of-bounds Write

<0:4.14.181-140.257.amzn2
  • H
NULL Pointer Dereference

<0:4.14.177-139.254.amzn2
  • H
Use After Free

<0:4.14.173-137.228.amzn2
  • H
Information Exposure

<0:4.14.173-137.228.amzn2
  • H
Out-of-bounds Write

<0:4.14.173-137.228.amzn2
  • H
Memory Leak

<0:4.14.171-136.231.amzn2
  • H
Out-of-bounds Read

<0:4.14.171-136.231.amzn2
  • H
Memory Leak

<0:4.14.165-131.185.amzn2
  • H
Out-of-bounds Write

<0:4.14.165-131.185.amzn2
  • H
Improper Input Validation

<0:4.14.154-128.181.amzn2
  • M
CVE-2019-11135

<0:4.14.152-127.182.amzn2
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.14.152-127.182.amzn2
  • H
Buffer Overflow

<0:4.14.146-119.123.amzn2
  • H
Out-of-bounds Write

<0:4.14.146-119.123.amzn2
  • M
Out-of-bounds Write

<0:4.14.143-118.123.amzn2
  • M
Information Exposure

<0:4.14.143-118.123.amzn2
  • M
Information Exposure

<0:4.14.67-71.56.amzn2
  • M
Out-of-bounds Write

<0:4.14.67-71.56.amzn2
  • L
Information Exposure

<0:4.14.77-80.57.amzn2
  • L
Out-of-bounds Write

<0:4.14.55-68.37.amzn2
  • M
CVE-2019-1125

<0:4.14.133-113.112.amzn2
  • H
Improper Locking

<0:4.14.133-113.105.amzn2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.14.133-113.105.amzn2
  • C
Allocation of Resources Without Limits or Throttling

<0:4.14.123-111.109.amzn2
  • C
Integer Overflow or Wraparound

<0:4.14.123-111.109.amzn2
  • C
Resource Exhaustion

<0:4.14.123-111.109.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.121-109.96.amzn2
  • H
Out-of-bounds Write

<0:4.14.121-109.96.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.121-109.96.amzn2
  • H
CVE-2019-11884

<0:4.14.121-109.96.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.121-109.96.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.121-109.96.amzn2
  • H
Race Condition

<0:4.14.114-105.126.amzn2
  • H
CVE-2019-11091

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Numeric Errors

<0:4.14.114-103.97.amzn2
  • H
Out-of-bounds Read

<0:4.14.114-103.97.amzn2
  • H
Improper Input Validation

<0:4.14.114-103.97.amzn2
  • H
NULL Pointer Dereference

<0:4.14.106-97.85.amzn2
  • H
Memory Leak

<0:4.14.106-97.85.amzn2
  • H
CVE-2019-7222

<0:4.14.101-91.76.amzn2
  • H
Use After Free

<0:4.14.104-95.84.amzn2
  • H
Use After Free

<0:4.14.101-91.76.amzn2
  • H
Race Condition

<0:4.14.101-91.76.amzn2
  • M
Resource Exhaustion

<0:4.14.88-88.76.amzn2
  • H
Use After Free

<0:4.14.94-89.73.amzn2
  • M
Race Condition

<0:4.14.88-88.76.amzn2
  • M
NULL Pointer Dereference

<0:4.14.88-88.73.amzn2
  • M
Information Exposure

<0:4.14.88-88.73.amzn2
  • M
Information Exposure

<0:4.14.88-88.73.amzn2
  • M
Improper Input Validation

<0:4.14.77-80.57.amzn2
  • M
Race Condition

<0:4.14.77-80.57.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.15-46.13.amzn2
  • H
Information Exposure

<0:4.14.72-73.55.amzn2
  • H
Use After Free

<0:4.14.72-73.55.amzn2
  • H
Out-of-bounds Write

<0:4.14.72-73.55.amzn2
  • C
Information Exposure

<0:4.14.62-70.117.amzn2
  • C
Improper Input Validation

<0:4.14.62-70.117.amzn2
  • C
CVE-2018-3646

<0:4.14.62-70.117.amzn2
  • L
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • L
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
Information Exposure

<0:4.14.62-70.117.amzn2
  • C
Resource Exhaustion

<0:4.14.59-68.43.amzn2
  • M
Use After Free

<0:4.14.55-68.37.amzn2
  • M
Race Condition

<0:4.14.51-66.38.amzn2
  • H
CVE-2018-3693

<0:4.14.47-63.37.amzn2
  • H
Information Exposure

<0:4.14.47-63.37.amzn2
  • H
Out-of-Bounds

<0:4.14.47-63.37.amzn2
  • H
Race Condition

<0:4.14.42-61.37.amzn2
  • H
Use of Insufficiently Random Values

<0:4.14.42-61.37.amzn2
  • H
Out-of-bounds Write

<0:4.14.42-61.37.amzn2
  • H
CVE-2018-1087

<0:4.14.42-61.37.amzn2
  • H
Out-of-Bounds

<0:4.14.42-61.37.amzn2
  • H
Out-of-Bounds

<0:4.14.42-61.37.amzn2
  • H
Use After Free

<0:4.14.42-61.37.amzn2
  • H
Out-of-bounds Write

<0:4.14.33-59.34.amzn2
  • H
Race Condition

<0:4.14.33-59.34.amzn2
  • H
CVE-2018-10901

<0:4.14.33-59.34.amzn2
  • H
CVE-2017-13215

<0:4.14.33-59.34.amzn2
  • H
Use After Free

<0:4.14.33-59.34.amzn2
  • H
Out-of-bounds Write

<0:4.9.85-47.59.amzn2
  • H
Information Exposure

<0:4.9.81-44.57.amzn2
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.9.81-44.57.amzn2
  • H
Use After Free

<0:4.9.81-44.57.amzn2
  • H
Information Exposure

<0:4.9.81-44.57.amzn2
  • H
Out-of-bounds Read

<0:4.9.81-44.57.amzn2
  • H
Race Condition

<0:4.9.81-44.57.amzn2
  • C
Information Exposure

<0:4.9.76-38.79.amzn2
  • C
Information Exposure

<0:4.9.76-38.79.amzn2