kernel-tools vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-tools package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-27403

<0:6.1.82-99.168.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.115-126.197.amzn2023
  • H
CVE-2024-27414

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-27435

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35791

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27047

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26973

<0:6.1.84-99.169.amzn2023
  • H
Missing Synchronization

<0:6.1.90-99.173.amzn2023
  • H
Reachable Assertion

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26983

<0:6.1.90-99.173.amzn2023
  • H
Excessive Platform Resource Consumption within a Loop

<0:6.1.84-99.169.amzn2023
  • H
Improper Neutralization of Null Byte or NUL Character

<0:6.1.84-99.169.amzn2023
  • H
Integer Underflow

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Use After Free

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.82-99.168.amzn2023
  • H
Heap-based Buffer Overflow

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-26993

<0:6.1.90-99.173.amzn2023
  • H
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • H
Deadlock

<0:6.1.109-118.189.amzn2023
  • H
CVE-2024-26988

<0:6.1.90-99.173.amzn2023
  • M
Buffer Overflow

<0:6.1.119-129.201.amzn2023
  • M
Improper Locking

<0:6.1.119-129.201.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
CVE-2024-35927

<0:6.1.94-99.176.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • H
Double Free

<0:6.1.102-108.177.amzn2023
  • M
CVE-2024-27017

<0:6.1.112-122.189.amzn2023
  • M
Improper Input Validation

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35944

<0:6.1.87-99.174.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35897

<0:6.1.87-99.174.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35896

<0:6.1.87-99.174.amzn2023
  • H
CVE-2024-27004

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27003

<0:6.1.90-99.173.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Buffer Overflow

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-38573

<0:6.1.94-99.176.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • H
Double Free

<0:6.1.79-99.164.amzn2023
  • M
Race Condition

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35910

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35908

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35872

<0:6.1.87-99.174.amzn2023
  • H
CVE-2024-35839

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52679

<0:6.1.75-99.163.amzn2023
  • H
Improper Write Handling in Limited-write Non-Volatile Memories

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Out-of-bounds Read

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
CVE-2023-52693

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52683

<0:6.1.75-99.163.amzn2023
  • H
Dead Code

<0:6.1.66-91.160.amzn2023
  • H
Improper Input Validation

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Incomplete Cleanup

<0:6.1.66-91.160.amzn2023
  • H
Improper Input Validation

<0:6.1.66-91.160.amzn2023
  • H
Race Condition

<0:6.1.12-17.42.amzn2023
  • H
Improper Locking

<0:6.1.15-28.43.amzn2023
  • H
External Control of System or Configuration Setting

<0:6.1.15-28.43.amzn2023
  • H
Memory Leak

<0:6.1.15-28.43.amzn2023
  • M
Resource Leak

<0:6.1.115-126.197.amzn2023
  • H
CVE-2024-46855

<0:6.1.111-120.187.amzn2023
  • M
Use of Uninitialized Resource

<0:6.1.115-126.197.amzn2023
  • M
Improper Authentication

<0:6.1.115-126.197.amzn2023
  • M
CVE-2024-35963

<0:6.1.115-126.197.amzn2023
  • H
CVE-2024-46777

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • H
Link Following

<0:6.1.111-120.187.amzn2023
  • H
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46783

<0:6.1.111-120.187.amzn2023
  • H
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46745

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Race Condition

<0:6.1.111-120.187.amzn2023
  • M
Reachable Assertion

<0:6.1.106-116.188.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35849

<0:6.1.90-99.173.amzn2023
  • H
Incomplete Cleanup

<0:6.1.94-99.176.amzn2023
  • M
Improper Null Termination

<0:6.1.91-99.172.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.15-28.43.amzn2023
  • H
Use After Free

<0:6.1.12-17.42.amzn2023
  • H
CVE-2024-46828

<0:6.1.111-120.187.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46840

<0:6.1.111-120.187.amzn2023
  • H
Improper Locking

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46840

<0:6.1.111-120.187.amzn2023
  • H
CVE-2024-46828

<0:6.1.111-120.187.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • H
Improper Input Validation

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Improper Synchronization

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
Improper Locking

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.112-122.189.amzn2023
  • M
Link Following

<0:6.1.111-120.187.amzn2023
  • M
CVE-2024-46783

<0:6.1.111-120.187.amzn2023
  • M
CVE-2024-46777

<0:6.1.111-120.187.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.111-120.187.amzn2023
  • M
Out-of-bounds Read

<0:6.1.111-120.187.amzn2023
  • M
CVE-2024-46745

<0:6.1.111-120.187.amzn2023
  • M
Use After Free

<0:6.1.111-120.187.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.111-120.187.amzn2023
  • M
Race Condition

<0:6.1.111-120.187.amzn2023
  • M
Improper Initialization

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • M
CVE-2024-46711

<0:6.1.109-118.189.amzn2023
  • M
Use After Free

<0:6.1.109-118.189.amzn2023
  • M
Resource Injection

<0:6.1.109-118.189.amzn2023
  • H
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Deadlock

<0:6.1.97-104.177.amzn2023
  • H
Information Exposure

<0:6.1.97-104.177.amzn2023
  • H
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
Use After Free

<0:6.1.97-104.177.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • H
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.109-118.189.amzn2023
  • M
CVE-2024-35807

<0:6.1.79-99.167.amzn2023
  • H
Double Free

<0:6.1.97-104.177.amzn2023
  • M
Memory Leak

<0:6.1.106-116.188.amzn2023
  • M
Use After Free

<0:6.1.106-116.188.amzn2023
  • M
Out-of-bounds Write

<0:6.1.106-116.188.amzn2023
  • H
CVE-2024-35827

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35826

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35823

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35815

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35804

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35800

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35847

<0:6.1.90-99.173.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-35925

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35888

<0:6.1.87-99.174.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-35861

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-27415

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27431

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27413

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27404

<0:6.1.82-99.168.amzn2023
  • H
CVE-2024-35840

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52675

<0:6.1.75-99.163.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Improper Resource Shutdown or Release

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Resource Leak

<0:6.1.106-116.188.amzn2023
  • M
Allocation of Resources Without Limits or Throttling

<0:6.1.106-116.188.amzn2023
  • M
Out-of-Bounds

<0:6.1.106-116.188.amzn2023
  • H
Improper Handling of Length Parameter Inconsistency

<0:6.1.102-108.177.amzn2023
  • H
CVE-2024-35805

<0:6.1.84-99.169.amzn2023
  • H
Memory Leak

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27038

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Resource Leak

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Resource Injection

<0:6.1.84-99.169.amzn2023
  • H
Improper Input Validation

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27395

<0:6.1.90-99.173.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Use After Free

<0:6.1.84-99.169.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • H
CVE-2023-52656

<0:6.1.84-99.169.amzn2023
  • H
Deadlock

<0:6.1.90-99.173.amzn2023
  • H
Use After Free

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • H
Resource Leak

<0:6.1.90-99.173.amzn2023
  • H
Use After Free

<0:6.1.102-108.177.amzn2023
  • H
Resource Injection

<0:6.1.102-108.177.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.102-108.177.amzn2023
  • H
Out-of-bounds Read

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.102-108.177.amzn2023
  • H
Race Condition

<0:6.1.102-108.177.amzn2023
  • M
Out-of-bounds Read

<0:6.1.97-104.177.amzn2023
  • M
Deadlock

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Use After Free

<0:6.1.97-104.177.amzn2023
  • M
Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.97-104.177.amzn2023
  • M
Information Exposure

<0:6.1.97-104.177.amzn2023
  • M
CVE-2024-27393

<0:6.1.87-99.174.amzn2023
  • M
Buffer Underflow

<0:6.1.87-99.174.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26849

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Data Element containing Pointer Item without Proper Copy Control Element

<0:6.1.82-99.168.amzn2023
  • M
Resource Leak

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-27023

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26805

<0:6.1.82-99.168.amzn2023
  • M
Divide By Zero

<0:6.1.82-99.168.amzn2023
  • M
Improper Input Validation

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Out-of-bounds Read

<0:6.1.82-99.168.amzn2023
  • M
Race Condition

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
Out-of-Bounds

<0:6.1.82-99.168.amzn2023
  • M
Missing Initialization of Resource

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26764

<0:6.1.82-99.168.amzn2023
  • M
Double Free

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Undefined Parameters

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26804

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-26803

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.82-99.168.amzn2023
  • M
Incomplete Cleanup

<0:6.1.82-99.168.amzn2023
  • M
Resource Exhaustion

<0:6.1.82-99.168.amzn2023
  • M
Improper Handling of Values

<0:6.1.82-99.168.amzn2023
  • M
Use After Free

<0:6.1.82-99.168.amzn2023
  • M
Improper Resource Locking

<0:6.1.82-99.168.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Integer Underflow

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
Unchecked Input for Loop Condition

<0:6.1.79-99.164.amzn2023
  • H
Divide By Zero

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26920

<0:6.1.79-99.164.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Resource Injection

<0:6.1.79-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.79-99.164.amzn2023
  • H
Write-what-where Condition

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26707

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Resource Leak

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Incorrect Calculation of Buffer Size

<0:6.1.77-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52654

<0:6.1.72-96.166.amzn2023
  • H
CVE-2024-27389

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26977

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26946

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27065

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26960

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26976

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26964

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26951

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26938

<0:6.1.84-99.169.amzn2023
  • H
Improper Locking

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26935

<0:6.1.84-99.169.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.90-99.173.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27390

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27018

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27016

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-27025

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-27015

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26992

<0:6.1.90-99.173.amzn2023
  • H
CVE-2024-26958

<0:6.1.84-99.169.amzn2023
  • H
CVE-2024-26950

<0:6.1.84-99.169.amzn2023
  • H
Race Condition

<0:6.1.90-99.173.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.94-99.176.amzn2023
  • H
Out-of-bounds Write

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.90-99.173.amzn2023
  • H
Resource Injection

<0:6.1.94-99.176.amzn2023
  • H
CVE-2024-26989

<0:6.1.90-99.173.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.94-99.176.amzn2023
  • H
Out-of-bounds Read

<0:6.1.94-99.176.amzn2023
  • H
Double Free

<0:6.1.94-99.176.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • H
Resource Leak

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.94-99.176.amzn2023
  • H
Improper Initialization

<0:6.1.94-99.176.amzn2023
  • H
Improper Locking

<0:6.1.94-99.176.amzn2023
  • H
Improper Input Validation

<0:6.1.102-108.177.amzn2023
  • M
Use After Free

<0:6.1.87-99.174.amzn2023
  • H
Memory Leak

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.15-28.43.amzn2023
  • M
CVE-2024-27397

<0:6.1.97-104.177.amzn2023
  • M
Use After Free

<0:6.1.94-99.176.amzn2023
  • M
Deadlock

<0:6.1.91-99.172.amzn2023
  • M
Double Free

<0:6.1.91-99.172.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • M
CVE-2024-35995

<0:6.1.90-99.173.amzn2023
  • M
Out-of-bounds Write

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Resource Injection

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Improper Initialization

<0:6.1.91-99.172.amzn2023
  • M
Untrusted Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • M
Use After Free

<0:6.1.91-99.172.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.91-99.172.amzn2023
  • M
Deadlock

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-35947

<0:6.1.91-99.172.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.84-99.169.amzn2023
  • M
Improper Initialization

<0:6.1.84-99.169.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • H
Return of Wrong Status Code

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.79-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Missing Lock Check

<0:6.1.75-99.163.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Missing Initialization of a Variable

<0:6.1.77-99.164.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.75-99.163.amzn2023
  • H
Resource Leak

<0:6.1.75-99.163.amzn2023
  • H
Resource Exhaustion

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
Resource Injection

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Improper Input Validation

<0:6.1.59-84.139.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.59-84.139.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Unchecked Input for Loop Condition

<0:6.1.56-82.125.amzn2023
  • H
Memory Leak

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Race Condition

<0:6.1.56-82.125.amzn2023
  • H
Improper Handling of Exceptional Conditions

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Missing Encryption of Sensitive Data

<0:6.1.56-82.125.amzn2023
  • H
Incorrect Calculation of Buffer Size

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.41-63.109.amzn2023
  • M
Divide By Zero

<0:6.1.91-99.172.amzn2023
  • M
Resource Leak

<0:6.1.91-99.172.amzn2023
  • M
Use of Uninitialized Variable

<0:6.1.91-99.172.amzn2023
  • M
Out-of-bounds Read

<0:6.1.91-99.172.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Resource Injection

<0:6.1.66-91.160.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.29-47.49.amzn2023
  • H
Improper Protection Against Physical Side Channels

<0:6.1.12-17.42.amzn2023
  • H
Use After Free

<0:6.1.15-28.43.amzn2023
  • M
CVE-2024-26939

<0:6.1.90-99.173.amzn2023
  • M
CVE-2024-27417

<0:6.1.82-99.168.amzn2023
  • M
Resource Injection

<0:6.1.82-99.168.amzn2023
  • M
CVE-2024-35809

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-35801

<0:6.1.84-99.169.amzn2023
  • H
CVE-2023-52698

<0:6.1.75-99.163.amzn2023
  • H
Improper Input Validation

<0:6.1.77-99.164.amzn2023
  • H
Improper Resource Locking

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52672

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.77-99.164.amzn2023
  • H
Deadlock

<0:6.1.77-99.164.amzn2023
  • H
CVE-2023-52881

<0:6.1.72-96.166.amzn2023
  • H
Improper Protection Against Physical Side Channels

<0:6.1.59-84.139.amzn2023
  • H
Improper Resource Shutdown or Release

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.59-84.139.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.56-82.125.amzn2023
  • H
Return of Stack Variable Address

<0:6.1.56-82.125.amzn2023
  • M
Race Condition

<0:6.1.87-99.174.amzn2023
  • M
CVE-2024-26782

<0:6.1.82-99.168.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • M
Stack-based Buffer Overflow

<0:6.1.84-99.169.amzn2023
  • M
Use After Free

<0:6.1.84-99.169.amzn2023
  • M
Out-of-bounds Read

<0:6.1.84-99.169.amzn2023
  • H
Out-of-bounds Read

<0:6.1.79-99.164.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
Race Condition

<0:6.1.72-96.166.amzn2023
  • M
Improper Locking

<0:6.1.87-99.174.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • M
CVE-2024-1627

<0:6.1.82-99.168.amzn2023
  • H
Range Error

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-26602

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52462

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023
  • H
Out-of-bounds Write

<0:6.1.55-75.123.amzn2023
  • M
Return of Wrong Status Code

<0:6.1.84-99.169.amzn2023
  • M
Race Condition

<0:6.1.84-99.169.amzn2023
  • M
CVE-2024-25742

<0:6.1.84-99.169.amzn2023
  • M
Integer Overflow or Wraparound

<0:6.1.84-99.169.amzn2023
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2024-25744

<0:6.1.72-96.166.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2024-26581

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-2193

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
CVE-2023-52433

<0:6.1.56-82.125.amzn2023
  • H
Untrusted Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Race Condition

<0:6.1.79-99.164.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
Information Exposure

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-23851

<0:6.1.79-99.164.amzn2023
  • H
Use After Free

<0:6.1.79-99.164.amzn2023
  • H
CVE-2024-23850

<0:6.1.79-99.164.amzn2023
  • H
Improper Check for Unusual or Exceptional Conditions

<0:6.1.79-99.164.amzn2023
  • H
Out-of-Bounds

<0:6.1.79-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.77-99.164.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • H
Off-by-one Error

<0:6.1.77-99.164.amzn2023
  • H
Use After Free

<0:6.1.75-99.163.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Integer Underflow

<0:6.1.72-96.166.amzn2023
  • H
Deadlock

<0:6.1.59-84.139.amzn2023
  • H
Deadlock

<0:6.1.41-63.109.amzn2023
  • H
Improperly Implemented Security Check for Standard

<0:6.1.21-1.45.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.75-99.163.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Resource Exhaustion

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.72-96.166.amzn2023
  • H
Improper Handling of Values

<0:6.1.66-91.160.amzn2023
  • H
Resource Exhaustion

<0:6.1.66-93.164.amzn2023
  • H
Out-of-bounds Read

<0:6.1.72-96.166.amzn2023
  • H
Use After Free

<0:6.1.72-96.166.amzn2023
  • H
Memory Leak

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.61-85.141.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.41-63.109.amzn2023
  • H
Deadlock

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.66-91.160.amzn2023
  • H
Out-of-bounds Write

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Write

<0:6.1.61-85.141.amzn2023
  • H
Improper Privilege Management

<0:6.1.61-85.141.amzn2023
  • H
Improper Handling of Exceptional Conditions

<0:6.1.61-85.141.amzn2023
  • H
Use After Free

<0:6.1.12-17.42.amzn2023
  • H
Improper Input Validation

<0:6.1.59-84.139.amzn2023
  • H
Resource Exhaustion

<0:6.1.59-84.139.amzn2023
  • H
Buffer Overflow

<0:6.1.55-75.123.amzn2023
  • H
Integer Underflow

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Write

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Race Condition

<0:6.1.56-82.125.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.56-82.125.amzn2023
  • H
Use After Free

<0:6.1.56-82.125.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.49-69.116.amzn2023
  • H
Out-of-Bounds

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Read

<0:6.1.55-75.123.amzn2023
  • H
Out-of-bounds Read

<0:6.1.41-63.109.amzn2023
  • M
Use After Free

<0:6.1.23-36.46.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.19-30.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.12-17.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.55-75.123.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.55-75.123.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.34-56.100.amzn2023
  • H
Out-of-Bounds

<0:6.1.52-71.125.amzn2023
  • H
Improper Locking

<0:6.1.52-71.125.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Resource Leak

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • M
Incorrect Calculation

<0:6.1.27-43.48.amzn2023
  • H
Stack-based Buffer Overflow

<0:6.1.49-69.116.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
Use After Free

<0:6.1.49-69.116.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.49-69.116.amzn2023
  • H
Out-of-bounds Read

<0:6.1.49-69.116.amzn2023
  • H
Divide By Zero

<0:6.1.49-69.116.amzn2023
  • H
Out-of-Bounds

<0:6.1.49-69.116.amzn2023
  • M
Information Exposure

<0:6.1.41-63.114.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Write

<0:6.1.41-63.109.amzn2023
  • H
Out-of-bounds Read

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.19-30.43.amzn2023
  • H
Sensitive Information Uncleared Before Release

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.41-63.114.amzn2023
  • H
Out-of-bounds Write

<0:6.1.41-63.114.amzn2023
  • M
Improper Zeroization of Hardware Register

<0:6.1.41-63.114.amzn2023
  • M
Out-of-bounds Read

<0:6.1.41-63.114.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Double Free

<0:6.1.38-59.109.amzn2023
  • M
Out-of-bounds Write

<0:6.1.23-36.46.amzn2023
  • H
Out-of-bounds Read

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Use After Free

<0:6.1.38-59.109.amzn2023
  • H
Out-of-bounds Write

<0:6.1.34-56.100.amzn2023
  • H
Incorrect Bitwise Shift of Integer

<0:6.1.12-17.42.amzn2023
  • H
Use After Free

<0:6.1.15-28.43.amzn2023
  • M
Use After Free

<0:6.1.34-59.116.amzn2023
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:6.1.34-58.102.amzn2023
  • H
Out-of-bounds Write

<0:6.1.34-56.100.amzn2023
  • H
Reachable Assertion

<0:6.1.34-56.100.amzn2023
  • H
Double Free

<0:6.1.29-50.88.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.29-47.49.amzn2023
  • H
Improper Resource Locking

<0:6.1.29-47.49.amzn2023
  • H
Use After Free

<0:6.1.21-1.45.amzn2023
  • M
Out-of-bounds Write

<0:6.1.27-43.48.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Read

<0:6.1.25-37.47.amzn2023
  • H
Sensitive Information Uncleared Before Release

<0:6.1.19-30.43.amzn2023
  • H
Out-of-Bounds

<0:6.1.19-30.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.15-28.43.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Resource Leak

<0:6.1.10-15.42.amzn2023
  • M
NULL Pointer Dereference

<0:6.1.23-36.46.amzn2023
  • M
Deadlock

<0:6.1.23-36.46.amzn2023
  • H
Use After Free

<0:6.1.21-1.45.amzn2023
  • H
Double Free

<0:6.1.19-30.43.amzn2023
  • H
Use After Free

<0:6.1.19-30.43.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.19-30.43.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:6.1.12-17.42.amzn2023
  • H
CVE-2022-27672

<0:6.1.12-17.42.amzn2023
  • H
Double Free

<0:6.1.15-28.43.amzn2023
  • H
Insecure Default Initialization of Resource

<0:6.1.15-28.43.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.10-15.42.amzn2023
  • H
Integer Underflow

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Deadlock

<0:6.1.10-15.42.amzn2023
  • H
Deadlock

<0:6.1.10-15.42.amzn2023
  • H
Improper Preservation of Permissions

<0:6.1.10-15.42.amzn2023
  • H
Arbitrary Code Injection

<0:6.1.10-15.42.amzn2023
  • H
Write-what-where Condition

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Race Condition During Access to Alternate Channel

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Out-of-Bounds

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Integer Overflow or Wraparound

<0:6.1.10-15.42.amzn2023
  • H
Missing Report of Error Condition

<0:6.1.10-15.42.amzn2023
  • H
Expected Behavior Violation

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-36946

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Improper Update of Reference Count

<0:6.1.10-15.42.amzn2023
  • H
Comparison Using Wrong Factors

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
Improper Locking

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Divide By Zero

<0:6.1.10-15.42.amzn2023
  • H
Incorrect Default Permissions

<0:6.1.10-15.42.amzn2023
  • H
Improper Locking

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Read

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-23960

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Information Exposure

<0:6.1.10-15.42.amzn2023
  • H
Release of Invalid Pointer or Reference

<0:6.1.10-15.42.amzn2023
  • H
Authentication Bypass by Primary Weakness

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Double Free

<0:6.1.10-15.42.amzn2023
  • H
Buffer Overflow

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Race Condition

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
NULL Pointer Dereference

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Use After Free

<0:6.1.10-15.42.amzn2023
  • H
Missing Initialization of Resource

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Memory Leak

<0:6.1.10-15.42.amzn2023
  • H
Improper Preservation of Permissions

<0:6.1.10-15.42.amzn2023
  • H
Incomplete Cleanup

<0:6.1.10-15.42.amzn2023
  • H
Out-of-bounds Write

<0:6.1.10-15.42.amzn2023
  • H
Use of Uninitialized Resource

<0:6.1.10-15.42.amzn2023
  • H
Missing Authorization

<0:6.1.10-15.42.amzn2023
  • H
Integer Underflow

<0:6.1.10-15.42.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-0002

<0:6.1.10-15.42.amzn2023
  • H
CVE-2022-0001

<0:6.1.10-15.42.amzn2023
  • H
Exposure of Resource to Wrong Sphere

<0:6.1.10-15.42.amzn2023
  • H
CVE-2021-26401

<0:6.1.10-15.42.amzn2023