python-perf vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python-perf package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Out-of-bounds Write

<0:4.14.352-267.564.amzn2
  • M
NULL Pointer Dereference

<0:4.14.352-267.564.amzn2
  • M
Race Condition

<0:4.14.336-257.566.amzn2
  • H
CVE-2024-35930

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35910

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35944

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-26973

<0:4.14.345-262.561.amzn2
  • H
Improper Locking

<0:4.14.345-262.561.amzn2
  • H
Missing Synchronization

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-26993

<0:4.14.348-265.562.amzn2
  • M
Memory Leak

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Improper Write Handling in Limited-write Non-Volatile Memories

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-35835

<0:4.14.343-259.562.amzn2
  • M
Double Free

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • H
Resource Injection

<0:4.14.334-252.552.amzn2
  • H
NULL Pointer Dereference

<0:4.14.334-252.552.amzn2
  • M
Out-of-Bounds

<0:4.14.330-250.540.amzn2
  • M
Buffer Overflow

<0:4.14.330-250.540.amzn2
  • M
Improper Input Validation

<0:4.14.330-250.540.amzn2
  • H
Buffer Underflow

<0:4.14.309-231.529.amzn2
  • H
External Control of System or Configuration Setting

<0:4.14.309-231.529.amzn2
  • H
NULL Pointer Dereference

<0:4.14.273-207.502.amzn2
  • H
Out-of-bounds Read

<0:4.14.273-207.502.amzn2
  • H
Resource Injection

<0:4.14.268-205.500.amzn2
  • H
State Issues

<0:4.14.268-205.500.amzn2
  • H
Incorrect Default Permissions

<0:4.14.268-205.500.amzn2
  • H
Trust Boundary Violation

<0:4.14.262-200.489.amzn2
  • H
Out-of-bounds Write

<0:4.14.252-195.481.amzn2
  • H
CVE-2021-47387

<0:4.14.252-195.481.amzn2
  • H
Resource Leak

<0:4.14.252-195.481.amzn2
  • H
Unsynchronized Access to Shared Data in a Multithreaded Context

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Out-of-bounds Read

<0:4.14.238-182.421.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46840

<0:4.14.355-271.569.amzn2
  • M
Improper Locking

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Improper Input Validation

<0:4.14.352-267.564.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46745

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Link Following

<0:4.14.355-271.569.amzn2
  • M
Out-of-bounds Read

<0:4.14.355-271.569.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Race Condition

<0:4.14.352-267.564.amzn2
  • M
CVE-2024-46780

<0:4.14.355-271.569.amzn2
  • M
Improper Locking

<0:4.14.355-271.569.amzn2
  • M
NULL Pointer Dereference

<0:4.14.352-268.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • H
Incomplete Cleanup

<0:4.14.349-266.564.amzn2
  • M
Race Condition

<0:4.14.350-266.564.amzn2
  • M
Race Condition During Access to Alternate Channel

<0:4.14.350-266.564.amzn2
  • H
CVE-2024-35960

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-35849

<0:4.14.348-265.562.amzn2
  • H
Improper Validation of Array Index

<0:4.14.334-252.552.amzn2
  • H
Improper Validation of Array Index

<0:4.14.334-252.552.amzn2
  • H
Improper Validation of Array Index

<0:4.14.262-200.489.amzn2
  • H
Out-of-bounds Write

<0:4.14.238-182.421.amzn2
  • M
Resource Leak

<0:4.14.353-270.569.amzn2
  • M
Memory Leak

<0:4.14.353-270.569.amzn2
  • H
Use After Free

<0:4.14.352-268.568.amzn2
  • M
CVE-2024-35807

<0:4.14.336-257.566.amzn2
  • H
CVE-2024-35815

<0:4.14.345-262.561.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.349-266.564.amzn2
  • H
CVE-2024-35925

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35847

<0:4.14.348-265.562.amzn2
  • M
CVE-2024-27413

<0:4.14.343-259.562.amzn2
  • M
CVE-2023-52691

<0:4.14.343-259.562.amzn2
  • M
CVE-2023-52675

<0:4.14.343-259.562.amzn2
  • H
Double Free

<0:4.14.273-207.502.amzn2
  • H
Use After Free

<0:4.14.273-207.502.amzn2
  • H
Resource Leak

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • M
Information Exposure

<0:4.14.350-266.564.amzn2
  • M
Deadlock

<0:4.14.350-266.564.amzn2
  • M
Use After Free

<0:4.14.350-266.564.amzn2
  • M
Use of Uninitialized Variable

<0:4.14.350-266.564.amzn2
  • H
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35809

<0:4.14.345-262.561.amzn2
  • M
Memory Leak

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26920

<0:4.14.343-259.562.amzn2
  • H
Improper Input Validation

<0:4.14.348-265.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26805

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
Resource Leak

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Double Free

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26764

<0:4.14.343-259.562.amzn2
  • M
Divide By Zero

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Improper Resource Locking

<0:4.14.343-259.562.amzn2
  • M
Resource Leak

<0:4.14.343-259.562.amzn2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Length Parameter Inconsistency

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • H
Off-by-one Error

<0:4.14.296-222.539.amzn2
  • H
CVE-2022-48704

<0:4.14.294-220.533.amzn2
  • H
CVE-2022-48695

<0:4.14.294-220.533.amzn2
  • H
Memory Leak

<0:4.14.281-212.502.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.273-207.502.amzn2
  • H
Resource Leak

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Read

<0:4.14.268-205.500.amzn2
  • H
Integer Underflow

<0:4.14.268-205.500.amzn2
  • M
Improper Input Validation

<0:4.14.256-197.484.amzn2
  • M
NULL Pointer Dereference

<0:4.14.256-197.484.amzn2
  • M
Incorrect Synchronization

<0:4.14.256-197.484.amzn2
  • M
Excessive Platform Resource Consumption within a Loop

<0:4.14.256-197.484.amzn2
  • H
Return of Wrong Status Code

<0:4.14.345-262.561.amzn2
  • H
Improper Input Validation

<0:4.14.349-266.564.amzn2
  • H
Use After Free

<0:4.14.349-266.564.amzn2
  • H
CVE-2024-26956

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-27059

<0:4.14.345-262.561.amzn2
  • H
NULL Pointer Dereference

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-26976

<0:4.14.345-262.561.amzn2
  • H
Improper Handling of Overlap Between Protected Memory Ranges

<0:4.14.345-262.561.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.349-266.564.amzn2
  • H
Out-of-bounds Read

<0:4.14.349-266.564.amzn2
  • H
Double Free

<0:4.14.349-266.564.amzn2
  • H
Improper Locking

<0:4.14.349-266.564.amzn2
  • H
Incomplete Cleanup

<0:4.14.348-265.565.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-26981

<0:4.14.348-265.562.amzn2
  • M
Improper Resource Locking

<0:4.14.343-259.562.amzn2
  • H
Race Condition

<0:4.14.328-248.540.amzn2
  • M
Unchecked Return Value

<0:4.14.327-246.539.amzn2
  • M
Use After Free

<0:4.14.327-246.539.amzn2
  • M
Improper Input Validation

<0:4.14.327-246.539.amzn2
  • M
Out-of-bounds Write

<0:4.14.327-246.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.309-231.529.amzn2
  • H
Reachable Assertion

<0:4.14.296-222.539.amzn2
  • H
Resource Exhaustion

<0:4.14.296-222.539.amzn2
  • H
Resource Leak

<0:4.14.268-205.500.amzn2
  • H
Buffer Underflow

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Read

<0:4.14.268-205.500.amzn2
  • H
Missing Synchronization

<0:4.14.268-205.500.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.268-205.500.amzn2
  • H
Use After Free

<0:4.14.268-205.500.amzn2
  • H
Double Free

<0:4.14.262-200.489.amzn2
  • H
Out-of-bounds Write

<0:4.14.262-200.489.amzn2
  • H
Deadlock

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Divide By Zero

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Improper Update of Reference Count

<0:4.14.262-200.489.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Memory Leak

<0:4.14.238-182.421.amzn2
  • H
Improper Cleanup on Thrown Exception

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Improper Cleanup on Thrown Exception

<0:4.14.238-182.421.amzn2
  • H
CVE-2021-47055

<0:4.14.238-182.421.amzn2
  • C
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
Improper Access Control

<0:4.14.59-68.43.amzn2
  • H
Use After Free

<0:4.14.348-265.562.amzn2
  • H
Resource Injection

<0:4.14.348-265.565.amzn2
  • H
Resource Leak

<0:4.14.348-265.562.amzn2
  • M
Resource Injection

<0:4.14.345-262.561.amzn2
  • M
CVE-2024-35809

<0:4.14.345-262.561.amzn2
  • M
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.14.344-262.563.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • H
Double Free

<0:4.14.348-265.562.amzn2
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.14.345-262.561.amzn2
  • H
Out-of-bounds Read

<0:4.14.348-265.562.amzn2
  • H
Resource Leak

<0:4.14.348-265.562.amzn2
  • H
Divide By Zero

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-35947

<0:4.14.348-265.562.amzn2
  • H
NULL Pointer Dereference

<0:4.14.348-265.562.amzn2
  • H
Out-of-bounds Write

<0:4.14.348-265.562.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Resource Exhaustion

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
Information Exposure

<0:4.14.343-259.562.amzn2
  • M
Missing Initialization of a Variable

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Stack-based Buffer Overflow

<0:4.14.343-259.562.amzn2
  • H
CVE-2024-23851

<0:4.14.336-257.562.amzn2
  • H
Deadlock

<0:4.14.334-252.552.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Resource Injection

<0:4.14.348-265.562.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.276-211.499.amzn2
  • H
Improperly Implemented Security Check for Standard

<0:4.14.348-265.562.amzn2
  • H
Sensitive Information Uncleared Before Release

<0:4.14.276-211.499.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.330-250.540.amzn2
  • H
Use After Free

<0:4.14.192-147.314.amzn2
  • M
CVE-2023-52698

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
Buffer Access with Incorrect Length Value

<0:4.14.343-259.562.amzn2
  • H
CVE-2023-52881

<0:4.14.334-252.552.amzn2
  • H
NULL Pointer Dereference

<0:4.14.328-248.540.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.301-224.520.amzn2
  • H
Out-of-Bounds

<0:4.14.296-222.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Incorrect Check of Function Return Value

<0:4.14.238-182.421.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.158-129.185.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Memory Leak

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Return of Wrong Status Code

<0:4.14.238-182.421.amzn2
  • H
Out-of-bounds Read

<0:4.14.238-182.421.amzn2
  • M
Improper Input Validation

<0:4.14.232-176.381.amzn2
  • M
Unchecked Error Condition

<0:4.14.232-176.381.amzn2
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.14.219-161.340.amzn2
  • H
Out-of-bounds Write

<0:4.14.343-261.564.amzn2
  • H
Race Condition

<0:4.14.165-131.185.amzn2
  • M
CVE-2024-2193

<0:4.14.336-257.568.amzn2
  • M
CVE-2024-26602

<0:4.14.336-257.568.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Double Free

<0:4.14.238-182.421.amzn2
  • H
Deadlock

<0:4.14.238-182.421.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Resource Leak

<0:4.14.238-182.421.amzn2
  • M
NULL Pointer Dereference

<0:4.14.232-176.381.amzn2
  • M
Divide By Zero

<0:4.14.232-176.381.amzn2
  • M
NULL Pointer Dereference

<0:4.14.232-176.381.amzn2
  • H
Improper Update of Reference Count

<0:4.14.336-257.562.amzn2
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.14.336-257.562.amzn2
  • H
Off-by-one Error

<0:4.14.336-257.562.amzn2
  • H
Use After Free

<0:4.14.336-256.559.amzn2
  • H
Out-of-Bounds

<0:4.14.336-255.557.amzn2
  • M
Out-of-bounds Write

<0:4.14.305-227.531.amzn2
  • H
Out-of-bounds Write

<0:4.14.336-255.557.amzn2
  • H
Race Condition

<0:4.14.336-255.557.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Deadlock

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.299-223.520.amzn2
  • H
Race Condition

<0:4.14.299-223.520.amzn2
  • H
Resource Exhaustion

<0:4.14.281-212.502.amzn2
  • M
Use After Free

<0:4.14.276-211.499.amzn2
  • H
Out-of-bounds Read

<0:4.14.336-253.554.amzn2
  • H
Resource Exhaustion

<0:4.14.334-252.552.amzn2
  • H
Memory Leak

<0:4.14.309-231.529.amzn2
  • H
Race Condition

<0:4.14.334-252.552.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • M
Use After Free

<0:4.14.330-250.540.amzn2
  • H
Integer Underflow

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.173-137.228.amzn2
  • H
Out-of-bounds Write

<0:4.14.328-248.540.amzn2
  • H
Use After Free

<0:4.14.328-248.540.amzn2
  • M
Resource Exhaustion

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Buffer Overflow

<0:4.14.326-245.539.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.309-231.529.amzn2
  • H
Out-of-bounds Read

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
NULL Pointer Dereference

<0:4.14.322-244.536.amzn2
  • H
Out-of-Bounds

<0:4.14.322-244.536.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.326-245.539.amzn2
  • M
Divide By Zero

<0:4.14.322-244.539.amzn2
  • H
Information Exposure

<0:4.14.320-243.544.amzn2
  • H
NULL Pointer Dereference

<0:4.14.281-212.502.amzn2
  • H
Use After Free

<0:4.14.281-212.502.amzn2
  • M
Use After Free

<0:4.14.322-244.536.amzn2
  • M
Out-of-Bounds

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • M
Sensitive Information Uncleared Before Release

<0:4.14.276-211.499.amzn2
  • H
Use After Free

<0:4.14.320-243.544.amzn2
  • H
Double Free

<0:4.14.320-243.544.amzn2
  • H
Out-of-bounds Write

<0:4.14.320-243.544.amzn2
  • H
Out-of-bounds Write

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.320-242.534.amzn2
  • H
Use After Free

<0:4.14.320-242.534.amzn2
  • H
Out-of-bounds Write

<0:4.14.318-240.529.amzn2
  • H
Race Condition

<0:4.14.313-235.533.amzn2
  • H
Incorrect Bitwise Shift of Integer

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • H
Externally Controlled Reference to a Resource in Another Sphere

<0:4.14.304-226.531.amzn2
  • H
Out-of-Bounds

<0:4.14.241-184.433.amzn2
  • H
CVE-2022-20565

<0:4.14.198-152.320.amzn2
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.14.318-241.531.amzn2
  • H
Out-of-bounds Read

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Improper Resource Locking

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Comparison Using Wrong Factors

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.313-235.533.amzn2
  • H
Use After Free

<0:4.14.314-238.539.amzn2
  • M
Out-of-bounds Write

<0:4.14.314-237.533.amzn2
  • M
Use After Free

<0:4.14.314-237.533.amzn2
  • H
Execution with Unnecessary Privileges

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.313-235.533.amzn2
  • H
Sensitive Information Uncleared Before Release

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • H
Out-of-Bounds

<0:4.14.309-231.529.amzn2
  • H
NULL Pointer Dereference

<0:4.14.309-231.529.amzn2
  • H
Resource Leak

<0:4.14.304-226.531.amzn2
  • H
Incorrect Conversion between Numeric Types

<0:4.14.281-212.502.amzn2
  • H
Deadlock

<0:4.14.304-226.531.amzn2
  • H
Deadlock

<0:4.14.304-226.531.amzn2
  • H
Double Free

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Out-of-bounds Write

<0:4.14.273-207.502.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Incomplete Cleanup

<0:4.14.186-146.268.amzn2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.304-226.531.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.304-226.531.amzn2
  • H
Arbitrary Code Injection

<0:4.14.304-226.531.amzn2
  • M
Improper Locking

<0:4.14.248-189.473.amzn2
  • M
Missing Initialization of Resource

<0:4.14.248-189.473.amzn2
  • M
Use After Free

<0:4.14.248-189.473.amzn2
  • H
Access of Uninitialized Pointer

<0:4.14.299-223.520.amzn2
  • H
Out-of-bounds Write

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Race Condition

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Memory Leak

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.301-224.520.amzn2
  • H
Memory Leak

<0:4.14.301-224.520.amzn2
  • H
Use After Free

<0:4.14.299-223.520.amzn2
  • H
Information Exposure

<0:4.14.299-223.520.amzn2
  • H
Out-of-bounds Write

<0:4.14.299-223.520.amzn2
  • H
Improper Initialization

<0:4.14.296-222.539.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.296-222.539.amzn2
  • H
Improper Update of Reference Count

<0:4.14.296-222.539.amzn2
  • H
Memory Leak

<0:4.14.296-222.539.amzn2
  • H
Logging of Excessive Data

<0:4.14.296-222.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.296-222.539.amzn2
  • H
Out-of-bounds Write

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Improper Update of Reference Count

<0:4.14.294-220.533.amzn2
  • H
Improper Locking

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Incomplete Cleanup

<0:4.14.294-220.533.amzn2
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.14.294-220.533.amzn2
  • H
CVE-2022-36946

<0:4.14.294-220.533.amzn2
  • H
NULL Pointer Dereference

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.294-220.533.amzn2
  • H
Race Condition

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Privilege Dropping / Lowering Errors

<0:4.14.133-113.105.amzn2
  • H
CVE-2022-36946

<0:4.14.291-218.527.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Integer Underflow

<0:4.14.291-218.527.amzn2
  • H
NULL Pointer Dereference

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • M
Incomplete Cleanup

<0:4.14.290-217.505.amzn2
  • M
Out-of-bounds Write

<0:4.14.290-217.505.amzn2
  • M
Improper Update of Reference Count

<0:4.14.290-217.505.amzn2
  • H
Information Exposure

<0:4.14.287-215.504.amzn2
  • H
Information Exposure

<0:4.14.287-215.504.amzn2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.287-215.504.amzn2
  • H
CVE-2022-33744

<0:4.14.287-215.504.amzn2
  • H
Memory Leak

<0:4.14.287-215.504.amzn2
  • H
Use After Free

<0:4.14.287-215.504.amzn2
  • H
Use of Insufficiently Random Values

<0:4.14.285-215.501.amzn2
  • H
Buffer Overflow

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.285-215.501.amzn2
  • H
Information Exposure

<0:4.14.285-215.501.amzn2
  • H
Memory Leak

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Incorrect Default Permissions

<0:4.14.281-212.502.amzn2
  • H
Race Condition

<0:4.14.281-212.502.amzn2
  • H
Use After Free

<0:4.14.281-212.502.amzn2
  • H
NULL Pointer Dereference

<0:4.14.281-212.502.amzn2
  • H
Memory Leak

<0:4.14.281-212.502.amzn2
  • M
Double Free

<0:4.14.276-211.499.amzn2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.276-211.499.amzn2
  • M
Double Free

<0:4.14.276-211.499.amzn2
  • M
NULL Pointer Dereference

<0:4.14.276-211.499.amzn2
  • M
Use After Free

<0:4.14.276-211.499.amzn2
  • H
CVE-2022-28356

<0:4.14.275-207.503.amzn2
  • H
Heap-based Buffer Overflow

<0:4.14.275-207.503.amzn2
  • H
Buffer Overflow

<0:4.14.275-207.503.amzn2
  • H
Out-of-bounds Write

<0:4.14.273-207.502.amzn2
  • H
Missing Initialization of Resource

<0:4.14.273-207.502.amzn2
  • H
CVE-2022-23960

<0:4.14.268-205.500.amzn2
  • H
CVE-2021-26401

<0:4.14.268-205.500.amzn2
  • H
Exposure of Resource to Wrong Sphere

<0:4.14.268-205.500.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.268-205.500.amzn2
  • H
Improper Preservation of Permissions

<0:4.14.268-205.500.amzn2
  • H
NULL Pointer Dereference

<0:4.14.268-205.500.amzn2
  • H
CVE-2022-0002

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Write

<0:4.14.268-205.500.amzn2
  • H
Improper Preservation of Permissions

<0:4.14.268-205.500.amzn2
  • H
CVE-2022-0001

<0:4.14.268-205.500.amzn2
  • H
Improper Authentication

<0:4.14.268-205.500.amzn2
  • H
Improper Initialization

<0:4.14.268-205.500.amzn2
  • H
Buffer Overflow

<0:4.14.268-205.500.amzn2
  • H
Incomplete Cleanup

<0:4.14.268-205.500.amzn2
  • H
Missing Authorization

<0:4.14.262-200.489.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.262-200.489.amzn2
  • H
Incorrect Calculation of Buffer Size

<0:4.14.262-200.489.amzn2
  • H
Race Condition

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-200.489.amzn2
  • M
Incomplete Cleanup

<0:4.14.256-197.484.amzn2
  • M
Improper Validation of Integrity Check Value

<0:4.14.256-197.484.amzn2
  • M
Race Condition

<0:4.14.256-197.484.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.252-195.481.amzn2
  • H
CVE-2021-38300

<0:4.14.252-195.481.amzn2
  • H
Memory Leak

<0:4.14.252-195.481.amzn2
  • H
Memory Leak

<0:4.14.252-195.481.amzn2
  • H
Double Free

<0:4.14.252-195.481.amzn2
  • H
Race Condition

<0:4.14.252-195.481.amzn2
  • H
Improper Initialization

<0:4.14.252-195.481.amzn2
  • M
Race Condition

<0:4.14.248-189.473.amzn2
  • M
Race Condition

<0:4.14.246-187.474.amzn2
  • M
Out-of-bounds Read

<0:4.14.246-187.474.amzn2
  • M
CVE-2021-38198

<0:4.14.246-187.474.amzn2
  • M
Information Exposure

<0:4.14.246-187.474.amzn2
  • M
Missing Authorization

<0:4.14.246-187.474.amzn2
  • M
Missing Authorization

<0:4.14.246-187.474.amzn2
  • H
Out-of-Bounds

<0:4.14.243-185.433.amzn2
  • H
Missing Initialization of Resource

<0:4.14.241-184.433.amzn2
  • H
Information Exposure

<0:4.14.241-184.433.amzn2
  • H
Information Exposure

<0:4.14.241-184.433.amzn2
  • H
Buffer Overflow

<0:4.14.238-182.422.amzn2
  • H
Double Free

<0:4.14.238-182.421.amzn2
  • H
Information Exposure

<0:4.14.238-182.421.amzn2
  • H
Race Condition

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Race Condition

<0:4.14.238-182.421.amzn2
  • H
Improper Authentication

<0:4.14.238-182.421.amzn2
  • H
Improper Authentication

<0:4.14.238-182.421.amzn2
  • H
Improper Locking

<0:4.14.238-182.421.amzn2
  • M
Out-of-bounds Read

<0:4.14.232-177.418.amzn2
  • M
Incorrect Authorization

<0:4.14.232-176.381.amzn2
  • M
Out-of-bounds Read

<0:4.14.232-176.381.amzn2
  • M
Race Condition

<0:4.14.232-176.381.amzn2
  • M
Race Condition

<0:4.14.232-176.381.amzn2
  • L
ALAS2-2021-1634

<0:4.14.231-173.361.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
CVE-2021-29647

<0:4.14.231-173.360.amzn2
  • H
Race Condition

<0:4.14.231-173.360.amzn2
  • H
Arbitrary Command Injection

<0:4.14.231-173.360.amzn2
  • H
Race Condition

<0:4.14.231-173.360.amzn2
  • H
Improper Initialization

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.231-173.360.amzn2
  • H
Buffer Overflow

<0:4.14.231-173.360.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.231-173.360.amzn2
  • H
Memory Leak

<0:4.14.231-173.360.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
Off-by-one Error

<0:4.14.231-173.360.amzn2
  • H
Numeric Errors

<0:4.14.231-173.360.amzn2
  • H
Memory Leak

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-27363

<0:4.14.225-168.357.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-168.357.amzn2
  • H
Out-of-bounds Read

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-26932

<0:4.14.225-168.357.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-26930

<0:4.14.225-168.357.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Use After Free

<0:4.14.219-161.340.amzn2
  • H
Directory Traversal

<0:4.14.219-161.340.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Directory Traversal

<0:4.14.219-161.340.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.214-160.339.amzn2
  • H
Out-of-bounds Write

<0:4.14.214-160.339.amzn2
  • H
Out-of-Bounds

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
CVE-2020-8694

<0:4.14.209-160.335.amzn2
  • H
Out-of-bounds Read

<0:4.14.209-160.335.amzn2
  • H
Release of Invalid Pointer or Reference

<0:4.14.209-160.335.amzn2
  • H
Missing Authorization

<0:4.14.209-160.335.amzn2
  • H
Race Condition

<0:4.14.209-160.335.amzn2
  • H
CVE-2020-27673

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Race Condition

<0:4.14.209-160.335.amzn2
  • H
Resource Exhaustion

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
CVE-2020-24490

<0:4.14.203-156.332.amzn2
  • H
Improper Input Validation

<0:4.14.203-156.332.amzn2
  • H
Missing Initialization of Resource

<0:4.14.203-156.332.amzn2
  • H
Use After Free

<0:4.14.203-156.332.amzn2
  • H
Buffer Overflow

<0:4.14.203-156.332.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.200-155.322.amzn2
  • H
Incorrect Authorization

<0:4.14.200-155.322.amzn2
  • H
Improper Input Validation

<0:4.14.200-155.322.amzn2
  • H
Out-of-bounds Write

<0:4.14.200-155.322.amzn2
  • H
Out-of-bounds Write

<0:4.14.198-152.320.amzn2
  • H
Buffer Overflow

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Write

<0:4.14.198-152.320.amzn2
  • H
Race Condition

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Read

<0:4.14.198-152.320.amzn2
  • H
Use After Free

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Write

<0:4.14.193-149.317.amzn2
  • H
Resource Exhaustion

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Race Condition

<0:4.14.192-147.314.amzn2
  • H
Out-of-bounds Read

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Resource Exhaustion

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
NULL Pointer Dereference

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
NULL Pointer Dereference

<0:4.14.192-147.314.amzn2
  • H
CVE-2017-18232

<0:4.14.192-147.314.amzn2
  • H
Improper Locking

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10768

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10766

<0:4.14.186-146.268.amzn2
  • H
Out-of-Bounds

<0:4.14.186-146.268.amzn2
  • H
NULL Pointer Dereference

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10767

<0:4.14.186-146.268.amzn2
  • H
Information Exposure

<0:4.14.186-146.268.amzn2
  • H
Improper Input Validation

<0:4.14.186-146.268.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.177-139.253.amzn2
  • H
Use After Free

<0:4.14.177-139.253.amzn2
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.14.181-140.257.amzn2
  • H
CVE-2020-12770

<0:4.14.181-140.257.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.181-140.257.amzn2
  • H
Use After Free

<0:4.14.181-140.257.amzn2
  • H
Out-of-bounds Write

<0:4.14.181-140.257.amzn2
  • H
NULL Pointer Dereference

<0:4.14.177-139.254.amzn2
  • H
Use After Free

<0:4.14.173-137.228.amzn2
  • H
Information Exposure

<0:4.14.173-137.228.amzn2
  • H
Out-of-bounds Write

<0:4.14.173-137.228.amzn2
  • H
Memory Leak

<0:4.14.171-136.231.amzn2
  • H
Out-of-bounds Read

<0:4.14.171-136.231.amzn2
  • H
Memory Leak

<0:4.14.165-131.185.amzn2
  • H
Out-of-bounds Write

<0:4.14.165-131.185.amzn2
  • H
Improper Input Validation

<0:4.14.154-128.181.amzn2
  • M
CVE-2019-11135

<0:4.14.152-127.182.amzn2
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.14.152-127.182.amzn2
  • H
Buffer Overflow

<0:4.14.146-119.123.amzn2
  • H
Out-of-bounds Write

<0:4.14.146-119.123.amzn2
  • M
Out-of-bounds Write

<0:4.14.143-118.123.amzn2
  • M
Information Exposure

<0:4.14.143-118.123.amzn2
  • M
Information Exposure

<0:4.14.67-71.56.amzn2
  • M
Out-of-bounds Write

<0:4.14.67-71.56.amzn2
  • L
Information Exposure

<0:4.14.77-80.57.amzn2
  • L
Out-of-bounds Write

<0:4.14.55-68.37.amzn2
  • M
CVE-2019-1125

<0:4.14.133-113.112.amzn2
  • H
Improper Locking

<0:4.14.133-113.105.amzn2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.14.133-113.105.amzn2
  • C
Allocation of Resources Without Limits or Throttling

<0:4.14.123-111.109.amzn2
  • C
Integer Overflow or Wraparound

<0:4.14.123-111.109.amzn2
  • C
Resource Exhaustion

<0:4.14.123-111.109.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.121-109.96.amzn2
  • H
Out-of-bounds Write

<0:4.14.121-109.96.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.121-109.96.amzn2
  • H
CVE-2019-11884

<0:4.14.121-109.96.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.121-109.96.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.121-109.96.amzn2
  • H
Race Condition

<0:4.14.114-105.126.amzn2
  • H
CVE-2019-11091

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Numeric Errors

<0:4.14.114-103.97.amzn2
  • H
Out-of-bounds Read

<0:4.14.114-103.97.amzn2
  • H
Improper Input Validation

<0:4.14.114-103.97.amzn2
  • H
NULL Pointer Dereference

<0:4.14.106-97.85.amzn2
  • H
Memory Leak

<0:4.14.106-97.85.amzn2
  • H
CVE-2019-7222

<0:4.14.101-91.76.amzn2
  • H
Use After Free

<0:4.14.104-95.84.amzn2
  • H
Use After Free

<0:4.14.101-91.76.amzn2
  • H
Race Condition

<0:4.14.101-91.76.amzn2
  • M
Resource Exhaustion

<0:4.14.88-88.76.amzn2
  • H
Use After Free

<0:4.14.94-89.73.amzn2
  • M
Race Condition

<0:4.14.88-88.76.amzn2
  • M
NULL Pointer Dereference

<0:4.14.88-88.73.amzn2
  • M
Information Exposure

<0:4.14.88-88.73.amzn2
  • M
Information Exposure

<0:4.14.88-88.73.amzn2
  • M
Improper Input Validation

<0:4.14.77-80.57.amzn2
  • M
Race Condition

<0:4.14.77-80.57.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.15-46.13.amzn2
  • H
Information Exposure

<0:4.14.72-73.55.amzn2
  • H
Use After Free

<0:4.14.72-73.55.amzn2
  • H
Out-of-bounds Write

<0:4.14.72-73.55.amzn2
  • C
Information Exposure

<0:4.14.62-70.117.amzn2
  • C
Improper Input Validation

<0:4.14.62-70.117.amzn2
  • C
CVE-2018-3646

<0:4.14.62-70.117.amzn2
  • L
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • L
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
Information Exposure

<0:4.14.62-70.117.amzn2
  • C
Resource Exhaustion

<0:4.14.59-68.43.amzn2
  • M
Use After Free

<0:4.14.55-68.37.amzn2
  • M
Race Condition

<0:4.14.51-66.38.amzn2
  • H
CVE-2018-3693

<0:4.14.47-63.37.amzn2
  • H
Information Exposure

<0:4.14.47-63.37.amzn2
  • H
Out-of-Bounds

<0:4.14.47-63.37.amzn2
  • H
Race Condition

<0:4.14.42-61.37.amzn2
  • H
Use of Insufficiently Random Values

<0:4.14.42-61.37.amzn2
  • H
Out-of-bounds Write

<0:4.14.42-61.37.amzn2
  • H
CVE-2018-1087

<0:4.14.42-61.37.amzn2
  • H
Out-of-Bounds

<0:4.14.42-61.37.amzn2
  • H
Out-of-Bounds

<0:4.14.42-61.37.amzn2
  • H
Use After Free

<0:4.14.42-61.37.amzn2
  • H
Out-of-bounds Write

<0:4.14.33-59.34.amzn2
  • H
Race Condition

<0:4.14.33-59.34.amzn2
  • H
CVE-2018-10901

<0:4.14.33-59.34.amzn2
  • H
CVE-2017-13215

<0:4.14.33-59.34.amzn2
  • H
Use After Free

<0:4.14.33-59.34.amzn2
  • H
Out-of-bounds Write

<0:4.9.85-47.59.amzn2
  • H
Information Exposure

<0:4.9.81-44.57.amzn2
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.9.81-44.57.amzn2
  • H
Use After Free

<0:4.9.81-44.57.amzn2
  • H
Information Exposure

<0:4.9.81-44.57.amzn2
  • H
Out-of-bounds Read

<0:4.9.81-44.57.amzn2
  • H
Race Condition

<0:4.9.81-44.57.amzn2
  • C
Information Exposure

<0:4.9.76-38.79.amzn2
  • C
Information Exposure

<0:4.9.76-38.79.amzn2