kernel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-bounds Read

<0:4.14.238-125.421.amzn1
  • M
Race Condition

<0:4.14.350-188.564.amzn1
  • M
Race Condition During Access to Alternate Channel

<0:4.14.350-188.564.amzn1
  • H
Use After Free

<0:4.14.352-190.568.amzn1
  • H
Use of Uninitialized Resource

<0:4.14.273-140.502.amzn1
  • H
Stack-based Buffer Overflow

<0:4.14.349-188.564.amzn1
  • H
CVE-2024-26976

<0:4.14.348-187.562.amzn1
  • H
Race Condition

<0:4.14.348-187.562.amzn1
  • H
Resource Injection

<0:4.14.348-187.565.amzn1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.14.348-187.562.amzn1
  • H
Deadlock

<0:4.14.334-177.552.amzn1
  • H
Out-of-Bounds

<0:4.14.299-152.520.amzn1
  • H
Resource Injection

<0:4.14.348-187.562.amzn1
  • H
Improperly Implemented Security Check for Standard

<0:4.14.348-187.562.amzn1
  • M
NULL Pointer Dereference

<0:4.14.330-176.540.amzn1
  • H
CVE-2023-52881

<0:4.14.334-177.552.amzn1
  • H
Out-of-bounds Read

<0:4.14.301-153.528.amzn1
  • H
Out-of-bounds Read

<0:4.14.294-150.533.amzn1
  • H
Use After Free

<0:4.14.281-144.502.amzn1
  • H
Use After Free

<0:4.14.299-152.520.amzn1
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.14.219-119.340.amzn1
  • H
Use After Free

<0:4.14.193-113.317.amzn1
  • C
Improper Access Control

<0:4.14.59-64.43.amzn1
  • H
Out-of-bounds Write

<0:4.14.343-183.564.amzn1
  • H
Race Condition

<0:4.14.165-102.185.amzn1
  • M
Double Free

<0:4.14.238-125.421.amzn1
  • H
NULL Pointer Dereference

<0:4.14.328-174.540.amzn1
  • H
Use After Free

<0:4.14.305-155.531.amzn1
  • H
Use After Free

<0:4.14.281-144.502.amzn1
  • H
Use After Free

<0:4.14.326-171.539.amzn1
  • H
Information Exposure

<0:4.14.248-129.473.amzn1
  • H
Off-by-one Error

<0:4.14.336-180.562.amzn1
  • H
Improper Update of Reference Count

<0:4.14.336-180.562.amzn1
  • H
Use After Free

<0:4.14.336-179.559.amzn1
  • H
Use After Free

<0:4.14.334-177.552.amzn1
  • H
Out-of-bounds Write

<0:4.14.336-179.557.amzn1
  • H
Out-of-Bounds

<0:4.14.336-179.557.amzn1
  • H
Deadlock

<0:4.14.322-170.535.amzn1
  • H
Out-of-bounds Write

<0:4.14.305-155.531.amzn1
  • H
Out-of-bounds Read

<0:4.14.294-150.533.amzn1
  • H
Information Exposure

<0:4.14.294-150.533.amzn1
  • H
Use After Free

<0:4.14.318-166.529.amzn1
  • H
Information Exposure

<0:4.14.294-150.533.amzn1
  • H
Use After Free

<0:4.14.294-150.533.amzn1
  • H
Out-of-bounds Read

<0:4.14.336-178.554.amzn1
  • H
Resource Exhaustion

<0:4.14.334-177.552.amzn1
  • H
Memory Leak

<0:4.14.309-159.529.amzn1
  • H
Use After Free

<0:4.14.334-177.552.amzn1
  • M
Use After Free

<0:4.14.330-176.540.amzn1
  • M
Use After Free

<0:4.14.173-106.229.amzn1
  • H
Out-of-bounds Write

<0:4.14.328-174.540.amzn1
  • H
Use After Free

<0:4.14.328-174.540.amzn1
  • H
Resource Exhaustion

<0:4.14.328-174.540.amzn1
  • H
Buffer Overflow

<0:4.14.326-171.539.amzn1
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.309-159.529.amzn1
  • H
Out-of-bounds Read

<0:4.14.326-171.539.amzn1
  • H
Out-of-bounds Read

<0:4.14.326-171.539.amzn1
  • H
Integer Underflow

<0:4.14.326-171.539.amzn1
  • H
Out-of-bounds Read

<0:4.14.326-171.539.amzn1
  • H
Out-of-bounds Read

<0:4.14.326-171.539.amzn1
  • H
Information Exposure

<0:4.14.262-135.486.amzn1
  • H
Use After Free

<0:4.14.326-171.539.amzn1
  • H
Use After Free

<0:4.14.326-171.539.amzn1
  • H
Use After Free

<0:4.14.326-171.539.amzn1
  • H
Use After Free

<0:4.14.326-171.539.amzn1
  • H
NULL Pointer Dereference

<0:4.14.326-171.539.amzn1
  • H
Use After Free

<0:4.14.322-170.535.amzn1
  • H
Use After Free

<0:4.14.322-170.535.amzn1
  • H
Use After Free

<0:4.14.322-170.535.amzn1
  • H
Out-of-Bounds

<0:4.14.322-170.535.amzn1
  • H
Use After Free

<0:4.14.322-170.535.amzn1
  • H
Use After Free

<0:4.14.281-144.502.amzn1
  • H
NULL Pointer Dereference

<0:4.14.281-144.502.amzn1
  • M
Divide By Zero

<0:4.14.322-170.538.amzn1
  • M
Use After Free

<0:4.14.322-170.535.amzn1
  • M
Out-of-Bounds

<0:4.14.322-170.535.amzn1
  • H
Use After Free

<0:4.14.309-159.529.amzn1
  • H
Sensitive Information Uncleared Before Release

<0:4.14.281-144.502.amzn1
  • H
Use After Free

<0:4.14.320-169.544.amzn1
  • H
Out-of-bounds Write

<0:4.14.320-169.544.amzn1
  • H
Double Free

<0:4.14.320-169.544.amzn1
  • H
Use After Free

<0:4.14.320-168.534.amzn1
  • H
Out-of-bounds Read

<0:4.14.320-168.534.amzn1
  • H
Race Condition

<0:4.14.313-162.533.amzn1
  • H
Externally Controlled Reference to a Resource in Another Sphere

<0:4.14.305-155.531.amzn1
  • H
Use After Free

<0:4.14.309-159.529.amzn1
  • H
Out-of-Bounds

<0:4.14.248-129.473.amzn1
  • H
CVE-2022-20565

<0:4.14.200-116.320.amzn1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.14.318-167.530.amzn1
  • H
Out-of-bounds Read

<0:4.14.318-166.529.amzn1
  • H
Use After Free

<0:4.14.318-166.529.amzn1
  • H
Use After Free

<0:4.14.318-166.529.amzn1
  • H
Improper Resource Locking

<0:4.14.318-166.529.amzn1
  • H
Use After Free

<0:4.14.318-166.529.amzn1
  • H
Comparison Using Wrong Factors

<0:4.14.318-166.529.amzn1
  • H
Use After Free

<0:4.14.313-162.533.amzn1
  • H
Use After Free

<0:4.14.314-164.539.amzn1
  • M
Out-of-bounds Write

<0:4.14.314-164.533.amzn1
  • M
Use After Free

<0:4.14.314-164.533.amzn1
  • H
Out-of-bounds Read

<0:4.14.313-162.533.amzn1
  • H
Out-of-bounds Read

<0:4.14.313-162.533.amzn1
  • H
Resource Leak

<0:4.14.305-155.531.amzn1
  • H
Use After Free

<0:4.14.309-159.529.amzn1
  • H
Sensitive Information Uncleared Before Release

<0:4.14.309-159.529.amzn1
  • H
Out-of-Bounds

<0:4.14.309-159.529.amzn1
  • H
NULL Pointer Dereference

<0:4.14.309-159.529.amzn1
  • H
Incorrect Conversion between Numeric Types

<0:4.14.281-144.502.amzn1
  • H
Deadlock

<0:4.14.305-155.531.amzn1
  • H
Deadlock

<0:4.14.305-155.531.amzn1
  • H
Memory Leak

<0:4.14.301-153.528.amzn1
  • H
Arbitrary Code Injection

<0:4.14.305-155.531.amzn1
  • H
NULL Pointer Dereference

<0:4.14.305-155.531.amzn1
  • H
Double Free

<0:4.14.309-159.529.amzn1
  • H
Incomplete Cleanup

<0:4.14.262-135.486.amzn1
  • H
Incorrect Calculation of Buffer Size

<0:4.14.262-135.486.amzn1
  • H
Improper Validation of Integrity Check Value

<0:4.14.262-135.486.amzn1
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-135.486.amzn1
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-135.486.amzn1
  • H
Resource Exhaustion

<0:4.14.262-135.486.amzn1
  • H
Use of Insufficiently Random Values

<0:4.14.262-135.486.amzn1
  • H
Resource Exhaustion

<0:4.14.262-135.486.amzn1
  • H
Resource Exhaustion

<0:4.14.262-135.486.amzn1
  • H
Improper Locking

<0:4.14.248-129.473.amzn1
  • H
Buffer Overflow

<0:4.14.248-129.473.amzn1
  • H
Out-of-bounds Write

<0:4.14.273-140.502.amzn1
  • H
Race Condition

<0:4.14.219-119.340.amzn1
  • H
Improper Initialization

<0:4.14.299-152.520.amzn1
  • H
Information Exposure

<0:4.14.299-152.520.amzn1
  • H
Use After Free

<0:4.14.299-152.520.amzn1
  • H
Race Condition

<0:4.14.299-152.520.amzn1
  • H
Out-of-bounds Write

<0:4.14.299-152.520.amzn1
  • H
Use After Free

<0:4.14.299-152.520.amzn1
  • H
Improper Update of Reference Count

<0:4.14.299-152.520.amzn1
  • H
Logging of Excessive Data

<0:4.14.299-152.520.amzn1
  • H
NULL Pointer Dereference

<0:4.14.299-152.520.amzn1
  • H
Memory Leak

<0:4.14.299-152.520.amzn1
  • H
Integer Overflow or Wraparound

<0:4.14.299-152.520.amzn1
  • H
Out-of-bounds Write

<0:4.14.299-152.520.amzn1
  • H
Use After Free

<0:4.14.299-152.520.amzn1
  • H
Use After Free

<0:4.14.299-152.520.amzn1
  • H
Memory Leak

<0:4.14.299-152.520.amzn1
  • H
CVE-2022-36946

<0:4.14.294-150.533.amzn1
  • H
Use After Free

<0:4.14.294-150.533.amzn1
  • H
Improper Update of Reference Count

<0:4.14.294-150.533.amzn1
  • H
NULL Pointer Dereference

<0:4.14.294-150.533.amzn1
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.14.294-150.533.amzn1
  • H
Use After Free

<0:4.14.294-150.533.amzn1
  • H
Use After Free

<0:4.14.294-150.533.amzn1
  • H
Information Exposure

<0:4.14.294-150.533.amzn1
  • H
Race Condition

<0:4.14.294-150.533.amzn1
  • H
Incomplete Cleanup

<0:4.14.294-150.533.amzn1
  • H
Improper Locking

<0:4.14.294-150.533.amzn1
  • H
Out-of-bounds Write

<0:4.14.294-150.533.amzn1
  • H
Privilege Dropping / Lowering Errors

<0:4.14.133-88.105.amzn1
  • H
CVE-2022-33744

<0:4.14.287-148.504.amzn1
  • H
Information Exposure

<0:4.14.287-148.504.amzn1
  • H
Information Exposure

<0:4.14.287-148.504.amzn1
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.287-148.504.amzn1
  • H
Use After Free

<0:4.14.287-148.504.amzn1
  • H
Memory Leak

<0:4.14.287-148.504.amzn1
  • H
Use After Free

<0:4.14.285-147.501.amzn1
  • H
Use After Free

<0:4.14.285-147.501.amzn1
  • H
Use of Uninitialized Resource

<0:4.14.285-147.501.amzn1
  • H
Information Exposure

<0:4.14.285-147.501.amzn1
  • H
Use After Free

<0:4.14.285-147.501.amzn1
  • H
Memory Leak

<0:4.14.285-147.501.amzn1
  • H
Use of Insufficiently Random Values

<0:4.14.285-147.501.amzn1
  • H
Buffer Overflow

<0:4.14.285-147.501.amzn1
  • H
Double Free

<0:4.14.281-144.502.amzn1
  • H
Race Condition

<0:4.14.281-144.502.amzn1
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.281-144.502.amzn1
  • H
NULL Pointer Dereference

<0:4.14.281-144.502.amzn1
  • H
Double Free

<0:4.14.281-144.502.amzn1
  • H
Memory Leak

<0:4.14.281-144.502.amzn1
  • H
Use After Free

<0:4.14.281-144.502.amzn1
  • H
Incorrect Default Permissions

<0:4.14.281-144.502.amzn1
  • H
Use After Free

<0:4.14.281-144.502.amzn1
  • H
CVE-2022-28356

<0:4.14.275-142.503.amzn1
  • H
Buffer Overflow

<0:4.14.275-142.503.amzn1
  • H
Heap-based Buffer Overflow

<0:4.14.275-142.503.amzn1
  • H
Missing Initialization of Resource

<0:4.14.273-140.502.amzn1
  • H
Out-of-bounds Write

<0:4.14.273-140.502.amzn1
  • H
CVE-2022-23960

<0:4.14.268-139.500.amzn1
  • H
Exposure of Resource to Wrong Sphere

<0:4.14.268-139.500.amzn1
  • H
CVE-2021-26401

<0:4.14.268-139.500.amzn1
  • H
Use of Uninitialized Resource

<0:4.14.268-139.500.amzn1
  • H
Out-of-bounds Write

<0:4.14.268-139.500.amzn1
  • H
NULL Pointer Dereference

<0:4.14.268-139.500.amzn1
  • H
Improper Initialization

<0:4.14.268-139.500.amzn1
  • H
Improper Preservation of Permissions

<0:4.14.268-139.500.amzn1
  • H
CVE-2022-0002

<0:4.14.268-139.500.amzn1
  • H
Improper Preservation of Permissions

<0:4.14.268-139.500.amzn1
  • H
CVE-2022-0001

<0:4.14.268-139.500.amzn1
  • H
Incomplete Cleanup

<0:4.14.268-139.500.amzn1
  • H
Improper Authentication

<0:4.14.268-139.500.amzn1
  • H
Buffer Overflow

<0:4.14.268-139.500.amzn1
  • H
Resource Exhaustion

<0:4.14.262-135.489.amzn1
  • H
Incomplete Cleanup

<0:4.14.262-135.489.amzn1
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-135.489.amzn1
  • H
Missing Authorization

<0:4.14.262-135.489.amzn1
  • H
Resource Exhaustion

<0:4.14.262-135.489.amzn1
  • H
Improper Validation of Integrity Check Value

<0:4.14.262-135.489.amzn1
  • H
Use of Insufficiently Random Values

<0:4.14.262-135.489.amzn1
  • H
Resource Exhaustion

<0:4.14.262-135.489.amzn1
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-135.489.amzn1
  • H
Incorrect Calculation of Buffer Size

<0:4.14.262-135.489.amzn1
  • H
CVE-2021-38198

<0:4.14.248-129.473.amzn1
  • H
Race Condition

<0:4.14.248-129.473.amzn1
  • H
Out-of-bounds Write

<0:4.14.248-129.473.amzn1
  • H
Use After Free

<0:4.14.248-129.473.amzn1
  • H
Resource Exhaustion

<0:4.14.248-129.473.amzn1
  • H
Access of Uninitialized Pointer

<0:4.14.248-129.473.amzn1
  • H
Missing Initialization of Resource

<0:4.14.248-129.473.amzn1
  • H
Race Condition

<0:4.14.248-129.473.amzn1
  • H
Out-of-Bounds

<0:4.14.248-129.473.amzn1
  • H
Information Exposure

<0:4.14.248-129.473.amzn1
  • H
Out-of-bounds Read

<0:4.14.248-129.473.amzn1
  • H
Use After Free

<0:4.14.248-129.473.amzn1
  • H
Buffer Overflow

<0:4.14.238-125.422.amzn1
  • M
Out-of-bounds Write

<0:4.14.238-125.421.amzn1
  • M
CVE-2021-29650

<0:4.14.238-125.421.amzn1
  • L
Use After Free

<0:4.14.232-123.381.amzn1
  • L
Incorrect Authorization

<0:4.14.232-123.381.amzn1
  • L
Out-of-bounds Write

<0:4.14.232-123.381.amzn1
  • L
Race Condition

<0:4.14.232-123.381.amzn1
  • L
Resource Exhaustion

<0:4.14.232-123.381.amzn1
  • L
Out-of-bounds Read

<0:4.14.232-123.381.amzn1
  • L
Memory Leak

<0:4.14.232-123.381.amzn1
  • L
Race Condition

<0:4.14.232-123.381.amzn1
  • L
Arbitrary Command Injection

<0:4.14.232-123.381.amzn1
  • L
Resource Exhaustion

<0:4.14.232-123.381.amzn1
  • L
Race Condition

<0:4.14.232-123.381.amzn1
  • L
Use After Free

<0:4.14.232-123.381.amzn1
  • L
Improper Initialization

<0:4.14.232-123.381.amzn1
  • H
CVE-2021-27363

<0:4.14.225-121.357.amzn1
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-121.357.amzn1
  • H
CVE-2021-26932

<0:4.14.225-121.357.amzn1
  • L
Use After Free

<0:4.14.232-123.381.amzn1
  • H
Out-of-bounds Read

<0:4.14.225-121.357.amzn1
  • H
Out-of-bounds Write

<0:4.14.225-121.357.amzn1
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-121.357.amzn1
  • H
CVE-2021-26930

<0:4.14.225-121.357.amzn1
  • H
Use After Free

<0:4.14.219-119.340.amzn1
  • H
Race Condition

<0:4.14.219-119.340.amzn1
  • H
Use After Free

<0:4.14.214-118.339.amzn1
  • H
Directory Traversal

<0:4.14.219-119.340.amzn1
  • H
Race Condition

<0:4.14.219-119.340.amzn1
  • H
Use After Free

<0:4.14.214-118.339.amzn1
  • H
Directory Traversal

<0:4.14.219-119.340.amzn1
  • H
Use After Free

<0:4.14.214-118.339.amzn1
  • H
Out-of-bounds Write

<0:4.14.214-118.339.amzn1
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.214-118.339.amzn1
  • H
Out-of-Bounds

<0:4.14.214-118.339.amzn1
  • H
Use After Free

<0:4.14.214-118.339.amzn1
  • M
Release of Invalid Pointer or Reference

<0:4.14.209-117.337.amzn1
  • M
CVE-2020-8694

<0:4.14.209-117.337.amzn1
  • M
Resource Exhaustion

<0:4.14.209-117.337.amzn1
  • M
Use After Free

<0:4.14.209-117.337.amzn1
  • M
Missing Authorization

<0:4.14.209-117.337.amzn1
  • M
Out-of-bounds Read

<0:4.14.209-117.337.amzn1
  • M
Race Condition

<0:4.14.209-117.337.amzn1
  • M
CVE-2020-27673

<0:4.14.209-117.337.amzn1
  • M
Race Condition

<0:4.14.209-117.337.amzn1
  • M
Use After Free

<0:4.14.209-117.337.amzn1
  • M
Use After Free

<0:4.14.209-117.337.amzn1
  • M
Use After Free

<0:4.14.209-117.337.amzn1
  • H
Missing Initialization of Resource

<0:4.14.203-116.332.amzn1
  • H
Out-of-bounds Write

<0:4.14.203-116.332.amzn1
  • H
CVE-2020-24490

<0:4.14.203-116.332.amzn1
  • H
Buffer Overflow

<0:4.14.203-116.332.amzn1
  • H
Use After Free

<0:4.14.203-116.332.amzn1
  • H
Improper Input Validation

<0:4.14.203-116.332.amzn1
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.200-116.320.amzn1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.14.200-116.320.amzn1
  • H
Race Condition

<0:4.14.200-116.320.amzn1
  • H
Incorrect Default Permissions

<0:4.14.200-116.320.amzn1
  • H
Incorrect Authorization

<0:4.14.200-116.320.amzn1
  • H
Improper Input Validation

<0:4.14.200-116.320.amzn1
  • H
Out-of-bounds Write

<0:4.14.200-116.320.amzn1
  • H
Out-of-bounds Read

<0:4.14.200-116.320.amzn1
  • H
Out-of-bounds Write

<0:4.14.200-116.320.amzn1
  • H
Out-of-bounds Write

<0:4.14.200-116.320.amzn1
  • H
Improper Handling of Exceptional Conditions

<0:4.14.200-116.320.amzn1
  • H
Use After Free

<0:4.14.200-116.320.amzn1
  • H
Out-of-bounds Write

<0:4.14.193-113.317.amzn1
  • H
CVE-2020-10768

<0:4.14.186-110.268.amzn1
  • H
CVE-2020-10767

<0:4.14.186-110.268.amzn1
  • H
Out-of-Bounds

<0:4.14.186-110.268.amzn1
  • H
Incomplete Cleanup

<0:4.14.186-110.268.amzn1
  • H
CVE-2020-10766

<0:4.14.186-110.268.amzn1
  • H
Improper Locking

<0:4.14.186-110.268.amzn1
  • H
NULL Pointer Dereference

<0:4.14.186-110.268.amzn1
  • H
Information Exposure

<0:4.14.186-110.268.amzn1
  • H
Improper Input Validation

<0:4.14.186-110.268.amzn1
  • H
Integer Overflow or Wraparound

<0:4.14.177-107.254.amzn1
  • H
Use After Free

<0:4.14.177-107.254.amzn1
  • H
NULL Pointer Dereference

<0:4.14.177-107.254.amzn1
  • H
CVE-2020-12770

<0:4.14.181-108.257.amzn1
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.14.181-108.257.amzn1
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.181-108.257.amzn1
  • H
Use After Free

<0:4.14.181-108.257.amzn1
  • H
Out-of-bounds Write

<0:4.14.181-108.257.amzn1
  • H
Integer Overflow or Wraparound

<0:4.14.177-107.254.amzn1
  • H
Use After Free

<0:4.14.177-107.254.amzn1
  • H
NULL Pointer Dereference

<0:4.14.177-107.254.amzn1
  • M
Use After Free

<0:4.14.173-106.229.amzn1
  • M
Information Exposure

<0:4.14.173-106.229.amzn1
  • M
Out-of-bounds Write

<0:4.14.173-106.229.amzn1
  • M
Memory Leak

<0:4.14.171-105.231.amzn1
  • M
Out-of-bounds Read

<0:4.14.171-105.231.amzn1
  • H
Memory Leak

<0:4.14.165-102.185.amzn1
  • H
Out-of-bounds Write

<0:4.14.165-102.185.amzn1
  • H
Improper Input Validation

<0:4.14.154-99.181.amzn1
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.14.152-98.182.amzn1
  • M
CVE-2019-11135

<0:4.14.152-98.182.amzn1
  • H
Out-of-bounds Write

<0:4.14.146-93.123.amzn1
  • H
Buffer Overflow

<0:4.14.146-93.123.amzn1
  • M
Information Exposure

<0:4.14.143-91.122.amzn1
  • M
Information Exposure

<0:4.14.67-66.56.amzn1
  • L
Out-of-bounds Write

<0:4.14.55-62.37.amzn1
  • M
Out-of-bounds Write

<0:4.14.67-66.56.amzn1
  • M
Resource Exhaustion

<0:4.14.143-91.122.amzn1
  • L
Information Exposure

<0:4.14.77-69.57.amzn1
  • M
CVE-2019-1125

<0:4.14.133-88.112.amzn1
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.121-85.96.amzn1
  • H
Improper Locking

<0:4.14.133-88.105.amzn1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.14.133-88.105.amzn1
  • C
Allocation of Resources Without Limits or Throttling

<0:4.14.123-86.109.amzn1
  • C
Resource Exhaustion

<0:4.14.123-86.109.amzn1
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.121-85.96.amzn1
  • H
Out-of-bounds Write

<0:4.14.121-85.96.amzn1
  • H
CVE-2019-11884

<0:4.14.121-85.96.amzn1
  • C
Integer Overflow or Wraparound

<0:4.14.123-86.109.amzn1
  • H
Race Condition

<0:4.14.114-83.126.amzn1
  • H
CVE-2019-11091

<0:4.14.114-83.126.amzn1
  • H
Information Exposure

<0:4.14.114-83.126.amzn1
  • H
Information Exposure

<0:4.14.114-83.126.amzn1
  • H
Information Exposure

<0:4.14.114-83.126.amzn1
  • H
Integer Overflow or Wraparound

<0:4.14.121-85.96.amzn1
  • H
Improper Input Validation

<0:4.14.114-82.97.amzn1
  • H
Out-of-bounds Read

<0:4.14.114-82.97.amzn1
  • H
Numeric Errors

<0:4.14.114-82.97.amzn1
  • H
Use After Free

<0:4.14.104-78.84.amzn1
  • H
NULL Pointer Dereference

<0:4.14.106-79.86.amzn1
  • H
Memory Leak

<0:4.14.106-79.86.amzn1
  • H
CVE-2019-7222

<0:4.14.101-75.76.amzn1
  • H
Race Condition

<0:4.14.101-75.76.amzn1
  • H
Use After Free

<0:4.14.101-75.76.amzn1
  • H
Use After Free

<0:4.14.94-73.73.amzn1
  • M
Race Condition

<0:4.14.88-72.76.amzn1
  • M
Resource Exhaustion

<0:4.14.88-72.76.amzn1
  • M
Information Exposure

<0:4.14.88-72.73.amzn1
  • M
Information Exposure

<0:4.14.88-72.73.amzn1
  • M
NULL Pointer Dereference

<0:4.14.88-72.73.amzn1
  • H
Race Condition

<0:4.14.77-69.57.amzn1
  • H
Improper Input Validation

<0:4.14.77-69.57.amzn1
  • H
Use After Free

<0:4.14.72-68.55.amzn1
  • H
Use After Free

<0:4.14.72-68.55.amzn1
  • H
Information Exposure

<0:4.14.72-68.55.amzn1
  • H
Out-of-bounds Write

<0:4.14.72-68.55.amzn1
  • H
Integer Overflow or Wraparound

<0:4.14.26-46.32.amzn1
  • C
CVE-2018-3646

<0:4.14.62-65.117.amzn1
  • L
NULL Pointer Dereference

<0:4.14.59-64.43.amzn1
  • C
Improper Input Validation

<0:4.14.62-65.117.amzn1
  • C
Information Exposure

<0:4.14.62-65.117.amzn1
  • L
NULL Pointer Dereference

<0:4.14.59-64.43.amzn1
  • C
Information Exposure

<0:4.14.62-65.117.amzn1
  • H
Information Exposure

<0:4.14.47-56.37.amzn1
  • C
Resource Exhaustion

<0:4.14.59-64.43.amzn1
  • M
Use After Free

<0:4.14.55-62.37.amzn1
  • M
Race Condition

<0:4.14.51-60.38.amzn1
  • H
Out-of-Bounds

<0:4.14.47-56.37.amzn1
  • H
CVE-2018-3693

<0:4.14.47-56.37.amzn1
  • H
Use of Insufficiently Random Values

<0:4.14.42-52.37.amzn1
  • H
Race Condition

<0:4.14.42-52.37.amzn1
  • H
CVE-2018-10901

<0:4.14.42-52.37.amzn1
  • H
CVE-2018-1087

<0:4.14.42-52.37.amzn1
  • H
Out-of-Bounds

<0:4.14.42-52.37.amzn1
  • H
Out-of-bounds Write

<0:4.14.42-52.37.amzn1
  • H
Race Condition

<0:4.14.42-52.37.amzn1
  • H
CVE-2017-13215

<0:4.14.42-52.37.amzn1
  • H
Use After Free

<0:4.14.42-52.37.amzn1
  • H
Use After Free

<0:4.14.42-52.37.amzn1
  • H
Out-of-Bounds

<0:4.14.42-52.37.amzn1
  • M
Improper Input Validation

<0:4.9.93-41.60.amzn1
  • M
NULL Pointer Dereference

<0:4.9.93-41.60.amzn1
  • M
CVE-2017-18232

<0:4.9.93-41.60.amzn1
  • H
Out-of-bounds Write

<0:4.9.85-38.58.amzn1
  • H
Information Exposure

<0:4.9.81-35.56.amzn1
  • H
Information Exposure

<0:4.9.81-35.56.amzn1
  • H
Improper Privilege Management

<0:4.9.81-35.56.amzn1
  • H
Race Condition

<0:4.9.81-35.56.amzn1
  • H
Race Condition

<0:4.9.81-35.56.amzn1
  • H
Out-of-bounds Read

<0:4.9.81-35.56.amzn1
  • H
Out-of-bounds Read

<0:4.9.77-31.58.amzn1
  • H
Missing Authorization

<0:4.9.77-31.58.amzn1
  • H
Use After Free

<0:4.9.77-31.58.amzn1
  • H
Race Condition

<0:4.9.77-31.58.amzn1
  • H
Missing Authorization

<0:4.9.77-31.58.amzn1
  • H
Information Exposure

<0:4.9.70-22.55.amzn1
  • C
Information Exposure

<0:4.9.76-3.78.amzn1
  • H
NULL Pointer Dereference

<0:4.9.70-22.55.amzn1
  • H
NULL Pointer Dereference

<0:4.9.70-22.55.amzn1
  • H
Divide By Zero

<0:4.9.70-22.55.amzn1
  • H
Out-of-bounds Read

<0:4.9.70-22.55.amzn1
  • H
Use After Free

<0:4.9.70-22.55.amzn1
  • C
Information Exposure

<0:4.9.76-3.78.amzn1
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.9.70-22.55.amzn1
  • H
Divide By Zero

<0:4.9.70-22.55.amzn1
  • H
Use After Free

<0:4.9.70-22.55.amzn1
  • H
Out-of-bounds Read

<0:4.9.70-22.55.amzn1
  • H
Race Condition

<0:4.9.70-22.55.amzn1
  • M
Improper Input Validation

<0:4.9.62-21.56.amzn1
  • M
NULL Pointer Dereference

<0:4.9.62-21.56.amzn1
  • M
Missing Release of Resource after Effective Lifetime

<0:4.9.62-21.56.amzn1
  • M
NULL Pointer Dereference

<0:4.9.62-21.56.amzn1
  • M
Out-of-bounds Write

<0:4.9.62-21.56.amzn1
  • H
NULL Pointer Dereference

<0:4.9.58-18.51.amzn1
  • H
Information Exposure

<0:4.9.58-18.51.amzn1
  • H
CVE-2017-12154

<0:4.9.58-18.51.amzn1
  • H
NULL Pointer Dereference

<0:4.9.58-18.51.amzn1
  • H
NULL Pointer Dereference

<0:4.9.58-18.51.amzn1
  • H
Out-of-bounds Write

<0:4.9.58-18.51.amzn1
  • M
Out-of-bounds Read

<0:4.9.51-10.52.amzn1
  • M
Out-of-Bounds

<0:4.9.51-10.52.amzn1
  • M
Incorrect Calculation

<0:4.9.43-17.39.amzn1
  • H
Buffer Overflow

<0:4.9.43-17.38.amzn1
  • H
Out-of-bounds Read

<0:4.9.43-17.38.amzn1
  • H
Integer Overflow or Wraparound

<0:4.9.43-17.38.amzn1
  • H
Race Condition

<0:4.9.43-17.38.amzn1
  • C
Out-of-bounds Write

<0:4.9.38-16.35.amzn1
  • C
Race Condition

<0:4.9.38-16.35.amzn1
  • C
Use After Free

<0:4.9.38-16.35.amzn1
  • M
CVE-2017-9076

<0:4.9.32-15.41.amzn1
  • M
Improper Input Validation

<0:4.9.32-15.41.amzn1
  • M
CVE-2017-9077

<0:4.9.32-15.41.amzn1
  • M
Out-of-bounds Read

<0:4.9.32-15.41.amzn1
  • M
Improper Resource Shutdown or Release

<0:4.9.32-15.41.amzn1
  • C
Out-of-Bounds

<0:4.9.27-14.33.amzn1
  • M
Double Free

<0:4.9.32-15.41.amzn1
  • M
CVE-2017-9075

<0:4.9.32-15.41.amzn1
  • C
CVE-2017-1000371

<0:4.9.27-14.33.amzn1
  • H
Improperly Implemented Security Check for Standard

<0:4.9.17-8.31.amzn1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.9.27-14.31.amzn1
  • H
Error Handling

<0:4.9.27-14.31.amzn1
  • H
Out-of-Bounds

<0:4.9.27-14.31.amzn1
  • H
Out-of-Bounds

<0:4.9.27-14.31.amzn1
  • H
Information Exposure

<0:4.9.27-14.31.amzn1
  • H
CVE-2017-2671

<0:4.9.27-14.31.amzn1
  • M
Race Condition

<0:4.9.20-10.30.amzn1
  • M
CVE-2017-5669

<0:4.9.20-10.30.amzn1
  • M
Double Free

<0:4.9.20-10.30.amzn1
  • H
CVE-2017-7184

<0:4.4.51-40.60.amzn1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.4.51-40.58.amzn1
  • H
Out-of-bounds Read

<0:4.4.51-40.60.amzn1
  • H
Double Free

<0:4.4.51-40.58.amzn1
  • H
NULL Pointer Dereference

<0:4.4.51-40.58.amzn1
  • H
Race Condition

<0:4.4.51-40.58.amzn1
  • H
CVE-2017-5551

<0:4.4.51-40.58.amzn1
  • H
Out-of-bounds Read

<0:4.4.51-40.58.amzn1
  • H
Improper Authorization

<0:4.4.51-40.58.amzn1
  • M
NULL Pointer Dereference

<0:4.4.39-34.54.amzn1
  • M
Use After Free

<0:4.4.41-36.55.amzn1
  • M
Out-of-Bounds

<0:4.4.39-34.54.amzn1
  • M
Improper Input Validation

<0:4.4.39-34.54.amzn1
  • M
Use After Free

<0:4.4.39-34.54.amzn1
  • M
NULL Pointer Dereference

<0:4.4.39-34.54.amzn1
  • H
Integer Overflow or Wraparound

<0:4.4.35-33.55.amzn1
  • H
Race Condition

<0:4.4.35-33.55.amzn1
  • H
Out-of-Bounds

<0:4.4.35-33.55.amzn1
  • H
Improper Access Control

<0:4.4.35-33.55.amzn1
  • H
Uncontrolled Recursion

<0:4.4.30-32.54.amzn1
  • H
Uncontrolled Recursion

<0:4.4.30-32.54.amzn1
  • C
Race Condition

<0:4.4.23-31.54.amzn1
  • M
Use After Free

<0:4.4.19-29.55.amzn1
  • M
Information Exposure

<0:4.4.15-25.57.amzn1
  • M
Information Exposure

<0:4.4.15-25.57.amzn1
  • M
CVE-2016-4470

<0:4.4.15-25.57.amzn1
  • M
Improper Access Control

<0:4.4.15-25.57.amzn1
  • M
Information Exposure

<0:4.4.15-25.57.amzn1
  • M
Out-of-Bounds

<0:4.4.14-24.50.amzn1
  • M
NULL Pointer Dereference

<0:4.4.14-24.50.amzn1
  • M
Use After Free

<0:4.4.14-24.50.amzn1
  • M
Access Restriction Bypass

<0:4.4.14-24.50.amzn1
  • L
Information Exposure

<0:4.4.11-23.53.amzn1
  • M
CVE-2016-4581

<0:4.4.10-22.54.amzn1
  • M
Access Restriction Bypass

<0:4.4.10-22.54.amzn1
  • M
CVE-2016-4557

<0:4.4.10-22.54.amzn1
  • M
CVE-2016-4558

<0:4.4.10-22.54.amzn1
  • M
Information Exposure

<0:4.4.10-22.54.amzn1
  • M
CVE-2016-0758

<0:4.4.10-22.54.amzn1
  • M
Race Condition

<0:4.4.10-22.54.amzn1
  • M
Improper Input Validation

<0:4.4.10-22.54.amzn1
  • M
Information Exposure

<0:4.4.10-22.54.amzn1
  • M
Resource Management Errors

<0:4.4.8-20.46.amzn1
  • M
Security Features

<0:4.4.8-20.46.amzn1
  • M
Improper Data Handling

<0:4.4.8-20.46.amzn1
  • M
Numeric Errors

<0:4.4.8-20.46.amzn1
  • M
Out-of-Bounds

<0:4.4.8-20.46.amzn1
  • M
Access Restriction Bypass

<0:4.1.19-24.31.amzn1
  • M
Information Exposure

<0:4.1.19-24.31.amzn1
  • M
Resource Management Errors

<0:4.1.19-24.31.amzn1
  • M
Resource Management Errors

<0:4.1.19-24.31.amzn1
  • M
Race Condition

<0:4.1.17-22.30.amzn1
  • M
Out-of-Bounds

<0:4.1.17-22.30.amzn1
  • M
Information Exposure

<0:4.1.17-22.30.amzn1
  • M
Access Restriction Bypass

<0:4.1.17-22.30.amzn1
  • M
CVE-2016-0728

<0:4.1.13-19.31.amzn1
  • M
Improper Input Validation

<0:4.1.13-18.26.amzn1
  • M
CVE-2015-8787

<0:4.1.10-17.31.amzn1
  • M
Out-of-Bounds

<0:4.1.10-17.31.amzn1
  • M
Race Condition

<0:4.1.10-17.31.amzn1
  • M
Security Features

<0:4.1.10-17.31.amzn1
  • M
Resource Management Errors

<0:3.14.48-33.39.amzn1
  • M
Resource Management Errors

<0:3.14.48-33.39.amzn1
  • M
Race Condition

<0:3.14.48-33.39.amzn1
  • M
Code

<0:3.14.48-33.39.amzn1
  • M
Access Restriction Bypass

<0:3.14.44-32.39.amzn1
  • M
CVE-2015-3636

<0:3.14.42-31.38.amzn1
  • M
Out-of-Bounds

<0:3.14.42-31.38.amzn1
  • M
Improper Data Handling

<0:3.14.34-27.48.amzn1
  • L
Access Restriction Bypass

<0:3.14.35-28.38.amzn1
  • M
Access Restriction Bypass

<0:3.14.33-26.47.amzn1
  • M
Access Restriction Bypass

<0:3.14.33-26.47.amzn1
  • M
Improper Privilege Management

<0:3.14.26-24.46.amzn1
  • M
Resource Exhaustion

<0:3.14.26-24.46.amzn1
  • M
Code

<0:3.14.26-24.46.amzn1
  • M
Resource Management Errors

<0:3.14.26-24.46.amzn1
  • M
Improper Privilege Management

<0:3.14.19-17.43.amzn1
  • M
Improper Privilege Management

<0:3.14.19-17.43.amzn1
  • M
Improper Privilege Management

<0:3.10.53-56.140.amzn1
  • M
Race Condition

<0:3.10.53-56.140.amzn1
  • M
Information Exposure

<0:3.10.53-56.140.amzn1
  • M
Integer Overflow or Wraparound

<0:3.10.48-55.140.amzn1
  • M
Numeric Errors

<0:3.10.48-55.140.amzn1
  • M
Access Restriction Bypass

<0:3.10.48-55.140.amzn1
  • M
CVE-2014-0206

<0:3.10.48-55.140.amzn1
  • M
Improper Privilege Management

<0:3.10.42-52.145.amzn1
  • M
Race Condition

<0:3.10.40-50.136.amzn1
  • M
Out-of-Bounds

<0:3.10.37-47.135.amzn1
  • M
CVE-2014-0055

<0:3.10.37-47.135.amzn1
  • M
Improper Input Validation

<0:3.10.37-47.135.amzn1
  • M
Out-of-bounds Write

<0:3.10.37-47.135.amzn1
  • L
NULL Pointer Dereference

<0:3.10.34-37.137.amzn1
  • M
Improper Input Validation

<0:3.4.82-69.112.amzn1
  • M
Out-of-Bounds

<0:3.4.82-69.112.amzn1
  • M
Improper Input Validation

<0:3.4.82-69.112.amzn1
  • M
Improper Input Validation

<0:3.4.82-69.112.amzn1
  • L
Out-of-Bounds

<0:3.4.73-64.112.amzn1
  • M
Access Restriction Bypass

<0:3.4.71-63.98.amzn1
  • M
Resource Management Errors

<0:3.4.71-63.98.amzn1
  • M
Access Restriction Bypass

<0:3.4.66-55.43.amzn1
  • M
Resource Management Errors

<0:3.4.66-55.43.amzn1
  • M
Resource Management Errors

<0:3.4.66-55.43.amzn1
  • M
Out-of-Bounds

<0:3.4.66-55.43.amzn1
  • M
Improper Input Validation

<0:3.4.66-55.43.amzn1
  • M
CVE-2013-0343

<0:3.4.62-53.42.amzn1
  • M
CVE-2013-3301

<0:3.4.57-48.42.amzn1
  • M
Information Exposure

<0:3.4.57-48.42.amzn1
  • M
Information Exposure

<0:3.4.57-48.42.amzn1
  • M
Use of Externally-Controlled Format String

<0:3.4.57-48.42.amzn1
  • M
Resource Management Errors

<0:3.4.57-48.42.amzn1
  • M
Out-of-Bounds

<0:3.4.57-48.42.amzn1
  • M
Resource Management Errors

<0:3.4.57-48.42.amzn1
  • M
Information Exposure

<0:3.4.57-48.42.amzn1
  • M
Improper Input Validation

<0:3.4.57-48.42.amzn1
  • M
Resource Exhaustion

<0:3.4.57-48.42.amzn1
  • M
Access Restriction Bypass

<0:3.4.57-48.42.amzn1
  • M
CVE-2013-1059

<0:3.4.57-48.42.amzn1
  • M
Improper Input Validation

<0:3.4.57-48.42.amzn1
  • M
Information Exposure

<0:3.4.57-48.42.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Out-of-Bounds

<0:3.4.48-45.46.amzn1
  • M
Out-of-Bounds

<0:3.4.48-45.46.amzn1
  • M
Access Restriction Bypass

<0:3.4.48-45.46.amzn1
  • M
Resource Management Errors

<0:3.4.48-45.46.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Numeric Errors

<0:3.4.43-43.43.amzn1
  • M
Race Condition

<0:3.2.39-6.88.amzn1
  • M
CVE-2012-4461

<0:3.2.39-6.88.amzn1
  • M
Improper Input Validation

<0:3.2.39-6.88.amzn1
  • M
Information Exposure

<0:3.2.39-6.88.amzn1
  • M
Improper Input Validation

<0:3.2.37-2.47.amzn1
  • M
CVE-2012-5517

<0:3.2.36-1.46.amzn1
  • M
CVE-2012-4444

<0:3.2.36-1.46.amzn1
  • M
Numeric Errors

<0:3.2.36-1.46.amzn1
  • M
Numeric Errors

<0:3.2.36-1.46.amzn1
  • M
Numeric Errors

<0:3.2.36-1.46.amzn1
  • M
Race Condition

<0:3.2.34-55.46.amzn1
  • M
Race Condition

<0:3.2.34-55.46.amzn1
  • M
Out-of-Bounds

<0:3.2.34-55.46.amzn1
  • M
Numeric Errors

<0:3.2.34-55.46.amzn1
  • M
Resource Management Errors

<0:3.2.34-55.46.amzn1
  • M
Configuration

<0:3.2.34-55.46.amzn1
  • M
CVE-2012-1568

<0:3.2.34-55.46.amzn1
  • M
Race Condition

<0:3.2.30-49.59.amzn1
  • M
Information Exposure

<0:3.2.30-49.59.amzn1
  • M
Numeric Errors

<0:3.2.30-49.59.amzn1
  • M
Resource Management Errors

<0:3.2.30-49.59.amzn1
  • M
Access Restriction Bypass

<0:3.2.30-49.59.amzn1
  • M
Information Exposure

<0:3.2.28-45.62.amzn1
  • M
Improper Authentication

<0:3.2.28-45.63.amzn1
  • M
Numeric Errors

<0:3.2.22-35.60.amzn1
  • M
Resource Exhaustion

<0:3.2.22-35.60.amzn1
  • M
CVE-2012-2372

<0:3.2.22-35.60.amzn1
  • M
Improper Input Validation

<0:3.2.19-1.28.6.amzn1
  • L
Access Restriction Bypass

<0:3.2.18-1.26.6.amzn1
  • M
CVE-2012-1568

<0:3.2.12-3.2.4.amzn1
  • M
Divide By Zero

<0:2.6.35.14-107.1.39.amzn1
  • M
CVE-2012-0045

<0:2.6.35.14-107.1.39.amzn1
  • M
Improper Input Validation

<0:2.6.35.14-107.1.39.amzn1
  • M
NULL Pointer Dereference

<0:2.6.35.14-107.1.39.amzn1
  • M
CVE-2011-4622

<0:2.6.35.14-107.1.39.amzn1
  • M
Integer Overflow or Wraparound

<0:2.6.35.14-107.1.39.amzn1
  • M
Access Restriction Bypass

<0:2.6.35.14-107.1.39.amzn1
  • M
Numeric Errors

<0:2.6.35.14-107.1.39.amzn1
  • M
NULL Pointer Dereference

<0:2.6.35.14-107.1.39.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-107.1.39.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-107.1.36.amzn1
  • M
Access Restriction Bypass

<0:2.6.35.14-106.53.amzn1
  • M
Resource Management Errors

<0:2.6.35.14-106.49.amzn1
  • M
Access Restriction Bypass

<0:2.6.35.14-106.49.amzn1
  • M
Improper Input Validation

<0:2.6.35.14-106.49.amzn1
  • M
Improper Input Validation

<0:2.6.35.14-106.49.amzn1
  • M
Resource Management Errors

<0:2.6.35.14-106.49.amzn1
  • M
CVE-2011-2699

<0:2.6.35.14-106.49.amzn1
  • M
CVE-2011-3188

<0:2.6.35.14-106.49.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-106.49.amzn1
  • M
Buffer Overflow

<0:2.6.35.14-106.49.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-106.49.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-106.49.amzn1
  • M
Information Exposure

<0:2.6.35.14-106.49.amzn1
  • M
CVE-2011-2905

<0:2.6.35.14-106.49.amzn1
  • M
Information Exposure

<0:2.6.35.14-106.49.amzn1
  • M
Resource Exhaustion

<0:2.6.35.14-103.47.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-103.47.amzn1
  • M
NULL Pointer Dereference

<0:2.6.35.14-103.47.amzn1
  • M
Resource Exhaustion

<0:2.6.35.14-97.44.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-97.44.amzn1
  • M
Improper Input Validation

<0:2.6.35.14-97.44.amzn1
  • M
Time-of-check Time-of-use (TOCTOU)

<0:2.6.35.14-97.44.amzn1
  • M
CVE-2011-3188

<0:2.6.35.14-97.44.amzn1