perf vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the perf package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Input Validation

*
  • M
CVE-2024-46841

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-46825

*
  • M
Use After Free

*
  • M
CVE-2024-46830

*
  • M
CVE-2024-46839

*
  • M
Improper Validation of Array Index

*
  • M
CVE-2024-46840

*
  • M
Improper Null Termination

*
  • M
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
Improper Resource Shutdown or Release

*
  • M
CVE-2024-46783

*
  • M
Link Following

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-46745

*
  • M
CVE-2024-46777

*
  • M
Improper Locking

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Integer Underflow

*
  • L
Unchecked Return Value

*
  • L
Reachable Assertion

*
  • M
CVE-2024-46754

*
  • M
CVE-2024-46767

*
  • M
Use After Free

*
  • L
Improper Locking

*
  • M
CVE-2024-46771

*
  • L
Improper Check or Handling of Exceptional Conditions

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Improper Authentication

*
  • L
Double Free

*
  • M
Use After Free

*
  • M
Use of Uninitialized Variable

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

*
  • M
Resource Injection

*
  • L
Improper Locking

*
  • L
Improper Synchronization

*
  • L
Buffer Underflow

*
  • L
Race Condition

*
  • L
Out-of-Bounds

*
  • L
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • M
Heap-based Buffer Overflow

*
  • L
Improper Locking

*
  • L
NULL Pointer Dereference

*
  • M
Use of Uninitialized Variable

*
  • L
Out-of-Bounds

*
  • M
Resource Injection

*
  • M
Use After Free

*
  • M
Download of Code Without Integrity Check

*
  • M
Improper Initialization

*
  • M
Use After Free

*
  • M
Deadlock

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
Improper Locking

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Initialization

*
  • M
Uncontrolled Memory Allocation

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use of Uninitialized Variable

*
  • M
Use of Uninitialized Resource

*
  • M
Resource Leak

*
  • L
Memory Leak

*
  • L
Race Condition

*
  • M
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • M
Use After Free

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Incorrect Calculation

*
  • L
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Race Condition

*
  • M
Improper Locking

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Reachable Assertion

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Race Condition

*
  • M
Double Free

*
  • M
CVE-2022-48936

*
  • M
Improper Locking

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
NULL Pointer Dereference

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Double Free

*
  • L
Memory Leak

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
Buffer Overflow

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
Improper Resource Shutdown or Release

*
  • M
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • M
Resource Leak

*
  • M
Incorrect Privilege Assignment

*
  • M
Resource Leak

*
  • L
Deadlock

*
  • M
Memory Leak

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
NULL Pointer Dereference

*
  • M
Deadlock

*
  • M
Divide By Zero

*
  • M
Use After Free

*
  • M
Memory Leak

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Unchecked Return Value

*
  • M
Improper Locking

*
  • M
Integer Overflow or Wraparound

*
  • M
Use After Free

*
  • M
Improper Validation of Array Index

*
  • M
NULL Pointer Dereference

*
  • M
Buffer Overflow

*
  • M
Use After Free

*
  • M
Resource Injection

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
Numeric Range Comparison Without Minimum Check

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Resource Injection

*
  • M
Improper Handling of Length Parameter Inconsistency

*
  • M
CVE-2024-42304

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
Resource Injection

*
  • M
Out-of-Bounds

*
  • M
CVE-2024-42322

*
  • M
Improper Validation of Array Index

*
  • L
NULL Pointer Dereference

*
  • M
Missing Synchronization

*
  • M
CVE-2024-42257

*
  • M
Improper Locking

*
  • M
Resource Injection

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • M
Double Free

*
  • L
Improper Input Validation

*
  • M
Resource Injection

*
  • M
Use of Uninitialized Variable

*
  • M
Deadlock

*
  • M
Use of Uninitialized Resource

*
  • M
Improper Input Validation

*
  • M
Resource Injection

*
  • M
Resource Exhaustion

*
  • M
Unchecked Return Value

*
  • M
Use After Free

*
  • L
Improper Locking

*
  • L
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
Integer Overflow or Wraparound

*
  • L
Improper Synchronization

*
  • L
Release of Invalid Pointer or Reference

*
  • L
Resource Injection

*
  • L
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • L
Improper Input Validation

*
  • L
Use of Uninitialized Variable

*
  • M
Unchecked Return Value

*
  • L
Out-of-Bounds

*
  • M
Use of Uninitialized Variable

*
  • M
Use After Free

*
  • L
Buffer Overflow

*
  • M
Static Code Injection

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Resource Injection

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Update of Reference Count

*
  • M
Race Condition

*
  • L
Double Free

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • M
Divide By Zero

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • L
CVE-2024-42115

*
  • M
Resource Injection

*
  • L
Resource Injection

*
  • M
Race Condition

*
  • L
Stack-based Buffer Overflow

*
  • M
NULL Pointer Dereference

*
  • L
Deadlock

*
  • M
Untrusted Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Reachable Assertion

*
  • L
NULL Pointer Dereference

*
  • L
Improper Control of Document Type Definition

*
  • L
Memory Leak

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Use After Free

*
  • M
CVE-2024-40998

*
  • M
NULL Pointer Dereference

*
  • M
Improper Locking

*
  • L
Integer Overflow or Wraparound

*
  • M
Deadlock

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • M
Improper Synchronization

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Resource Injection

*
  • M
Resource Injection

*
  • L
Race Condition

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Resource Injection

*
  • M
Deadlock

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • M
Improper Update of Reference Count

*
  • M
Out-of-bounds Write

*
  • M
Deadlock

*
  • M
Resource Injection

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • M
CVE-2022-48802

*
  • L
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2022-48785

*
  • M
Out-of-bounds Read

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Integer Overflow or Wraparound

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
CVE-2022-48836

*
  • L
Resource Injection

*
  • M
Permission Issues

*
  • L
Resource Injection

*
  • M
CVE-2022-48832

*
  • M
Resource Injection

*
  • M
Incorrect Check of Function Return Value

*
  • M
NULL Pointer Dereference

*
  • L
Memory Leak

*
  • L
Incorrect Check of Function Return Value

*
  • M
Use After Free

*
  • L
Deadlock

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Resource Leak

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • M
Memory Leak

*
  • L
Resource Injection

*
  • M
Improper Update of Reference Count

*
  • M
Out-of-bounds Read

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Use After Free

*
  • L
Integer Overflow or Wraparound

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
CVE-2022-48828

*
  • L
Resource Leak

*
  • M
Missing Lock Check

*
  • M
Race Condition

*
  • M
CVE-2022-48834

*
  • M
Use After Free

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • M
Buffer Overflow

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Race Condition

*
  • M
CVE-2024-40901

*
  • L
CVE-2024-39509

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • L
Memory Leak

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Out-of-Bounds

*
  • L
Resource Injection

*
  • M
Deadlock

*
  • M
Covert Timing Channel

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • L
Improper Initialization

*
  • L
Race Condition

*
  • L
Resource Injection

*
  • M
Race Condition

*
  • L
Resource Leak

*
  • L
Improper Initialization

*
  • H
Use After Free

*
  • M
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Improper Locking

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • L
Resource Injection

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • L
Improper Locking

*
  • L
Deadlock

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • L
Incomplete Cleanup

*
  • L
Race Condition

*
  • L
Deadlock

*
  • L
Use After Free

*
  • L
Resource Injection

*
  • M
Improper Initialization

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2024-38578

*
  • L
Resource Injection

*
  • M
Use After Free

*
  • L
CVE-2024-38580

*
  • L
CVE-2024-38589

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Incorrect Default Permissions

*
  • L
Incomplete Cleanup

*
  • L
Missing Synchronization

*
  • L
CVE-2022-48752

*
  • L
Out-of-Bounds

*
  • L
CVE-2022-48764

*
  • L
Memory Leak

*
  • M
Use After Free

*
  • M
Resource Injection

*
  • M
Double Free

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Improper Resource Shutdown or Release

*
  • L
Resource Leak

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Out-of-bounds Write

*
  • L
Use of Uninitialized Variable

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • L
Improper Input Validation

*
  • M
Deadlock

*
  • M
Race Condition

*
  • L
Resource Exhaustion

*
  • M
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Double Free

*
  • L
Divide By Zero

*
  • L
Use After Free

*
  • L
Improper Resource Shutdown or Release

*
  • L
Use After Free

*
  • L
Improper Update of Reference Count

*
  • L
Resource Leak

*
  • L
Improper Locking

*
  • L
Use After Free

*
  • L
Resource Exhaustion

*
  • L
Deadlock

*
  • L
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • L
Release of Invalid Pointer or Reference

*
  • M
Integer Overflow or Wraparound

*
  • L
Resource Injection

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
Buffer Overflow

*
  • M
Use After Free

*
  • M
Improper Locking

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Race Condition

*
  • L
Resource Leak

*
  • M
Resource Injection

*
  • M
Use After Free

*
  • L
Out-of-Bounds

*
  • L
Resource Injection

*
  • L
Out-of-bounds Read

*
  • L
Race Condition

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Improper Locking

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • M
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • M
Incomplete Cleanup

*
  • M
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Resource Injection

*
  • L
Improper Locking

*
  • M
Divide By Zero

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • L
Improper Null Termination

*
  • L
Use of Uninitialized Variable

*
  • L
Improper Neutralization of Null Byte or NUL Character

*
  • L
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • L
Double Free

*
  • M
Out-of-bounds Write

*
  • M
Improper Initialization

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Untrusted Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Improper Preservation of Permissions

*
  • L
Improper Initialization

*
  • L
Out-of-bounds Read

*
  • M
Deadlock

*
  • M
Deadlock

*
  • M
Out-of-bounds Write

*
  • L
Leftover Debug Code

*
  • L
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • L
Resource Leak

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Out-of-Bounds

*
  • L
Resource Injection

*
  • L
Stack-based Buffer Overflow

*
  • M
NULL Pointer Dereference

*
  • L
CVE-2024-36015

*
  • M
CVE-2023-52881

*
  • M
Out-of-Bounds

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • L
Untrusted Pointer Dereference

*
  • L
Memory Leak

*
  • L
Memory Leak

*
  • L
CVE-2021-47443

*
  • L
Double Free

*
  • M
NULL Pointer Dereference

*
  • M
Improper Update of Reference Count

*
  • L
Deadlock

*
  • L
Resource Injection

*
  • L
CVE-2021-47442

*
  • L
Deadlock

*
  • M
Resource Management Errors

*
  • M
Improper Input Validation

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
NULL Pointer Dereference

*
  • M
Improper Enforcement of Behavioral Workflow

*
  • L
CVE-2021-47441

*
  • M
Use After Free

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • L
Improper Update of Reference Count

*
  • M
NULL Pointer Dereference

*
  • L
Trust Boundary Violation

*
  • L
Resource Exhaustion

*
  • L
CVE-2021-47446

*
  • M
Race Condition

*
  • M
Improper Protection Against Physical Side Channels

*
  • M
NULL Pointer Dereference

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Use After Free

*
  • L
Improper Initialization

*
  • M
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • L
CVE-2021-47290

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • L
CVE-2021-47276

*
  • L
CVE-2021-47265

*
  • L
Use After Free

*
  • M
Use After Free

*
  • M
Unsynchronized Access to Shared Data in a Multithreaded Context

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • M
Deadlock

*
  • L
Resource Leak

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • L
Resource Leak

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Resource Exhaustion

*
  • L
Resource Leak

*
  • M
Range Error

*
  • L
CVE-2021-47222

*
  • L
Resource Leak

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • M
Double Free

*
  • L
Use of NullPointerException Catch to Detect NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • L
Use After Free

*
  • M
Race Condition

*
  • M
Resource Injection

*
  • L
Improper Validation of Array Index

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Double Free

*
  • L
Resource Leak

*
  • M
Out-of-bounds Read

*
  • L
External Control of System or Configuration Setting

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • L
Out-of-Bounds

*
  • L
Improper Input Validation

*
  • M
Improper Initialization

*
  • M
Use After Free

*
  • L
Improper Validation of Array Index

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Improper Locking

*
  • M
NULL Pointer Dereference

*
  • M
Improper Locking

*
  • L
Integer Overflow or Wraparound

*
  • L
CVE-2021-47455

*
  • L
Missing Initialization of a Variable

*
  • L
Improper Control of a Resource Through its Lifetime

*
  • M
Stack-based Buffer Overflow

*
  • L
Improper Initialization

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Divide By Zero

*
  • L
Resource Injection

*
  • M
Resource Leak

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Incomplete Internal State Distinction

*
  • L
Free of Memory not on the Heap

*
  • M
Stack-based Buffer Overflow

*
  • L
Incomplete Cleanup

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Memory Leak

*
  • L
Resource Injection

*
  • M
Use After Free

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Injection

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • M
CVE-2021-47384

*
  • L
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • L
Improper Input Validation

*
  • M
CVE-2021-47359

*
  • M
Access of Uninitialized Pointer

*
  • L
Use After Free

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Deadlock

*
  • M
CVE-2021-47337

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Reachable Assertion

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
CVE-2021-47387

*
  • L
Memory Leak

*
  • M
Heap-based Buffer Overflow

*
  • L
Resource Leak

*
  • M
Improper Locking

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
CVE-2024-35993

*
  • M
CVE-2024-35964

*
  • L
CVE-2024-35979

*
  • L
CVE-2024-35879

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2024-35869

*
  • M
CVE-2024-35963

*
  • M
CVE-2024-35996

*
  • M
CVE-2024-35872

*
  • M
CVE-2024-35962

*
  • M
CVE-2024-35970

*
  • M
CVE-2024-35983

*
  • L
CVE-2024-35981

*
  • M
CVE-2024-35960

*
  • M
CVE-2024-35969

*
  • M
Improper Cleanup on Thrown Exception

*
  • L
CVE-2024-35944

*
  • M
CVE-2024-36002

*
  • M
CVE-2024-36000

*
  • M
Memory Leak

*
  • M
CVE-2024-35957

*
  • L
CVE-2024-35945

*
  • M
CVE-2024-35941

*
  • M
CVE-2024-35937

*
  • M
CVE-2024-35966

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2024-35967

*
  • M
CVE-2024-35882

*
  • M
CVE-2024-35954

*
  • L
CVE-2024-35956

*
  • M
CVE-2024-35955

*
  • M
CVE-2024-35877

*
  • L
CVE-2024-35930

*
  • L
CVE-2024-35888

*
  • L
CVE-2024-35947

*
  • M
CVE-2024-35910

*
  • M
CVE-2024-35905

*
  • M
CVE-2024-35890

*
  • M
CVE-2024-35929

*
  • M
CVE-2024-35902

*
  • M
CVE-2024-35895

*
  • L
CVE-2024-35904

*
  • M
CVE-2024-35892

*
  • M
CVE-2024-35887

*
  • M
CVE-2024-35914

*
  • L
CVE-2024-35886

*
  • M
CVE-2024-35896

*
  • L
CVE-2023-52663

*
  • M
Deadlock

*
  • L
CVE-2023-52662

*
  • M
CVE-2024-35848

*
  • L
CVE-2024-35794

*
  • M
CVE-2024-35846

*
  • M
CVE-2024-35821

*
  • M
CVE-2024-35807

*
  • M
CVE-2024-35789

*
  • M
CVE-2024-35840

*
  • M
CVE-2024-35797

*
  • M
CVE-2024-35808

*
  • M
Missing Synchronization

*
  • M
CVE-2024-35784

*
  • L
CVE-2024-27414

*
  • M
CVE-2024-35816

*
  • L
CVE-2024-35805

*
  • M
CVE-2024-35798

*
  • M
CVE-2024-27417

*
  • L
CVE-2024-27431

*
  • M
Missing Synchronization

*
  • M
Missing Synchronization

*
  • M
CVE-2024-35803

*
  • M
Missing Synchronization

*
  • M
Missing Synchronization

*
  • M
Deadlock

*
  • M
CVE-2024-35856

*
  • M
CVE-2024-27416

*
  • M
CVE-2024-35809

*
  • M
Premature Release of Resource During Expected Lifetime

*
  • L
CVE-2024-35838

*
  • M
Missing Synchronization

*
  • M
Missing Synchronization

*
  • M
CVE-2024-35828

*
  • M
CVE-2024-35824

*
  • M
CVE-2024-35815

*
  • M
CVE-2024-35818

*
  • M
Missing Synchronization

*
  • L
CVE-2024-35804

*
  • M
CVE-2024-27415

*
  • M
CVE-2024-27410

*
  • M
Missing Synchronization

*
  • M
Missing Synchronization

*
  • M
Missing Synchronization

*
  • M
CVE-2024-35810

*
  • M
CVE-2024-35812

*
  • M
NULL Pointer Dereference

*
  • L
CVE-2024-35849

*
  • M
Missing Synchronization

*
  • L
CVE-2023-52696

*
  • L
CVE-2023-52674

*
  • L
CVE-2024-27436

*
  • M
CVE-2024-27402

*
  • L
CVE-2023-52683

*
  • M
CVE-2023-52672

*
  • M
CVE-2023-52698

*
  • L
CVE-2023-52680

*
  • L
CVE-2023-52693

*
  • L
CVE-2023-52669

*
  • M
Improper Locking

*
  • L
CVE-2024-27393

*
  • L
CVE-2024-27395

*
  • L
CVE-2024-27398

*
  • M
Use After Free

*
  • M
CVE-2023-52654

*
  • L
Memory Leak

*
  • M
Improper Locking

*
  • M
CVE-2022-48695

*
  • L
CVE-2022-48702

*
  • L
CVE-2022-48701

*
  • M
Memory Leak

*
  • L
CVE-2022-48694

*
  • M
NULL Pointer Dereference

*
  • L
CVE-2022-48700

*
  • L
CVE-2022-48705

*
  • L
CVE-2022-48704

*
  • M
Use After Free

*
  • M
CVE-2024-27047

*
  • L
CVE-2024-27389

*
  • L
CVE-2024-27390

*
  • L
CVE-2024-27043

*
  • L
CVE-2024-26935

*
  • L
CVE-2024-27059

*
  • M
CVE-2024-27080

*
  • L
CVE-2024-27025

*
  • M
CVE-2024-26958

*
  • M
CVE-2024-27018

*
  • M
Out-of-bounds Read

*
  • M
CVE-2024-27055

*
  • M
Improper Resource Locking

*
  • M
CVE-2024-27007

*
  • M
Race Condition

*
  • M
Missing Initialization of Resource

*
  • L
CVE-2024-26973

*
  • L
CVE-2024-26962

*
  • M
CVE-2024-27066

*
  • L
CVE-2024-26964

*
  • L
CVE-2024-27026

*
  • M
CVE-2024-26991

*
  • M
Improper Input Validation

*
  • M
Memory Leak

*
  • M
CVE-2024-27067

*
  • L
CVE-2024-26953

*
  • M
CVE-2024-27050

*
  • M
CVE-2024-26939

*
  • L
CVE-2024-27023

*
  • L
CVE-2024-27073

*
  • M
Memory Leak

*
  • M
CVE-2024-26999

*
  • M
Race Condition

*
  • L
CVE-2024-26993

*
  • M
CVE-2024-26946

*
  • L
NULL Pointer Dereference

*
  • M
Double Free

*
  • M
Double Free

*
  • M
CVE-2024-27031

*
  • M
Behavioral Change in New Version or Environment

*
  • L
Improper Locking

*
  • M
CVE-2024-26976

*
  • M
CVE-2024-27036

*
  • L
CVE-2024-27010

*
  • L
CVE-2024-26992

*
  • L
Improper Locking

*
  • M
Reachable Assertion

*
  • L
CVE-2023-52653

*
  • L
CVE-2024-26960

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
CVE-2023-52648

*
  • L
CVE-2022-48669

*
  • L
Improper Neutralization of Null Byte or NUL Character

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
CVE-2022-48662

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Integer Underflow

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Resource Exhaustion

*
  • M
Improper Handling of Values

*
  • L
Double Free

*
  • L
Improper Resource Shutdown or Release

*
  • M
Deadlock

*
  • L
Resource Exhaustion

*
  • L
Reachable Assertion

*
  • M
Race Condition

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

*
  • M
Improper Locking

*
  • L
Buffer Underflow

*
  • M
Out-of-bounds Write

*
  • M
Deadlock

*
  • M
Deadlock

*
  • L
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
CVE-2024-26918

*
  • L
Resource Leak

*
  • L
Race Condition

*
  • M
Improper Input Validation

*
  • M
Unchecked Return Value to NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • M
CVE-2024-26841

*
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • M
Divide By Zero

*
  • L
Use After Free

*
  • M
Resource Injection

*
  • L
Data Element containing Pointer Item without Proper Copy Control Element

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2024-26920

*
  • M
CVE-2023-52644

*
  • L
Improper Input Validation

*
  • L
Resource Injection

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Memory Leak

*
  • L
Race Condition

*
  • M
Out-of-Bounds

*
  • L
Race Condition

*
  • L
Resource Injection

*
  • M
Stack-based Buffer Overflow

*
  • M
Race Condition

*
  • L
Memory Leak

*
  • M
Integer Underflow

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Use After Free

*
  • L
Memory Leak

*
  • M
Resource Injection

*
  • M
Resource Leak

*
  • L
Use After Free

*
  • M
Deadlock

*
  • M
Incorrect Synchronization

*
  • L
Buffer Access with Incorrect Length Value

*
  • L
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Use After Free

*
  • M
CVE-2024-26804

*
  • M
Out-of-bounds Read

*
  • M
Mismatched Memory Management Routines

*
  • M
Double Free

*
  • L
CVE-2024-26803

*
  • M
CVE-2024-26801

*
  • M
Deadlock

*
  • M
Use After Free

*
  • M
Improper Null Termination

*
  • M
Deadlock

*
  • L
Resource Injection

*
  • L
Divide By Zero

*
  • L
Stack-based Buffer Overflow

*
  • L
Deadlock

*
  • L
Improper Null Termination

*
  • L
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • L
Race Condition

*
  • L
Improper Input Validation

*
  • L
Improper Write Handling in Limited-write Non-Volatile Memories

*
  • L
Race Condition

*
  • M
Deadlock

*
  • M
Improper Null Termination

*
  • L
Incomplete Cleanup

*
  • L
NULL Pointer Dereference

*
  • M
Improper Handling of Values

*
  • M
Heap-based Buffer Overflow

*
  • M
Deadlock

*
  • M
Resource Injection

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • M
Improper Handling of Values

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • M
Resource Leak

*
  • M
Race Condition

*
  • L
Write-what-where Condition

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Deadlock

*
  • L
Unchecked Input for Loop Condition

*
  • L
Race Condition

*
  • L
Deadlock

*
  • M
Race Condition

*
  • M
CVE-2024-26764

*
  • M
Improper Resource Locking

*
  • L
Improper Handling of Undefined Parameters

*
  • M
Double Free

*
  • L
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • L
Improper Locking

*
  • L
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Resource Injection

*
  • L
Improper Input Validation

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • L
Improper Resource Locking

*
  • L
Resource Injection

*
  • L
Incorrect Calculation of Buffer Size

*
  • M
Resource Injection

*
  • M
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • L
Improper Input Validation

*
  • L
Improper Cleanup on Thrown Exception

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Injection

*
  • L
Out-of-bounds Read

*
  • L
Resource Injection

*
  • M
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • M
CVE-2023-28746

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Missing Initialization of a Variable

*
  • L
Missing Initialization of a Variable

*
  • M
Resource Exhaustion

*
  • L
Missing Lock Check

*
  • L
Improper Input Validation

*
  • M
Resource Injection

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Out-of-bounds Read

*
  • M
Missing Lock Check

*
  • M
Out-of-bounds Read

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Incomplete Cleanup

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • M
Double Free

*
  • M
Out-of-bounds Write

*
  • M
Improper Resource Locking

*
  • M
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Race Condition

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Resource Locking

*
  • L
Resource Leak

*
  • L
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • L
Improper Resource Locking

*
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • L
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • L
Double Free

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • L
Improper Resource Locking

*
  • L
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Leak

*
  • L
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Use After Free

*
  • L
CVE-2023-52575

*
  • M
Memory Leak

*
  • L
Resource Injection

*
  • L
Missing Encryption of Sensitive Data

*
  • M
Improper Handling of Overlap Between Protected Memory Ranges

*
  • L
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • L
Resource Injection

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
CVE-2023-52497

*
  • M
Resource Injection

*
  • L
Deadlock

*
  • L
Memory Leak

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • L
Stack-based Buffer Overflow

*
  • L
Memory Leak

*
  • L
Improper Input Validation

*
  • M
CVE-2021-47055

*
  • L
Improper Resource Locking

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • L
Use After Free

*
  • L
Resource Exhaustion

*
  • M
Use After Free

*
  • L
Improper Protection Against Physical Side Channels

*
  • M
Return of Stack Variable Address

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • M
Memory Leak

*
  • L
Resource Exhaustion

*
  • L
Information Exposure Through Indexing of Private Data

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • M
NULL Pointer Dereference

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Incorrect Check of Function Return Value

*
  • L
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Improper Handling of Missing Values

*
  • L
Double Free

*
  • M
Improper Handling of Values

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Resource Exhaustion

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Stack-based Buffer Overflow

*
  • L
Untrusted Pointer Dereference

*
  • M
Missing Report of Error Condition

*
  • L
Improper Input Validation

*
  • L
Out-of-bounds Read

*
  • L
Memory Leak

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • L
Improper Input Validation

*
  • M
Deadlock

*
  • M
Uncontrolled Memory Allocation

*
  • L
Resource Leak

*
  • L
CVE-2021-47019

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • M
Deadlock

*
  • L
Resource Leak

*
  • M
Return of Wrong Status Code

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • L
Out-of-bounds Read

*
  • L
Resource Leak

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Memory Leak

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Resource Exhaustion

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Resource Leak

*
  • L
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Memory Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • L
Integer Underflow

*
  • M
NULL Pointer Dereference

*
  • L
Unchecked Error Condition

*
  • L
Memory Leak

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Use After Free

*
  • M
Use After Free

*
  • L
Use After Free

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
CVE-2021-46922

*
  • L
Resource Leak

*
  • L
Missing Support for Integrity Check

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • L
Double Free

*
  • L
Use After Free

*
  • L
Information Exposure

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Memory Leak

*
  • M
Improper Resource Locking

*
  • M
Improper Input Validation

*
  • L
Range Error

*
  • M
Resource Leak

*
  • L
Out-of-bounds Read

*
  • L
Improper Check or Handling of Exceptional Conditions

*
  • M
Improper Input Validation

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2021-46914

*
  • L
Memory Leak

*
  • M
Deadlock

*
  • M
Improper Input Validation

*
  • L
Divide By Zero

*
  • L
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
CVE-2023-52474

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
CVE-2023-52455

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Buffer Access with Incorrect Length Value

*
  • L
Untrusted Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
CVE-2023-52462

*
  • M
NULL Pointer Dereference

*
  • M
Deadlock

*
  • L
CVE-2023-52461

*
  • M
CVE-2024-25744

*
  • L
Memory Leak

*
  • L
Insufficient Control Flow Management

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
Integer Overflow or Wraparound

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • L
Information Exposure

*
  • M
Improper Update of Reference Count

*
  • M
Race Condition

*
  • M
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • M
Man-in-the-Middle (MitM)

*
  • M
Stack-based Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • H
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Out-of-bounds Read

*
  • L
Use After Free

*
  • M
Incorrect Bitwise Shift of Integer

*
  • L
Use After Free

*
  • M
Use After Free

*
  • M
Improperly Implemented Security Check for Standard

*
  • M
Use After Free

*
  • M
Sensitive Information Uncleared Before Release

*
  • M
Incorrect Authorization

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2022-27672

*
  • M
NULL Pointer Dereference

*
  • M
Memory Leak

*
  • M
Integer Overflow or Wraparound

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Memory Leak

*
  • M
Insecure Default Initialization of Resource

*
  • L
Memory Leak

*
  • M
Memory Leak

*
  • L
Unchecked Return Value

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Race Condition

*
  • M
Out-of-Bounds

*
  • M
Memory Leak

*
  • M
Memory Leak

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Race Condition

*
  • H
Use After Free

*
  • M
Improper Locking

*
  • M
Race Condition During Access to Alternate Channel

*
  • M
Race Condition

*
  • L
Expected Behavior Violation

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Buffer Overflow

*
  • M
Use After Free

*
  • L
Improper Locking

*
  • M
Improper Initialization

*
  • M
Out-of-bounds Write

*
  • M
Improper Restriction of Communication Channel to Intended Endpoints

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Use After Free

*
  • M
Improper Update of Reference Count

*
  • M
Incorrect Calculation of Buffer Size

*
  • H
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Update of Reference Count

*
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • M
Incorrect Default Permissions

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Double Free

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Use of Uninitialized Resource

*
  • M
Memory Leak

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Race Condition

*
  • M
Information Exposure

*
  • M
Authentication Bypass

*
  • M
Memory Leak

*
  • M
Improper Preservation of Permissions

*
  • L
Use of Uninitialized Resource

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Use of Insufficiently Random Values

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Race Condition

*
  • M
Memory Leak

*
  • M
Memory Leak

*
  • M
Improper Locking

*
  • L
CVE-2019-0136

*
  • M
Incomplete Cleanup

*
  • H
Use After Free

*
  • M
Use After Free

*
  • M
Use of Insufficiently Random Values

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Information Exposure

*
  • M
Improper Validation of Integrity Check Value

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • L
Out-of-Bounds

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use After Free

*
  • H
Heap-based Buffer Overflow

<0:2.6.32-754.33.1.el6
  • H
Use After Free

<0:2.6.32-754.15.3.el6
  • H
Improper Initialization

<0:2.6.32-754.3.5.el6
  • H
Execution with Unnecessary Privileges

<0:2.6.32-754.2.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.el6
  • H
Buffer Overflow

<0:2.6.32-754.28.1.el6
  • M
Insufficient Control of Network Message Volume (Network Amplification)

<0:2.6.32-696.el6
  • M
CVE-2014-8134

<0:2.6.32-642.el6
  • M
Execution with Unnecessary Privileges

<0:2.6.32-642.el6
  • M
NULL Pointer Dereference

<0:2.6.32-642.el6
  • H
Information Exposure

<0:2.6.32-754.18.2.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-754.22.1.el6
  • M
Out-of-Bounds

<0:2.6.32-573.el6
  • M
Access Restriction Bypass

<0:2.6.32-573.el6
  • M
CVE-2011-5321

<0:2.6.32-504.30.3.el6
  • H
Out-of-Bounds

<0:2.6.32-504.12.2.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.3.3.el6
  • H
Resource Exhaustion

<0:2.6.32-754.6.3.el6
  • H
Improper Access Control

<0:2.6.32-754.12.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.18.2.el6
  • H
Use After Free

<0:2.6.32-754.3.5.el6
  • H
Use After Free

<0:2.6.32-754.11.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.el6
  • H
Resource Exhaustion

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.6.3.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.3.5.el6
  • H
Improper Access Control

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.el6
  • H
Numeric Errors

<0:2.6.32-504.el6
  • H
Numeric Errors

<0:2.6.32-504.el6
  • H
Race Condition

<0:2.6.32-754.3.5.el6
  • H
Information Exposure

<0:2.6.32-754.3.5.el6
  • H
Use After Free

<0:2.6.32-754.2.1.el6
  • H
Resource Exhaustion

<0:2.6.32-754.3.5.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.3.5.el6
  • H
Incorrect Calculation

<0:2.6.32-431.29.2.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-431.29.2.el6
  • H
Information Exposure

<0:2.6.32-754.2.1.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.2.1.el6
  • H
Execution with Unnecessary Privileges

<0:2.6.32-696.28.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.20.3.el6
  • H
Improper Input Validation

<0:2.6.32-431.23.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.23.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.23.3.el6
  • H
Race Condition

<0:2.6.32-754.el6
  • H
Numeric Errors

<0:2.6.32-431.20.3.el6
  • H
Resource Exhaustion

<0:2.6.32-754.el6
  • H
Use After Free

<0:2.6.32-431.20.3.el6
  • H
Incorrect Privilege Assignment

<0:2.6.32-696.28.1.el6
  • H
Out-of-Bounds

<0:2.6.32-696.28.1.el6
  • H
Information Exposure

<0:2.6.32-696.28.1.el6
  • H
Use After Free

<0:2.6.32-754.3.5.el6
  • H
Race Condition

<0:2.6.32-754.3.5.el6
  • H
Use After Free

<0:2.6.32-696.28.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.el6
  • H
Out-of-bounds Write

<0:2.6.32-431.17.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-431.17.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.17.1.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-696.28.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.11.2.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.11.2.el6
  • H
CVE-2014-0055

<0:2.6.32-431.11.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.11.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.11.2.el6
  • H
Improper Input Validation

<0:2.6.32-431.11.2.el6
  • M
NULL Pointer Dereference

<0:2.6.32-754.30.2.el6
  • H
Improper Input Validation

<0:2.6.32-431.5.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.5.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.5.1.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-696.23.1.el6
  • M
Buffer Overflow

<0:2.6.32-696.13.2.el6
  • M
Improper Input Validation

<0:2.6.32-696.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-696.20.1.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-696.16.1.el6
  • H
Use After Free

<0:2.6.32-696.20.1.el6
  • H
Divide By Zero

<0:2.6.32-696.16.1.el6
  • H
Information Exposure

<0:2.6.32-431.1.2.el6
  • H
Race Condition

<0:2.6.32-696.16.1.el6
  • H
Numeric Errors

<0:2.6.32-431.1.2.el6
  • H
Improper Input Validation

<0:2.6.32-431.1.2.el6
  • H
Missing Initialization of a Variable

<0:2.6.32-431.1.2.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Stack-based Buffer Overflow

<0:2.6.32-696.10.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Improper Input Validation

<0:2.6.32-431.el6
  • H
Memory Leak

<0:2.6.32-431.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Use of Externally-Controlled Format String

<0:2.6.32-431.el6
  • H
Off-by-one Error

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-431.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-431.el6
  • H
CVE-2013-0343

<0:2.6.32-431.el6
  • M
Resource Management Errors

<0:2.6.32-358.23.2.el6
  • M
Access Restriction Bypass

<0:2.6.32-358.23.2.el6
  • H
Improper Input Validation

<0:2.6.32-358.18.1.el6
  • H
Improper Input Validation

<0:2.6.32-358.18.1.el6
  • H
Out-of-Bounds

<0:2.6.32-358.18.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-358.18.1.el6
  • H
CVE-2013-2224

<0:2.6.32-358.18.1.el6
  • H
Information Exposure

<0:2.6.32-358.18.1.el6
  • M
Use After Free

<0:2.6.32-696.el6
  • M
Improper Input Validation

<0:2.6.32-358.14.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-358.14.1.el6
  • H
Out-of-bounds Read

<0:2.6.32-696.20.1.el6
  • H
Use After Free

<0:2.6.32-754.el6
  • H
Race Condition

<0:2.6.32-754.el6
  • H
Use After Free

<0:2.6.32-754.el6
  • H
Out-of-Bounds

<0:2.6.32-696.10.3.el6
  • H
Use After Free

<0:2.6.32-754.el6
  • H
Unchecked Error Condition

<0:2.6.32-754.el6
  • M
Improper Authentication

<0:2.6.32-696.el6
  • M
Use After Free

<0:2.6.32-696.el6
  • M
Stack-based Buffer Overflow

<0:2.6.32-696.el6
  • H
Detection of Error Condition Without Action

<0:2.6.32-754.el6
  • H
Use After Free

<0:2.6.32-754.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • M
Resource Management Errors

<0:2.6.32-358.14.1.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • M
Resource Management Errors

<0:2.6.32-358.14.1.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • M
Resource Exhaustion

<0:2.6.32-358.14.1.el6
  • M
Use of Externally-Controlled Format String

<0:2.6.32-358.14.1.el6
  • M
NULL Pointer Dereference

<0:2.6.32-358.14.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.33.1.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • H
Race Condition

<0:2.6.32-754.el6
  • M
Improper Authentication

<0:2.6.32-696.el6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-696.3.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-358.11.1.el6
  • H
Out-of-Bounds

<0:2.6.32-358.11.1.el6
  • H
Out-of-bounds Read

<0:2.6.32-696.6.3.el6
  • H
Race Condition

<0:2.6.32-358.11.1.el6
  • H
Resource Management Errors

<0:2.6.32-358.11.1.el6
  • H
Improper Handling of Length Parameter Inconsistency

<0:2.6.32-696.28.1.el6
  • H
Out-of-Bounds

<0:2.6.32-696.3.2.el6
  • H
CVE-2017-1000379

<0:2.6.32-696.3.2.el6
  • H
Numeric Range Comparison Without Minimum Check

<0:2.6.32-358.6.2.el6
  • H
Buffer Overflow

<0:2.6.32-754.el6
  • H
Use After Free

<0:2.6.32-696.1.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.el6
  • H
Race Condition

<0:2.6.32-696.1.1.el6
  • H
Numeric Errors

<0:2.6.32-358.6.1.el6
  • H
Race Condition

<0:2.6.32-358.6.1.el6
  • H
Use After Free

<0:2.6.32-642.13.2.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Out-of-Bounds

<0:2.6.32-358.6.1.el6
  • H
Use After Free

<0:2.6.32-358.6.1.el6
  • H
Use After Free

<0:2.6.32-358.6.1.el6
  • H
CVE-2013-1826

<0:2.6.32-358.6.1.el6
  • H
Improper Input Validation

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
CVE-2013-1827

<0:2.6.32-358.6.1.el6
  • H
Out-of-Bounds

<0:2.6.32-358.6.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Use After Free

<0:2.6.32-642.13.1.el6
  • H
Use After Free

<0:2.6.32-642.13.1.el6
  • M
Out-of-bounds Read

<0:2.6.32-642.15.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-358.2.1.el6
  • H
Numeric Errors

<0:2.6.32-358.2.1.el6
  • H
Race Condition

<0:2.6.32-358.0.1.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-642.6.1.el6
  • H
CVE-2013-0311

<0:2.6.32-358.el6
  • H
Improper Input Validation

<0:2.6.32-358.el6
  • H
NULL Pointer Dereference

<0:2.6.32-358.el6
  • H
Race Condition

<0:2.6.32-358.el6
  • H
Out-of-Bounds

<0:2.6.32-358.el6
  • M
Race Condition

<0:2.6.32-642.15.1.el6
  • M
Resource Exhaustion

<0:2.6.32-642.el6
  • M
NULL Pointer Dereference

<0:2.6.32-642.el6
  • M
Use After Free

<0:2.6.32-696.el6
  • M
Race Condition

<0:2.6.32-696.el6
  • M
Improper Locking

<0:2.6.32-642.el6
  • M
Incorrect Privilege Assignment

<0:2.6.32-696.el6
  • H
Race Condition

<0:2.6.32-642.6.2.el6
  • M
Improper Input Validation

<0:2.6.32-279.22.1.el6
  • M
Information Exposure

<0:2.6.32-279.22.1.el6
  • M
CVE-2012-4461

<0:2.6.32-279.22.1.el6
  • M
CVE-2012-4444

<0:2.6.32-279.19.1.el6
  • M
CVE-2012-5517

<0:2.6.32-279.19.1.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-642.13.1.el6
  • M
Numeric Errors

<0:2.6.32-279.19.1.el6
  • M
Numeric Errors

<0:2.6.32-279.19.1.el6
  • M
Numeric Errors

<0:2.6.32-279.19.1.el6
  • H
Information Exposure

<0:2.6.32-642.4.2.el6
  • H
Incorrect Check of Function Return Value

<0:2.6.32-642.6.1.el6
  • H
Out-of-Bounds

<0:2.6.32-642.11.1.el6
  • M
CVE-2012-1568

<0:2.6.32-279.14.1.el6
  • M
Use After Free

<0:2.6.32-279.14.1.el6
  • M
Use After Free

<0:2.6.32-279.14.1.el6
  • M
Out-of-Bounds

<0:2.6.32-279.14.1.el6
  • H
Out-of-Bounds

<0:2.6.32-642.3.1.el6
  • M
Time-of-check Time-of-use (TOCTOU)

<0:2.6.32-573.26.1.el6
  • H
Resource Exhaustion

<0:2.6.32-279.11.1.el6
  • M
Race Condition

<0:2.6.32-279.9.1.el6
  • M
Information Exposure

<0:2.6.32-279.9.1.el6
  • M
Memory Leak

<0:2.6.32-279.9.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-279.9.1.el6
  • M
Integer Overflow or Wraparound

<0:2.6.32-279.9.1.el6
  • M
Integer Overflow or Wraparound

<0:2.6.32-279.5.1.el6
  • M
Information Exposure

<0:2.6.32-279.5.1.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-71.40.1.el6
  • H
Out-of-Bounds

<0:2.6.32-279.1.1.el6
  • H
Missing Initialization of a Variable

<0:2.6.32-573.12.1.el6
  • M
Interaction Error

<0:2.6.32-573.26.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-220.23.1.el6
  • H
Out-of-Bounds

<0:2.6.32-220.23.1.el6
  • M
Resource Exhaustion

<0:2.6.32-279.el6
  • M
Numeric Errors

<0:2.6.32-279.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-220.23.1.el6
  • H
CVE-2012-2372

<0:2.6.32-220.23.1.el6
  • H
Race Condition

<0:2.6.32-220.23.1.el6
  • H
Out-of-Bounds

<0:2.6.32-220.23.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-220.23.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-220.23.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-220.23.1.el6
  • M
Out-of-Bounds

<0:2.6.32-220.17.1.el6
  • M
Resource Management Errors

<0:2.6.32-220.17.1.el6
  • M
Resource Exhaustion

<0:2.6.32-220.13.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-573.12.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-573.12.1.el6
  • M
Improper Input Validation

<0:2.6.32-220.7.1.el6
  • M
Improper Input Validation

<0:2.6.32-220.13.1.el6
  • M
NULL Pointer Dereference

<0:2.6.32-220.13.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-220.13.1.el6
  • M
NULL Pointer Dereference

<0:2.6.32-220.7.1.el6
  • M
CVE-2012-0045

<0:2.6.32-220.7.1.el6
  • M
CVE-2011-4622

<0:2.6.32-220.7.1.el6
  • M
NULL Pointer Dereference

<0:2.6.32-220.7.1.el6
  • M
Integer Overflow or Wraparound

<0:2.6.32-220.7.1.el6
  • M
Out-of-Bounds

<0:2.6.32-220.7.1.el6
  • M
Divide By Zero

<0:2.6.32-220.7.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-220.7.1.el6
  • M
Numeric Errors

<0:2.6.32-220.7.1.el6
  • H
Directory Traversal

<0:2.6.32-573.12.1.el6
  • M
Race Condition

<0:2.6.32-642.el6
  • M
Improper Input Validation

<0:2.6.32-573.22.1.el6
  • M
Unchecked Error Condition

<0:2.6.32-573.el6
  • M
Improper Input Validation

<0:2.6.32-642.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • H
Incorrect Permission Assignment for Critical Resource

<0:2.6.32-573.12.1.el6
  • H
Incorrect Authorization

<0:2.6.32-220.4.1.el6
  • H
Deadlock

<0:2.6.32-504.16.2.el6
  • M
Race Condition

<0:2.6.32-642.el6
  • H
Information Exposure

<0:2.6.32-504.23.4.el6
  • H
CVE-2011-3188

<0:2.6.32-131.21.1.el6
  • H
Improper Access Control

<0:2.6.32-220.2.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-220.2.1.el6
  • H
Resource Management Errors

<0:2.6.32-131.21.1.el6
  • M
Heap-based Buffer Overflow

<0:2.6.32-642.el6
  • M
Information Exposure

<0:2.6.32-220.el6
  • M
CVE-2011-3347

<0:2.6.32-220.el6
  • M
NULL Pointer Dereference

<0:2.6.32-220.el6
  • M
CVE-2011-3638

<0:2.6.32-220.el6
  • H
Out-of-Bounds

<0:2.6.32-131.21.1.el6
  • H
Buffer Overflow

<0:2.6.32-131.21.1.el6
  • H
Out-of-Bounds

<0:2.6.32-131.21.1.el6
  • H
Out-of-Bounds

<0:2.6.32-131.21.1.el6
  • H
CVE-2011-2905

<0:2.6.32-131.21.1.el6
  • H
CVE-2011-2699

<0:2.6.32-131.21.1.el6
  • H
Information Exposure

<0:2.6.32-131.21.1.el6
  • H
Improper Input Validation

<0:2.6.32-131.21.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-573.3.1.el6
  • H
Out-of-Bounds

<0:2.6.32-131.21.1.el6
  • H
Information Exposure

<0:2.6.32-131.21.1.el6
  • H
CVE-2014-9585

<0:2.6.32-504.23.4.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-573.3.1.el6
  • H
Improper Input Validation

<0:2.6.32-131.17.1.el6
  • M
Use After Free

<0:2.6.32-504.30.3.el6
  • M
External Initialization of Trusted Variables or Data Stores

<0:2.6.32-504.30.3.el6
  • H
Resource Exhaustion

<0:2.6.32-131.17.1.el6
  • H
Information Exposure

<0:2.6.32-131.17.1.el6
  • H
Time-of-check Time-of-use (TOCTOU)

<0:2.6.32-131.17.1.el6
  • H
Information Exposure

<0:2.6.32-131.17.1.el6
  • H
Resource Management Errors

<0:2.6.32-131.17.1.el6
  • H
Numeric Errors

<0:2.6.32-131.17.1.el6
  • H
Improper Input Validation

<0:2.6.32-131.17.1.el6
  • H
Numeric Errors

<0:2.6.32-131.17.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-131.17.1.el6
  • H
Numeric Errors

<0:2.6.32-131.17.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-131.12.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-131.12.1.el6
  • H
Off-by-one Error

<0:2.6.32-131.12.1.el6
  • H
Resource Exhaustion

<0:2.6.32-131.12.1.el6
  • H
Information Exposure

<0:2.6.32-131.12.1.el6
  • H
Out-of-Bounds

<0:2.6.32-131.12.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-131.12.1.el6
  • H
Resource Exhaustion

<0:2.6.32-131.12.1.el6
  • H
Race Condition

<0:2.6.32-131.12.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-504.23.4.el6
  • M
Return of Wrong Status Code

<0:2.6.32-504.30.3.el6
  • H
Out-of-Bounds

<0:2.6.32-131.12.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-131.12.1.el6
  • H
Improper Access Control

<0:2.6.32-131.12.1.el6
  • H
Use After Free

<0:2.6.32-504.16.2.el6
  • H
Code

<0:2.6.32-504.23.4.el6
  • H
Improper Input Validation

<0:2.6.32-504.16.2.el6
  • H
Memory Leak

<0:2.6.32-131.12.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.29.2.el6
  • M
Race Condition

<0:2.6.32-131.6.1.el6
  • M
Resource Management Errors

<0:2.6.32-131.6.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-131.2.1.el6
  • M
CVE-2011-1767

<0:2.6.32-131.6.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-131.2.1.el6
  • H
CVE-2011-1182

<0:2.6.32-131.12.1.el6
  • H
Information Exposure

<0:2.6.32-71.31.1.el6
  • H
Information Exposure

<0:2.6.32-71.31.1.el6
  • H
Information Exposure

<0:2.6.32-71.31.1.el6
  • H
Out-of-Bounds

<0:2.6.32-71.31.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-131.2.1.el6
  • H
Resource Exhaustion

<0:2.6.32-131.2.1.el6
  • H
Improper Input Validation

<0:2.6.32-131.0.15.el6
  • H
NULL Pointer Dereference

<0:2.6.32-131.2.1.el6
  • H
Buffer Overflow

<0:2.6.32-71.31.1.el6
  • H
Information Exposure

<0:2.6.32-71.29.1.el6
  • H
CVE-2011-1023

<0:2.6.32-131.0.15.el6
  • H
Improper Input Validation

<0:2.6.32-71.31.1.el6
  • H
Resource Management Errors

<0:2.6.32-71.31.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.31.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.31.1.el6
  • H
Out-of-Bounds

<0:2.6.32-71.31.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.31.1.el6
  • H
Out-of-Bounds

<0:2.6.32-71.24.1.el6
  • H
Information Exposure

<0:2.6.32-71.31.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-71.24.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.31.1.el6
  • H
Missing Initialization of Resource

<0:2.6.32-71.29.1.el6
  • H
Improper Input Validation

<0:2.6.32-71.29.1.el6
  • H
Buffer Overflow

<0:2.6.32-71.29.1.el6
  • H
Information Exposure

<0:2.6.32-71.29.1.el6
  • H
Improper Input Validation

<0:2.6.32-71.29.1.el6
  • H
Memory Leak

<0:2.6.32-71.29.1.el6
  • H
Improper Input Validation

<0:2.6.32-71.29.1.el6
  • H
Incorrect Calculation

<0:2.6.32-71.29.1.el6
  • H
Improper Input Validation

<0:2.6.32-71.29.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-71.29.1.el6
  • H
Operation on a Resource after Expiration or Release

<0:2.6.32-71.29.1.el6
  • H
CVE-2011-1019

<0:2.6.32-71.29.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.29.1.el6
  • H
Out-of-bounds Write

<0:2.6.32-71.29.1.el6
  • H
Buffer Overflow

<0:2.6.32-504.23.4.el6
  • H
Out-of-bounds Write

<0:2.6.32-71.24.1.el6
  • H
Improper Initialization

<0:2.6.32-71.24.1.el6
  • H
Race Condition

<0:2.6.32-71.24.1.el6
  • H
Improper Synchronization

<0:2.6.32-71.24.1.el6
  • H
Resource Management Errors

<0:2.6.32-71.24.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-71.24.1.el6
  • H
Information Exposure

<0:2.6.32-71.24.1.el6
  • H
Use After Free

<0:2.6.32-504.16.2.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.12.2.el6
  • H
Information Exposure

<0:2.6.32-71.24.1.el6
  • H
CVE-2010-4648

<0:2.6.32-71.24.1.el6
  • H
Resource Management Errors

<0:2.6.32-71.18.2.el6
  • M
Resource Exhaustion

<0:2.6.32-71.18.1.el6
  • M
Divide By Zero

<0:2.6.32-71.18.1.el6
  • M
Use After Free

<0:2.6.32-71.18.1.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • H
Out-of-bounds Read

<0:2.6.32-504.16.2.el6
  • H
NULL Pointer Dereference

<0:2.6.32-504.16.2.el6
  • M
Information Exposure

<0:2.6.32-573.el6
  • H
Stack-based Buffer Overflow

<0:2.6.32-504.16.2.el6
  • H
Resource Exhaustion

<0:2.6.32-504.16.2.el6
  • H
Improper Input Validation

<0:2.6.32-504.12.2.el6
  • H
Resource Management Errors

<0:2.6.32-504.3.3.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.12.2.el6
  • H
Improper Input Validation

<0:2.6.32-504.3.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-504.8.1.el6
  • H
Improper Enforcement of Behavioral Workflow

<0:2.6.32-504.3.3.el6
  • H
Use After Free

<0:2.6.32-504.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-504.3.3.el6
  • H
Link Following

<0:2.6.32-504.el6
  • H
Resource Management Errors

<0:2.6.32-504.3.3.el6
  • H
Resource Exhaustion

<0:2.6.32-504.3.3.el6
  • H
Memory Leak

<0:2.6.32-71.14.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.8.1.el6
  • H
Use After Free

<0:2.6.32-504.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • H
Double Free

<0:2.6.32-71.14.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-431.5.1.el6
  • M
Off-by-one Error

<0:2.6.32-573.el6
  • H
Improper Input Validation

<0:2.6.32-504.3.3.el6
  • H
Out-of-Bounds

<0:2.6.32-504.1.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-71.14.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-71.14.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Race Condition

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.14.1.el6
  • H
Missing Initialization of Resource

<0:2.6.32-71.14.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.14.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.14.1.el6
  • H
Resource Management Errors

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Missing Initialization of Resource

<0:2.6.32-71.14.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Missing Initialization of Resource

<0:2.6.32-71.14.1.el6
  • H
Uncaught Exception

<0:2.6.32-504.1.3.el6
  • H
Race Condition

<0:2.6.32-504.1.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-504.el6
  • H
Out-of-bounds Write

<0:2.6.32-71.14.1.el6
  • H
Uncaught Exception

<0:2.6.32-504.1.3.el6
  • H
Improper Input Validation

<0:2.6.32-71.14.1.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
CVE-2010-4242

<0:2.6.32-71.14.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.14.1.el6
  • H
Use After Free

<0:2.6.32-504.el6
  • H
Missing Initialization of Resource

<0:2.6.32-71.14.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-71.7.1.el6
  • H
Out-of-Bounds

<0:2.6.32-71.7.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.29.2.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.7.1.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-71.7.1.el6
  • H
Off-by-one Error

<0:2.6.32-71.7.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.7.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-431.29.2.el6
  • H
Race Condition

<0:2.6.32-431.23.3.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-71.7.1.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-71.7.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.7.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-71.7.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.el6
  • H
Race Condition

<0:2.6.32-431.23.3.el6
  • H
Information Exposure

<0:2.6.32-71.7.1.el6
  • H
Incorrect Conversion between Numeric Types

<0:2.6.32-71.7.1.el6
  • H
Out-of-Bounds

<0:2.6.32-71.7.1.el6
  • H
External Control of Critical State Data

<0:2.6.32-431.20.5.el6
  • H
Improper Privilege Management

<0:2.6.32-431.20.5.el6
  • H
Execution with Unnecessary Privileges

<0:2.6.32-754.28.1.el6
  • M
Information Exposure

*
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.6.32-431.20.3.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-431.23.3.el6
  • H
Improper Privilege Management

<0:2.6.32-431.20.3.el6
  • H
Out-of-bounds Read

<0:2.6.32-431.23.3.el6
  • H
Information Exposure

<0:2.6.32-431.20.3.el6
  • M
Information Exposure

<0:2.6.32-754.31.1.el6
  • H
Use After Free

<0:2.6.32-431.23.3.el6
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • H
Race Condition

<0:2.6.32-358.6.1.el6
  • M
Use After Free

*
  • M
Information Exposure

*
  • H
Buffer Overflow

<0:2.6.32-754.29.1.el6
  • H
Privilege Context Switching Error

<0:2.6.32-504.16.2.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-696.28.1.el6
  • M
Out-of-Bounds

*
  • H
Improper Access Control

<0:2.6.32-754.24.3.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.24.2.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.24.2.el6
  • H
Improper Access Control

<0:2.6.32-754.24.2.el6
  • M
Out-of-Bounds

*
  • M
Use of Insufficiently Random Values

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Arbitrary Code Injection

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Memory Leak

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Use of Uninitialized Resource

*
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • M
Out-of-bounds Write

*
  • M
Insufficient Comparison

*
  • L
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Write

*
  • L
Use After Free

*
  • M
Incomplete Cleanup

*
  • M
Race Condition

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Write

*
  • L
Out-of-Bounds

*
  • M
Expected Behavior Violation

*
  • M
Improper Locking

*
  • M
Race Condition

*
  • M
Out-of-bounds Write

*
  • M
Race Condition

*
  • L
Resource Exhaustion

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
Use After Free

*
  • H
Use After Free

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Out-of-Bounds

*
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • M
Execution with Unnecessary Privileges

*
  • M
Resource Exhaustion

*
  • M
Buffer Overflow

*
  • M
Use After Free

*
  • L
Race Condition

*
  • M
Use After Free

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Null Byte Interaction Error (Poison Null Byte)

*
  • H
Resource Injection

*
  • M
Improper Access Control

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Resource Exhaustion

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Out-of-Bounds

*
  • M
Integer Overflow or Wraparound

<0:2.6.32-504.30.3.el6
  • M
Out-of-bounds Write

*
  • M
Incorrect Check of Function Return Value

*
  • L
Out-of-bounds Write

*
  • L
Improper Cleanup on Thrown Exception

*
  • M
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Integer Overflow or Wraparound

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Unchecked Error Condition

*
  • L
Information Exposure

*
  • M
Resource Exhaustion

*
  • H
Out-of-bounds Write

<0:2.6.32-754.25.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-754.24.2.el6
  • L
Out-of-bounds Read

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • H
Information Exposure

<0:2.6.32-754.18.2.el6
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • L
Memory Leak

*
  • L
Out-of-bounds Read

*
  • M
Missing Initialization of a Variable

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • H
Buffer Overflow

<0:2.6.32-754.23.1.el6
  • M
Heap-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Heap-based Buffer Overflow

*
  • L
Information Exposure

*
  • H
Covert Timing Channel

<0:2.6.32-754.18.2.el6
  • L
Information Exposure

*
  • H
NULL Pointer Dereference

<0:2.6.32-754.22.1.el6
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Information Exposure

*
  • L
Improper Input Validation

*
  • M
Reachable Assertion

*
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.15.3.el6
  • M
NULL Pointer Dereference

*
  • H
Resource Exhaustion

<0:2.6.32-754.15.3.el6
  • H
Resource Exhaustion

<0:2.6.32-754.15.3.el6
  • L
Improper Input Validation

*
  • L
Integer Overflow or Wraparound

*
  • L
Numeric Range Comparison Without Minimum Check

*
  • M
Missing Authorization

*
  • M
Out-of-bounds Write

*
  • L
Divide By Zero

*
  • M
Improper Authentication

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • L
Deadlock

*
  • L
Information Exposure

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.14.2.el6
  • H
Information Exposure

<0:2.6.32-754.14.2.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.14.2.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.14.2.el6
  • L
Out-of-bounds Read

*
  • L
Improper Access Control

*
  • L
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Error Handling

*
  • L
Out-of-bounds Read

*
  • L
Unchecked Error Condition

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Information Exposure

*
  • L
Incorrect Authorization

*
  • L
Out-of-bounds Read

*
  • M
Use After Free

*
  • L
Incorrect Check of Function Return Value

*
  • L
Use After Free

*
  • M
Race Condition

*
  • M
Missing Initialization of Resource

*
  • M
Integer Overflow or Wraparound

*
  • M
Race Condition

*
  • M
Out-of-bounds Write

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Buffer Overflow

*
  • L
Out-of-bounds Write

*
  • M
Improper Initialization

*
  • M
Information Exposure

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Uncaught Exception

*
  • M
Arbitrary Code Injection

*
  • L
Improper Input Validation

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • M
Use After Free

*
  • H
Improper Input Validation

<0:2.6.32-754.29.1.el6
  • L
Improper Input Validation

*
  • L
Out-of-bounds Write

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Buffer Overflow

*
  • H
Out-of-bounds Write

*
  • M
Directory Traversal

*
  • L
Out-of-bounds Read

*
  • M
Improper Locking

*
  • L
Information Exposure

*
  • M
Out-of-Bounds

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Heap-based Buffer Overflow

*
  • M
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Improper Initialization

*
  • L
Improper Initialization

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Predictable from Observable State

*
  • L
Improper Initialization

*
  • L
Use After Free

*
  • L
Untrusted Pointer Dereference

*
  • H
Race Condition

*
  • M
Resource Exhaustion

*
  • H
Improper Input Validation

*
  • M
Missing XML Validation

*
  • M
Resource Exhaustion

*
  • L
Information Exposure

*
  • M
Use After Free

*
  • L
Improper Initialization

*
  • M
Out-of-bounds Read

*
  • L
Use After Free

*
  • M
Execution with Unnecessary Privileges

*
  • M
Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Authorization

*
  • L
Improper Locking

*
  • M
Race Condition

*
  • M
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Missing Authorization

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • H
Stack-based Buffer Overflow

<0:2.6.32-642.11.1.el6
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Restriction of Excessive Authentication Attempts

*
  • M
Buffer Overflow

*
  • M
Improper Restriction of Excessive Authentication Attempts

*
  • L
Improper Restriction of Excessive Authentication Attempts

*
  • L
NULL Pointer Dereference

*
  • M
Authentication Bypass

*
  • M
Origin Validation Error

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Origin Validation Error

*
  • M
Origin Validation Error

*
  • M
Inclusion of Functionality from Untrusted Control Sphere

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Insufficient Verification of Data Authenticity

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Security Features

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Information Exposure

*
  • L
Out-of-bounds Write

*
  • M
Use After Free

*
  • L
Improper Cleanup on Thrown Exception

*
  • L
Unchecked Error Condition

*
  • L
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Code

*
  • L
Memory Leak

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
NULL Pointer Dereference

*
  • M
Authentication Bypass

*
  • M
Divide By Zero

*
  • L
Improper Initialization

*
  • M
Integer Overflow or Wraparound

*
  • M
Authentication Bypass by Primary Weakness

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Information Exposure

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Race Condition

*
  • M
Out-of-bounds Write

*
  • M
Uncaught Exception

*
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • L
Improper Cross-boundary Removal of Sensitive Data

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • L
Covert Timing Channel

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • M
Improper Handling of Length Parameter Inconsistency

*
  • L
Out-of-Bounds

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • L
Improper Enforcement of Behavioral Workflow

*
  • L
Files or Directories Accessible to External Parties

*
  • M
Resource Exhaustion

*
  • M
CVE-2012-3375

*
  • L
Security Features

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
Heap-based Buffer Overflow

*
  • M
Information Exposure

*
  • M
Heap-based Buffer Overflow

*
  • M
Race Condition

*
  • L
Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Resource Management Errors

*
  • M
Resource Exhaustion

*
  • L
Out-of-bounds Write

*
  • L
Resource Exhaustion

*
  • L
Missing Initialization of a Variable

*
  • L
Information Exposure

*
  • M
Improper Privilege Management

*
  • M
Access Restriction Bypass

*
  • M
Resource Exhaustion

*
  • H
Improper Input Validation

<0:2.6.32-431.20.3.el6
  • H
Information Exposure

<0:2.6.32-431.11.2.el6
  • M
Information Exposure

*
  • L
Use After Free

*
  • L
Out-of-Bounds

*
  • M
Race Condition

*
  • M
Cryptographic Issues

*
  • M
Resource Exhaustion

*
  • H
Access Restriction Bypass

<0:2.6.32-358.el6