| Inappropriate Encoding for Output Context | <1:21.0.9+10-1.amzn2023.1 |
| Object Model Violation: Just One of Equals and Hashcode Defined | <1:21.0.9+10-1.amzn2023.1 |
| CVE-2025-53066 | <1:21.0.9+10-1.amzn2023.1 |
| Heap-based Buffer Overflow | |
| Information Exposure | |
| Heap-based Buffer Overflow | |
| Missing Required Cryptographic Step | |
| Heap-based Buffer Overflow | |
| Information Exposure | |
| Buffer Overflow | |
| Signed to Unsigned Conversion Error | |
| Integer Overflow or Wraparound | <1:21.0.5+11-1.amzn2023.1 |
| Signed to Unsigned Conversion Error | <1:21.0.5+11-1.amzn2023.1 |
| Uncontrolled Memory Allocation | <1:21.0.5+11-1.amzn2023.1 |
| Improper Handling of Length Parameter Inconsistency | <1:21.0.5+11-1.amzn2023.1 |
| Out-of-bounds Read | |
| CVE-2024-21131 | |
| CVE-2024-21147 | |
| CVE-2024-21140 | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | |
| Improper Output Neutralization for Logs | |
| Reliance on Reverse DNS Resolution for a Security-Critical Action | |
| Covert Timing Channel | <1:21.0.2+13-1.amzn2023.1 |
| Information Exposure Through Log Files | <1:21.0.2+13-1.amzn2023.1 |
| Improper Input Validation | <1:21.0.2+13-1.amzn2023.1 |
| CVE-2024-20925 | <1:21.0.2+13-1.amzn2023.1 |
| Improper Input Validation | <1:21.0.2+13-1.amzn2023.1 |
| CVE-2024-20923 | <1:21.0.2+13-1.amzn2023.1 |
| Integer Overflow or Wraparound | <1:21.0.2+13-1.amzn2023.1 |
| CVE-2024-20922 | <1:21.0.2+13-1.amzn2023.1 |
| Out-of-Bounds | <1:21.0.1+12-1.amzn2023.1 |
| Improper Certificate Validation | <1:21.0.1+12-1.amzn2023.1 |