kernel-modules-extra-common vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-modules-extra-common package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Heap-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Buffer Overflow

<0:6.1.119-129.201.amzn2023
  • H
CVE-2024-27403

<0:6.1.82-99.168.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
CVE-2024-27017

<0:6.1.112-122.189.amzn2023
  • H
CVE-2024-27435

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.106-116.188.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35791

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27047

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26993

<0:6.1.90-99.173.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
Excessive Platform Resource Consumption within a Loop

<0:6.1.84-99.169.amzn2023
  • H
Improper Neutralization of Null Byte or NUL Character

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-38573

<0:6.1.94-99.176.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-27414

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27003

<0:6.1.90-99.173.amzn2023
  • H
Missing Synchronization

<0:6.1.90-99.173.amzn2023
  • H
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26988

<0:6.1.90-99.173.amzn2023
  • H
Deadlock

<0:6.1.109-118.189.amzn2023
  • H
CVE-2024-26983

<0:6.1.90-99.173.amzn2023
  • M
Improper Locking

<0:6.1.119-129.201.amzn2023
  • M
Use After Free

<0:6.1.115-126.197.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • M
CVE-2024-35910

<0:6.1.87-99.174.amzn2023
  • M
Race Condition

<0:6.1.91-99.172.amzn2023
  • H
CVE-2024-26973

<0:6.1.84-99.169.amzn2023
  • H
Reachable Assertion

<0:6.1.84-99.169.amzn2023
  • H
Integer Underflow

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35944

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35897

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35896

<0:6.1.87-99.174.amzn2023
  • H
CVE-2024-27004

<0:6.1.90-99.173.amzn2023
  • H
Buffer Overflow

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-35927

<0:6.1.94-99.176.amzn2023
  • H
Double Free

<0:6.1.102-108.177.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.91-99.172.amzn2023
  • M
Improper Input Validation

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35908

<0:6.1.87-99.174.amzn2023
  • H
Improper Write Handling in Limited-write Non-Volatile Memories

<0:6.1.79-99.164.amzn2023
  • M
CVE-2024-35872

<0:6.1.87-99.174.amzn2023
  • H
Double Free

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-35839

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52679

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52693

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52683

<0:6.1.75-99.163.amzn2023
  • M
CVE-2024-35963

<0:6.1.115-126.197.amzn2023
  • M
Use of Uninitialized Resource

<0:6.1.115-126.197.amzn2023
  • M
Improper Authentication

<0:6.1.115-126.197.amzn2023
  • M
Resource Leak

<0:6.1.115-126.197.amzn2023
  • H
CVE-2024-46783

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46777

<0:6.1.111-120.187.amzn2023
  • H
Link Following

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46855

<0:6.1.111-120.187.amzn2023
  • H
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46745

<0:6.1.111-120.187.amzn2023
  • H
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Race Condition

<0:6.1.111-120.187.amzn2023
  • M
Reachable Assertion

<0:6.1.106-116.188.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35849

<0:6.1.90-99.173.amzn2023
  • H
Incomplete Cleanup

<0:6.1.94-99.176.amzn2023
  • M
Improper Null Termination

<0:6.1.91-99.172.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46828

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46840

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46840

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46828

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Race Condition

<0:6.1.111-120.187.amzn2023
  • M
CVE-2024-46783

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.112-122.189.amzn2023
  • M
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • M
CVE-2024-46777

<0:6.1.111-120.187.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • M
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • M
Improper Locking

<0:6.1.111-120.187.amzn2023
  • M
Link Following

<0:6.1.111-120.187.amzn2023
  • M
CVE-2024-46745

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • M
Improper Initialization

<0:6.1.109-118.189.amzn2023
  • M
CVE-2024-46711

<0:6.1.109-118.189.amzn2023
  • M
Resource Injection

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • H
Information Exposure

<0:6.1.97-104.177.amzn2023
  • H
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • H
Deadlock

<0:6.1.97-104.177.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • H
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • M
CVE-2024-35807

<0:6.1.79-99.167.amzn2023
  • M
Memory Leak

<0:6.1.106-116.188.amzn2023
  • H
Double Free

<0:6.1.97-104.177.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • M
Out-of-bounds Write

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35827

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35815

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35826

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35800

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35804

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35823

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-35847

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-27413

<0:6.1.82-99.168.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35888

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35925

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35861

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-27431

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27415

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27404

<0:6.1.82-99.168.amzn2023
  • H
CVE-2023-52675

<0:6.1.75-99.163.amzn2023
  • H
CVE-2024-35840

<0:6.1.75-99.163.amzn2023
  • M
Out-of-Bounds

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.106-116.188.amzn2023
  • M
Allocation of Resources Without Limits or Throttling

<0:6.1.106-116.188.amzn2023
  • H
Improper Handling of Length Parameter Inconsistency

<0:6.1.102-108.177.amzn2023
  • H
CVE-2024-35805

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27038

<0:6.1.84-99.169.amzn2023
  • H
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Resource Leak

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • H
CVE-2023-52656

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27395

<0:6.1.90-99.173.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Resource Leak

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • H
Deadlock

<0:6.1.90-99.173.amzn2023
  • H
Use After Free

<0:6.1.94-99.176.amzn2023
  • H
Resource Injection

<0:6.1.102-108.177.amzn2023
  • H
Use After Free

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.102-108.177.amzn2023
  • H
Out-of-bounds Read

<0:6.1.102-108.177.amzn2023
  • M
Use After Free

<0:6.1.97-104.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • M
Deadlock

<0:6.1.97-104.177.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • M
Information Exposure

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
CVE-2024-27393

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-27023

<0:6.1.82-99.168.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
Buffer Underflow

<0:6.1.87-99.174.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26849

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26805

<0:6.1.82-99.168.amzn2023
  • M
Missing Initialization of Resource

<0:6.1.82-99.168.amzn2023
  • M
Resource Exhaustion

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26804

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Data Element containing Pointer Item without Proper Copy Control Element

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26803

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Resource Leak

<0:6.1.82-99.168.amzn2023
  • M
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Divide By Zero

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
Use After Free

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26764

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Undefined Parameters

<0:6.1.82-99.168.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
Improper Resource Locking

<0:6.1.82-99.168.amzn2023
  • M
Out-of-Bounds

<0:6.1.82-99.168.amzn2023
  • H
Integer Underflow

<0:6.1.79-99.164.amzn2023
  • H
Unchecked Input for Loop Condition

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Write-what-where Condition

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26707

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26920

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
Divide By Zero

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.79-99.164.amzn2023
  • H
Resource Leak

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Incorrect Calculation of Buffer Size

<0:6.1.77-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52654

<0:6.1.72-96.166.amzn2023
  • H
CVE-2024-27389

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27065

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27390

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26977

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26976

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27025

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26951

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26960

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26946

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27018

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26938

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26935

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26989

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27016

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26992

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26964

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26958

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26950

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-27015

<0:6.1.90-99.173.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.90-99.173.amzn2023
  • H
Out-of-bounds Read

<0:6.1.94-99.176.amzn2023
  • H
Out-of-bounds Write

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.90-99.173.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • H
Improper Initialization

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • H
Double Free

<0:6.1.94-99.176.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • H
Memory Leak

<0:6.1.77-99.164.amzn2023
  • M
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • M
Use After Free

<0:6.1.94-99.176.amzn2023
  • M
Double Free

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
Resource Injection

<0:6.1.91-99.172.amzn2023
  • M
Improper Initialization

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35947

<0:6.1.91-99.172.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Untrusted Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Use After Free

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Write

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • M
Deadlock

<0:6.1.90-99.173.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.84-99.169.amzn2023
  • M
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.75-99.163.amzn2023
  • H
Resource Leak

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Missing Lock Check

<0:6.1.75-99.163.amzn2023
  • H
Improper Input Validation

<0:6.1.75-99.163.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.77-99.164.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • M
Use of Uninitialized Variable

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • M
Divide By Zero

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-27417

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • H
CVE-2023-52672

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52698

<0:6.1.75-99.163.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52881

<0:6.1.72-96.166.amzn2023
  • M
Race Condition

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-26782

<0:6.1.82-99.168.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • M
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.72-96.166.amzn2023
  • M
Improper Locking

<0:6.1.87-99.174.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • M
CVE-2024-1627

<0:6.1.82-99.168.amzn2023
  • H
Range Error

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26602

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52462

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023
  • M
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • M
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2024-25744

<0:6.1.72-96.166.amzn2023
  • H
CVE-2024-26581

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-2193

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
Untrusted Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-23851

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-23850

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
Improper Check for Unusual or Exceptional Conditions

<0:6.1.79-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.79-99.164.amzn2023
  • H
Information Exposure

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
Off-by-one Error

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Integer Underflow

<0:6.1.72-96.166.amzn2023
  • H
Resource Exhaustion

<0:6.1.66-93.164.amzn2023
  • H
Out-of-bounds Read

<0:6.1.72-96.166.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023