kernel-headers vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-headers package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-27414

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27403

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Heap-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Buffer Overflow

<0:6.1.119-129.201.amzn2023
  • M
Improper Locking

<0:6.1.119-129.201.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.106-116.188.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
Improper Neutralization of Null Byte or NUL Character

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35791

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27435

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26973

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27004

<0:6.1.90-99.173.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
Excessive Platform Resource Consumption within a Loop

<0:6.1.84-99.169.amzn2023
  • H
Double Free

<0:6.1.102-108.177.amzn2023
  • H
Integer Underflow

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-38573

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-35927

<0:6.1.94-99.176.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27003

<0:6.1.90-99.173.amzn2023
  • H
Missing Synchronization

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26993

<0:6.1.90-99.173.amzn2023
  • H
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • H
Deadlock

<0:6.1.109-118.189.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • M
Use After Free

<0:6.1.115-126.197.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • M
CVE-2024-27017

<0:6.1.112-122.189.amzn2023
  • M
CVE-2024-35944

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35896

<0:6.1.87-99.174.amzn2023
  • M
Improper Input Validation

<0:6.1.91-99.172.amzn2023
  • M
Race Condition

<0:6.1.91-99.172.amzn2023
  • H
CVE-2024-27047

<0:6.1.84-99.169.amzn2023
  • H
Reachable Assertion

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35908

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35897

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35872

<0:6.1.87-99.174.amzn2023
  • H
CVE-2024-26988

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26983

<0:6.1.90-99.173.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Buffer Overflow

<0:6.1.94-99.176.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35910

<0:6.1.87-99.174.amzn2023
  • H
Double Free

<0:6.1.79-99.164.amzn2023
  • H
Improper Write Handling in Limited-write Non-Volatile Memories

<0:6.1.79-99.164.amzn2023
  • H
Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Dead Code

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Improper Input Validation

<0:6.1.66-91.160.amzn2023
  • H
CVE-2024-35839

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
CVE-2023-52693

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52683

<0:6.1.75-99.163.amzn2023
  • H
Incomplete Cleanup

<0:6.1.66-91.160.amzn2023
  • H
CVE-2023-52679

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Out-of-bounds Read

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Improper Input Validation

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Memory Leak

<0:6.1.15-28.43.amzn2023
  • H
Improper Locking

<0:6.1.15-28.43.amzn2023
  • H
Race Condition

<0:6.1.12-17.42.amzn2023
  • H
External Control of System or Configuration Setting

<0:6.1.15-28.43.amzn2023
  • M
Resource Leak

<0:6.1.115-126.197.amzn2023
  • M
CVE-2024-35963

<0:6.1.115-126.197.amzn2023
  • M
Use of Uninitialized Resource

<0:6.1.115-126.197.amzn2023
  • M
Improper Authentication

<0:6.1.115-126.197.amzn2023
  • H
CVE-2024-46855

<0:6.1.111-120.187.amzn2023
  • H
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46777

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • H
Race Condition

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46783

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46745

<0:6.1.111-120.187.amzn2023
  • H
Link Following

<0:6.1.111-120.187.amzn2023
  • H
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • M
Reachable Assertion

<0:6.1.106-116.188.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35849

<0:6.1.90-99.173.amzn2023
  • H
Incomplete Cleanup

<0:6.1.94-99.176.amzn2023
  • M
Improper Null Termination

<0:6.1.91-99.172.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.12-17.42.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.15-28.43.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46828

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46840

<0:6.1.111-120.187.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46840

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46828

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • M
CVE-2024-46783

<0:6.1.111-120.187.amzn2023
  • M
CVE-2024-46745

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Link Following

<0:6.1.111-120.187.amzn2023
  • M
CVE-2024-46777

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.112-122.189.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • M
Race Condition

<0:6.1.111-120.187.amzn2023
  • M
Improper Locking

<0:6.1.111-120.187.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • M
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • M
CVE-2024-46711

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Improper Initialization

<0:6.1.109-118.189.amzn2023
  • M
Resource Injection

<0:6.1.109-118.189.amzn2023
  • H
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • H
Deadlock

<0:6.1.97-104.177.amzn2023
  • H
Information Exposure

<0:6.1.97-104.177.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • H
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
CVE-2024-35807

<0:6.1.79-99.167.amzn2023
  • H
Double Free

<0:6.1.97-104.177.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • M
Memory Leak

<0:6.1.106-116.188.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • M
Out-of-bounds Write

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35815

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35804

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35800

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35823

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35827

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35826

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-35847

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-35925

<0:6.1.87-99.174.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35888

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35861

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-27431

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27413

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27415

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27404

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-35840

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52675

<0:6.1.75-99.163.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Out-of-Bounds

<0:6.1.106-116.188.amzn2023
  • M
Allocation of Resources Without Limits or Throttling

<0:6.1.106-116.188.amzn2023
  • H
Improper Handling of Length Parameter Inconsistency

<0:6.1.102-108.177.amzn2023
  • H
CVE-2024-27038

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • H
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35805

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Resource Leak

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
CVE-2023-52656

<0:6.1.84-99.169.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • H
Deadlock

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27395

<0:6.1.90-99.173.amzn2023
  • H
Use After Free

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • H
Resource Leak

<0:6.1.90-99.173.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
Out-of-bounds Read

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.102-108.177.amzn2023
  • H
Use After Free

<0:6.1.102-108.177.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Resource Injection

<0:6.1.102-108.177.amzn2023
  • M
Deadlock

<0:6.1.97-104.177.amzn2023
  • M
Use After Free

<0:6.1.97-104.177.amzn2023
  • M
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • M
Information Exposure

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
CVE-2024-27393

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-27023

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Buffer Underflow

<0:6.1.87-99.174.amzn2023
  • M
Missing Initialization of Resource

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Data Element containing Pointer Item without Proper Copy Control Element

<0:6.1.82-99.168.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26805

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26804

<0:6.1.82-99.168.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26803

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Undefined Parameters

<0:6.1.82-99.168.amzn2023
  • M
Divide By Zero

<0:6.1.82-99.168.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26849

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Resource Leak

<0:6.1.82-99.168.amzn2023
  • M
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
Improper Resource Locking

<0:6.1.82-99.168.amzn2023
  • M
Use After Free

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
Resource Exhaustion

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26764

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Out-of-Bounds

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26707

<0:6.1.79-99.164.amzn2023
  • H
Write-what-where Condition

<0:6.1.79-99.164.amzn2023
  • H
Integer Underflow

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Divide By Zero

<0:6.1.79-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26920

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Unchecked Input for Loop Condition

<0:6.1.79-99.164.amzn2023
  • H
Resource Leak

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Incorrect Calculation of Buffer Size

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52654

<0:6.1.72-96.166.amzn2023
  • H
CVE-2024-26960

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27389

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27025

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26935

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27390

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27065

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26977

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26976

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26958

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26989

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26950

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26938

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26992

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27015

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26964

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26951

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26946

<0:6.1.84-99.169.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-27018

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27016

<0:6.1.90-99.173.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • H
Double Free

<0:6.1.94-99.176.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • H
Out-of-bounds Write

<0:6.1.94-99.176.amzn2023
  • H
Out-of-bounds Read

<0:6.1.94-99.176.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.94-99.176.amzn2023
  • H
Improper Initialization

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • H
Memory Leak

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.15-28.43.amzn2023
  • M
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • M
Use After Free

<0:6.1.94-99.176.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Double Free

<0:6.1.91-99.172.amzn2023
  • M
Resource Injection

<0:6.1.91-99.172.amzn2023
  • M
Untrusted Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Write

<0:6.1.91-99.172.amzn2023
  • M
Use After Free

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35947

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.90-99.173.amzn2023
  • M
Improper Initialization

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • M
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • M
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Resource Leak

<0:6.1.75-99.163.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.75-99.163.amzn2023
  • H
Missing Lock Check

<0:6.1.75-99.163.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.77-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Deadlock

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Improper Input Validation

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.59-84.139.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.59-84.139.amzn2023
  • H
Memory Leak

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Unchecked Input for Loop Condition

<0:6.1.56-82.125.amzn2023
  • H
Race Condition

<0:6.1.56-82.125.amzn2023
  • H
Incorrect Calculation of Buffer Size

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Improper Handling of Exceptional Conditions

<0:6.1.56-82.125.amzn2023
  • H
Missing Encryption of Sensitive Data

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.41-63.109.amzn2023
  • M
Use of Uninitialized Variable

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • M
Divide By Zero

<0:6.1.91-99.172.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.29-47.49.amzn2023
  • H
Improper Protection Against Physical Side Channels

<0:6.1.12-17.42.amzn2023
  • H
Use After Free

<0:6.1.15-28.43.amzn2023
  • M
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-27417

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52698

<0:6.1.75-99.163.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52672

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52881

<0:6.1.72-96.166.amzn2023
  • H
Improper Protection Against Physical Side Channels

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.59-84.139.amzn2023
  • H
Improper Resource Shutdown or Release

<0:6.1.59-84.139.amzn2023
  • H
Return of Stack Variable Address

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.56-82.125.amzn2023
  • M
Race Condition

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-26782

<0:6.1.82-99.168.amzn2023
  • M
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.72-96.166.amzn2023
  • M
Improper Locking

<0:6.1.87-99.174.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • M
CVE-2024-1627

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26602

<0:6.1.79-99.164.amzn2023
  • H
Range Error

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52462

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023
  • H
Out-of-bounds Write

<0:6.1.55-75.123.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • M
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2024-25744

<0:6.1.72-96.166.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2024-2193

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26581

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52433

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Untrusted Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-23850

<0:6.1.79-99.164.amzn2023
  • H
Improper Check for Unusual or Exceptional Conditions

<0:6.1.79-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.79-99.164.amzn2023
  • H
Information Exposure

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-23851

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
Off-by-one Error

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Deadlock

<0:6.1.59-84.139.amzn2023
  • H
Deadlock

<0:6.1.41-63.109.amzn2023
  • H
Improperly Implemented Security Check for Standard

<0:6.1.21-1.45.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • H
Integer Underflow

<0:6.1.72-96.166.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Resource Exhaustion

<0:6.1.10-15.42.amzn2023
  • H
Improper Handling of Values

<0:6.1.66-91.160.amzn2023
  • H
Resource Exhaustion

<0:6.1.66-93.164.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023
  • H
Out-of-bounds Read

<0:6.1.72-96.166.amzn2023
  • H
Memory Leak

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.61-85.141.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.41-63.109.amzn2023
  • H
Deadlock

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Out-of-bounds Write

<0:6.1.55-75.123.amzn2023
  • H
Improper Privilege Management

<0:6.1.61-85.141.amzn2023
  • H
Out-of-bounds Write

<0:6.1.61-85.141.amzn2023
  • H
Improper Handling of Exceptional Conditions

<0:6.1.61-85.141.amzn2023
  • H
Use After Free

<0:6.1.12-17.42.amzn2023
  • H
Improper Input Validation

<0:6.1.59-84.139.amzn2023
  • H
Resource Exhaustion

<0:6.1.59-84.139.amzn2023
  • H
Buffer Overflow

<0:6.1.55-75.123.amzn2023
  • H
Integer Underflow

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Write

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Race Condition

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.49-69.116.amzn2023
  • H
Out-of-Bounds

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.41-63.109.amzn2023
  • M
Use After Free

<0:6.1.23-36.46.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.19-30.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.12-17.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.55-75.123.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.34-56.100.amzn2023
  • H
Out-of-Bounds

<0:6.1.52-71.125.amzn2023
  • H
Improper Locking

<0:6.1.52-71.125.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Resource Leak

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • M
Incorrect Calculation

<0:6.1.27-43.48.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.49-69.116.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.49-69.116.amzn2023
  • H
Out-of-bounds Read

<0:6.1.49-69.116.amzn2023
  • H
Divide By Zero

<0:6.1.49-69.116.amzn2023
  • H
Out-of-Bounds

<0:6.1.49-69.116.amzn2023
  • M
Information Exposure

<0:6.1.41-63.114.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Write

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Read

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.19-30.43.amzn2023
  • H
Sensitive Information Uncleared Before Release

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.41-63.114.amzn2023
  • H
Out-of-bounds Write

<0:6.1.41-63.114.amzn2023
  • M
Improper Zeroization of Hardware Register

<0:6.1.41-63.114.amzn2023
  • M
Out-of-bounds Read

<0:6.1.41-63.114.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Double Free

<0:6.1.38-59.109.amzn2023
  • M
Out-of-bounds Write

<0:6.1.23-36.46.amzn2023
  • H
Out-of-bounds Read

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Out-of-bounds Write

<0:6.1.34-56.100.amzn2023
  • H
Incorrect Bitwise Shift of Integer

<0:6.1.12-17.42.amzn2023
  • H
Use After Free

<0:6.1.15-28.43.amzn2023
  • M
Use After Free

<0:6.1.34-59.116.amzn2023
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:6.1.34-58.102.amzn2023
  • H
Out-of-bounds Write

<0:6.1.34-56.100.amzn2023
  • H
Reachable Assertion

<0:6.1.34-56.100.amzn2023
  • H
Double Free

<0:6.1.29-50.88.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.29-47.49.amzn2023
  • H
Improper Resource Locking

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.21-1.45.amzn2023
  • M
Out-of-bounds Write

<0:6.1.27-43.48.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Read

<0:6.1.25-37.47.amzn2023
  • H
Sensitive Information Uncleared Before Release

<0:6.1.19-30.43.amzn2023
  • H
Out-of-Bounds

<0:6.1.19-30.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.15-28.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Resource Leak

<0:6.1.10-15.42.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.23-36.46.amzn2023
  • M
Deadlock

<0:6.1.23-36.46.amzn2023
  • H
Use After Free

<0:6.1.21-1.45.amzn2023
  • H
Double Free

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.19-30.43.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.19-30.43.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.12-17.42.amzn2023
  • H
CVE-2022-27672

<0:6.1.12-17.42.amzn2023
  • H
Double Free

<0:6.1.15-28.43.amzn2023
  • H
Insecure Default Initialization of Resource

<0:6.1.15-28.43.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.10-15.42.amzn2023
  • H
Integer Underflow

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Deadlock

<0:6.1.10-15.42.amzn2023
  • H
Deadlock

<0:6.1.10-15.42.amzn2023
  • H
Improper Preservation of Permissions

<0:6.1.10-15.42.amzn2023
  • H
Arbitrary Code Injection

<0:6.1.10-15.42.amzn2023
  • H
Write-what-where Condition

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Race Condition During Access to Alternate Channel

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Out-of-Bounds

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.10-15.42.amzn2023
  • H
Missing Report of Error Condition

<0:6.1.10-15.42.amzn2023
  • H
Expected Behavior Violation

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-36946

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.10-15.42.amzn2023
  • H
Comparison Using Wrong Factors

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
Improper Locking

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Divide By Zero

<0:6.1.10-15.42.amzn2023
  • H
Incorrect Default Permissions

<0:6.1.10-15.42.amzn2023
  • H
Improper Locking

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Read

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-23960

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Release of Invalid Pointer or Reference

<0:6.1.10-15.42.amzn2023
  • H
Authentication Bypass by Primary Weakness

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Missing Initialization of Resource

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Improper Preservation of Permissions

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use of Uninitialized Resource

<0:6.1.10-15.42.amzn2023
  • H
Missing Authorization

<0:6.1.10-15.42.amzn2023
  • H
Integer Underflow

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-0002

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-0001

<0:6.1.10-15.42.amzn2023
  • H
Exposure of Resource to Wrong Sphere

<0:6.1.10-15.42.amzn2023
  • H
CVE-2021-26401

<0:6.1.10-15.42.amzn2023