CVE-2024-46839 | |
NULL Pointer Dereference | |
Divide By Zero | |
Unchecked Input for Loop Condition | |
CVE-2024-46830 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
CVE-2024-46855 | |
Use After Free | |
Improper Input Validation | |
NULL Pointer Dereference | |
CVE-2024-46825 | |
Improper Input Validation | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
CVE-2024-46823 | |
CVE-2024-46820 | |
Improper Validation of Array Index | |
CVE-2024-46861 | |
NULL Pointer Dereference | |
CVE-2024-46834 | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-46828 | |
Out-of-bounds Read | |
Double Free | |
Use After Free | |
Deadlock | |
Use After Free | |
Information Exposure | |
Use After Free | |
Improper Locking | |
NULL Pointer Dereference | |
Integer Underflow | |
CVE-2024-46771 | |
Integer Underflow | |
CVE-2024-46745 | |
Out-of-bounds Write | |
Link Following | |
CVE-2024-46777 | |
CVE-2024-46783 | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Integer Underflow | |
NULL Pointer Dereference | |
Uncontrolled Recursion | |
CVE-2024-46754 | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Improper Control of a Resource Through its Lifetime | |
Use After Free | |
CVE-2024-46767 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Improper Resource Shutdown or Release | |
Out-of-bounds Read | |
Resource Injection | |
CVE-2024-46715 | |
NULL Pointer Dereference | |
Improper Initialization | |
Race Condition | |
Improper Locking | |
CVE-2024-46787 | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Resource Injection | |
Improper Synchronization | |
Race Condition | |
Out-of-Bounds | |
Out-of-Bounds | |
Use of Uninitialized Variable | |
Improper Locking | |
Improper Initialization | |
CVE-2024-46706 | |
NULL Pointer Dereference | |
CVE-2024-46711 | |
Use After Free | |
Improper Authentication | |
Time-of-check Time-of-use (TOCTOU) | |
Race Condition | |
Double Free | |
Multiple Locks of a Critical Resource | |
Improper Locking | |
Out-of-bounds Read | |
CVE-2024-45017 | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-Bounds | |
Improper Control of a Resource Through its Lifetime | |
Insufficient Control Flow Management | |
Out-of-Bounds | |
Use of Uninitialized Variable | |
Use of Uninitialized Variable | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Improper Locking | |
Improper Control of a Resource Through its Lifetime | |
Improper Check or Handling of Exceptional Conditions | |
NULL Pointer Dereference | |
Improper Check or Handling of Exceptional Conditions | |
Uncontrolled Memory Allocation | |
Out-of-Bounds | |
CVE-2024-44984 | |
Improper Initialization | |
NULL Pointer Dereference | |
Use After Free | |
Improper Locking | |
Use After Free | |
Use of Uninitialized Resource | |
Improper Input Validation | |
Race Condition | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Deadlock | |
Improper Initialization | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Resource Leak | |
Memory Leak | |
Race Condition | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Use After Free | |
Divide By Zero | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Divide By Zero | |
Improper Input Validation | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Reachable Assertion | |
NULL Pointer Dereference | |
CVE-2024-42107 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Double Free | |
Use After Free | |
Out-of-Bounds | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Out-of-bounds Read | |
Memory Leak | |
CVE-2022-48936 | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Race Condition | |
Use After Free | |
Excessive Iteration | |
Memory Leak | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Buffer Overflow | |
Memory Leak | |
Missing Release of Resource after Effective Lifetime | |
Resource Leak | |
NULL Pointer Dereference | |
Improper Resource Shutdown or Release | |
Resource Leak | |
Improper Check or Handling of Exceptional Conditions | |
Deadlock | |
Resource Injection | |
Resource Leak | |
Resource Leak | |
Improper Access Control | |
NULL Pointer Dereference | |
Incorrect Privilege Assignment | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Resource Injection | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Memory Leak | |
Improper Input Validation | |
NULL Pointer Dereference | |
Resource Leak | |
Missing Release of Resource after Effective Lifetime | |
NULL Pointer Dereference | |
Incorrect Calculation of Buffer Size | |
Improper Handling of Length Parameter Inconsistency | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Use After Free | |
NULL Pointer Dereference | |
Resource Leak | |
Memory Leak | |
Resource Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Information Exposure | |
Incorrect Calculation | |
Improper Locking | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Use After Free | |
Resource Injection | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Missing Initialization of a Variable | |
Reachable Assertion | |
Improper Input Validation | |
Deadlock | |
Deadlock | |
Divide By Zero | |
Numeric Range Comparison Without Minimum Check | |
CVE-2024-42304 | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Injection | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Restriction of Power Consumption | |
NULL Pointer Dereference | |
Return of Wrong Status Code | |
CVE-2024-42322 | |
Multiple Locks of a Critical Resource | |
NULL Pointer Dereference | |
Race Condition | |
Improper Validation of Array Index | |
Use After Free | |
Improper Locking | |
Resource Exhaustion | |
Use After Free | |
Memory Leak | |
Improper Handling of Length Parameter Inconsistency | |
Resource Injection | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Use of Uninitialized Resource | |
Improper Input Validation | |
Allocation of Resources Without Limits or Throttling | |
Resource Injection | |
Resource Injection | |
Improper Locking | |
Resource Injection | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Resource Injection | |
Improper Clearing of Heap Memory Before Release ('Heap Inspection') | |
Resource Injection | |
Improper Input Validation | |
Resource Injection | |
Race Condition | |
Resource Injection | |
Resource Injection | |
Missing Synchronization | |
Use of Uninitialized Variable | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Improper Validation of Array Index | |
Use of Uninitialized Resource | |
Use of Uninitialized Variable | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use of Uninitialized Variable | |
Untrusted Pointer Dereference | |
NULL Pointer Dereference | |
Buffer Overflow | |
NULL Pointer Dereference | |
Improper Handling of Length Parameter Inconsistency | |
Deadlock | |
Resource Management Errors | |
Improper Resource Shutdown or Release | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Use After Free | |
Integer Overflow or Wraparound | |
Improper Resource Locking | |
Excessive Iteration | |
Resource Injection | |
Memory Leak | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Use After Free | |
Incomplete Internal State Distinction | |
Double Free | |
NULL Pointer Dereference | |
CVE-2024-42129 | |
Resource Injection | |
Use After Free | |
Allocation of Resources Without Limits or Throttling | |
Release of Invalid Pointer or Reference | |
Use After Free | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Double Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Exhaustion | |
NULL Pointer Dereference | |
Access of Uninitialized Pointer | |
Out-of-bounds Write | |
Use After Free | |
Use of Uninitialized Variable | |
NULL Pointer Dereference | |
Information Exposure | |
Static Code Injection | |
NULL Pointer Dereference | |
Incomplete Internal State Distinction | |
Divide By Zero | |
Use After Free | |
NULL Pointer Dereference | |
Double Free | |
Improper Input Validation | |
Improper Control of Document Type Definition | |
Deadlock | |
Incomplete Internal State Distinction | |
Stack-based Buffer Overflow | |
Incomplete Internal State Distinction | |
Deadlock | |
NULL Pointer Dereference | |
Resource Injection | |
Unchecked Return Value | |
Resource Injection | |
Deadlock | |
Information Exposure | |
Improper Update of Reference Count | |
Allocation of Resources Without Limits or Throttling | |
Improper Input Validation | |
Memory Leak | |
NULL Pointer Dereference | |
Double Free | |
Unchecked Return Value | |
Stack-based Buffer Overflow | |
Resource Injection | |
NULL Pointer Dereference | |
Heap-based Buffer Overflow | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Race Condition | |
Buffer Overflow | |
Resource Injection | |
Information Exposure | |
Resource Leak | |
Improper Resource Locking | |
Unchecked Return Value | |
Deadlock | |
Improper Input Validation | |
Use After Free | |
Heap-based Buffer Overflow | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Race Condition | |
Out-of-bounds Read | |
Incorrect Authorization | |
Stack-based Buffer Overflow | |
CVE-2024-40998 | |
Improper Input Validation | |
Resource Injection | |
Improper Input Validation | |
Resource Injection | |
Use After Free | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Resource Injection | |
Improper Update of Reference Count | |
Deadlock | |
Improper Input Validation | |
Resource Exhaustion | |
Improper Update of Reference Count | |
NULL Pointer Dereference | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Out-of-bounds Read | |
Resource Injection | |
NULL Pointer Dereference | |
Return of Wrong Status Code | |
Use After Free | |
Expired Pointer Dereference | |
Deadlock | |
Deadlock | |
NULL Pointer Dereference | |
Resource Leak | |
Use After Free | |
Improper Update of Reference Count | |
NULL Pointer Dereference | |
Expired Pointer Dereference | |
Resource Injection | |
Use After Free | |
Untrusted Pointer Dereference | |
Deadlock | |
Time-of-check Time-of-use (TOCTOU) | |
Use After Free | |
Resource Injection | |
Improper Locking | |
Use After Free | |
Resource Injection | |
NULL Pointer Dereference | |
Resource Injection | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Injection | |
Integer Overflow or Wraparound | |
Deadlock | |
Improper Synchronization | |
Improper Initialization | |
Use of Uninitialized Resource | |
Resource Leak | |
Use After Free | |
Out-of-bounds Write | |
Resource Injection | |
NULL Pointer Dereference | |
Improper Resource Locking | |
Resource Injection | |
Out-of-bounds Read | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Resource Injection | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Memory Leak | |
Improper Initialization | |
Memory Leak | |
Non-exit on Failed Initialization | |
CVE-2022-48849 | |
Out-of-bounds Read | |
Resource Injection | |
Use After Free | |
Integer Underflow | |
CVE-2022-48834 | |
Resource Injection | |
Resource Injection | |
Use After Free | |
Resource Injection | |
Integer Overflow or Wraparound | |
Use After Free | |
NULL Pointer Dereference | |
Improper Input Validation | |
Missing Lock Check | |
Use After Free | |
Race Condition | |
CVE-2022-48830 | |
Deadlock | |
Use After Free | |
Out-of-bounds Read | |
Race Condition | |
NULL Pointer Dereference | |
Resource Injection | |
CVE-2022-48836 | |
Resource Management Errors | |
CVE-2022-48831 | |
Resource Leak | |
Resource Injection | |
Resource Leak | |
NULL Pointer Dereference | |
State Issues | |
NULL Pointer Dereference | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Integer Overflow or Wraparound | |
Incorrect Check of Function Return Value | |
NULL Pointer Dereference | |
Release of Invalid Pointer or Reference | |
NULL Pointer Dereference | |
CVE-2022-48832 | |
CVE-2022-48802 | |
Permission Issues | |
CVE-2022-48811 | |
Resource Injection | |
CVE-2022-48785 | |
Improper Update of Reference Count | |
Deadlock | |
Resource Injection | |
Expired Pointer Dereference | |
Race Condition | |
Use After Free | |
Out-of-Bounds | |
Resource Leak | |
NULL Pointer Dereference | |
Race Condition | |
Use After Free | |
Use After Free | |
CVE-2024-39507 | |
CVE-2024-40901 | |
CVE-2024-39509 | |
Use After Free | |
Memory Leak | |
CVE-2024-39490 | |
Out-of-bounds Read | |
CVE-2024-39491 | |
Race Condition | |
CVE-2024-39488 | |
CVE-2024-36936 | |
Out-of-bounds Write | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Use After Free | |
Resource Injection | |
Deadlock | |
Covert Timing Channel | |
Out-of-bounds Read | |
Stack-based Buffer Overflow | |
Improper Initialization | |
Deadlock | |
Resource Leak | |
Resource Injection | |
Race Condition | |
Resource Injection | |
Use After Free | |
Resource Leak | |
Resource Injection | |
Double Free | |
Out-of-bounds Read | |
Double Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Improper Input Validation | |
Resource Leak | |
Improper Locking | |
Resource Leak | |
Resource Leak | |
Improper Input Validation | |
Improper Locking | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Injection | |
Improper Resource Locking | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Read | |
Resource Injection | |
Use After Free | |
Out-of-Bounds | |
Incomplete Cleanup | |
Improper Initialization | |
Use After Free | |
Race Condition | |
Improper Input Validation | |
Improper Locking | |
Use of Uninitialized Variable | |
Use of Uninitialized Variable | |
Use After Free | |
Resource Injection | |
Race Condition | |
Incomplete Cleanup | |
Deadlock | |
CVE-2024-38589 | |
Resource Exhaustion | |
CVE-2024-38573 | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Resource Injection | |
Improper Initialization | |
NULL Pointer Dereference | |
Improper Initialization | |
CVE-2024-38580 | |
NULL Pointer Dereference | |
Memory Leak | |
Out-of-bounds Read | |
Resource Leak | |
Out-of-Bounds | |
Missing Synchronization | |
Unchecked Return Value | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Incorrect Default Permissions | |
Resource Leak | |
NULL Pointer Dereference | |
Race Condition | |
CVE-2022-48764 | |
Resource Leak | |
Incomplete Internal State Distinction | |
Missing Initialization of Resource | |
Use After Free | |
CVE-2022-48751 | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
Buffer Underflow | |
Resource Leak | |
Resource Injection | |
Out-of-bounds Read | |
Use After Free | |
CVE-2022-48752 | |
Resource Leak | |
NULL Pointer Dereference | |
Improper Input Validation | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Out-of-bounds Read | |
Use of Uninitialized Variable | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Resource Leak | |
Missing Standardized Error Handling Mechanism | |
Deadlock | |
Allocation of Resources Without Limits or Throttling | |
NULL Pointer Dereference | |
Use After Free | |
Divide By Zero | |
Release of Invalid Pointer or Reference | |
Use of Uninitialized Variable | |
Race Condition | |
CVE-2021-47607 | |
Use After Free | |
Improper Locking | |
Out-of-bounds Write | |
Use After Free | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Resource Injection | |
Out-of-bounds Write | |
Memory Leak | |
Resource Injection | |
CVE-2024-36970 | |
CVE-2024-36966 | |
Resource Injection | |
Buffer Overflow | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
Deadlock | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Resource Leak | |
Use After Free | |
Race Condition | |
Resource Injection | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Race Condition | |
Resource Injection | |
Resource Leak | |
Stack-based Buffer Overflow | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Use After Free | |
Resource Injection | |
Improper Locking | |
Improper Locking | |
Out-of-bounds Read | |
Resource Injection | |
Improper Null Termination | |
Use of Uninitialized Variable | |
Resource Leak | |
Use After Free | |
Resource Injection | |
Improper Input Validation | |
Incomplete Cleanup | |
Resource Leak | |
Resource Injection | |
Improper Locking | |
Resource Leak | |
NULL Pointer Dereference | |
Race Condition | |
Off-by-one Error | |
NULL Pointer Dereference | |
Divide By Zero | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Improper Initialization | |
NULL Pointer Dereference | |
Use of Uninitialized Variable | |
Resource Leak | |
Integer Overflow or Wraparound | |
Improper Preservation of Permissions | |
NULL Pointer Dereference | |
CVE-2024-36918 | |
Untrusted Pointer Dereference | |
Resource Leak | |
Use After Free | |
Double Free | |
Time-of-check Time-of-use (TOCTOU) | |
Use After Free | |
Resource Injection | |
Improper Initialization | |
NULL Pointer Dereference | |
CVE-2024-36920 | |
Double Free | |
Resource Injection | |
Out-of-bounds Read | |
Deadlock | |
NULL Pointer Dereference | |
Use of Uninitialized Resource | |
Out-of-bounds Read | |
Deadlock | |
NULL Pointer Dereference | |
Leftover Debug Code | |
Out-of-Bounds | |
Out-of-bounds Write | |
Race Condition | |
Out-of-bounds Read | |
Race Condition | |
Improper Initialization | |
Memory Leak | |
Deadlock | |
NULL Pointer Dereference | |
Improper Resource Locking | |
Out-of-bounds Write | |
Resource Injection | |
Stack-based Buffer Overflow | |
Out-of-bounds Write | |
CVE-2023-52881 | |
CVE-2024-36015 | |
Resource Injection | |
Memory Leak | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Improper Update of Reference Count | |
Out-of-Bounds | |
Information Exposure | |
Improper Resource Shutdown or Release | |
Resource Exhaustion | |
NULL Pointer Dereference | |
Memory Leak | |
Resource Exhaustion | |
Improper Update of Reference Count | |
Memory Leak | |
NULL Pointer Dereference | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Resource Injection | |
Resource Exhaustion | |
Use After Free | |
Memory Leak | |
Race Condition | |
Out-of-bounds Write | |
Double Free | |
CVE-2021-47441 | |
Deadlock | |
Deadlock | |
Improper Initialization | |
Resource Leak | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
CVE-2021-47290 | |
NULL Pointer Dereference | |
CVE-2021-47272 | |
Resource Injection | |
CVE-2021-47276 | |
Out-of-bounds Write | |
Improper Initialization | |
Use After Free | |
Resource Injection | |
CVE-2021-47232 | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Use After Free | |
Use After Free | |
Deadlock | |
Out-of-bounds Read | |
Resource Leak | |
Resource Leak | |
NULL Pointer Dereference | |
Resource Leak | |
CVE-2021-47222 | |
Resource Leak | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Race Condition | |
NULL Pointer Dereference | |
Resource Leak | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Improper Initialization | |
Use After Free | |
Use After Free | |
Use After Free | |
Dead Code | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Double Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Resource Injection | |
NULL Pointer Dereference | |
Improper Resource Locking | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Deadlock | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
NULL Pointer Dereference | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Double Free | |
Resource Injection | |
NULL Pointer Dereference | |
Race Condition | |
Use After Free | |
Improper Validation of Array Index | |
Incomplete Cleanup | |
Resource Injection | |
Resource Injection | |
Incomplete Cleanup | |
Improper Validation of Array Index | |
External Control of System or Configuration Setting | |
NULL Pointer Dereference | |
Improper Input Validation | |
Resource Injection | |
Memory Leak | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Memory Leak | |
External Control of System or Configuration Setting | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
NULL Pointer Dereference | |
Resource Leak | |
Improper Resource Shutdown or Release | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Divide By Zero | |
Out-of-bounds Read | |
Race Condition | |
Improper Locking | |
Double Free | |
Improper Resource Shutdown or Release | |
Missing Initialization of a Variable | |
Use After Free | |
Resource Injection | |
Use After Free | |
CVE-2021-47455 | |
Resource Injection | |
Improper Check for Unusual or Exceptional Conditions | |
Memory Leak | |
Resource Leak | |
Improper Control of a Resource Through its Lifetime | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
CVE-2021-47432 | |
CVE-2021-47384 | |
CVE-2021-47430 | |
Improper Input Validation | |
Resource Leak | |
Resource Leak | |
CVE-2021-47377 | |
Out-of-bounds Read | |
Access of Uninitialized Pointer | |
NULL Pointer Dereference | |
Resource Leak | |
NULL Pointer Dereference | |
Resource Leak | |
NULL Pointer Dereference | |
CVE-2021-47327 | |
Memory Leak | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Improper Input Validation | |
Resource Leak | |
Resource Injection | |
Reachable Assertion | |
Resource Leak | |
Resource Leak | |
Use After Free | |
Use After Free | |
Resource Leak | |
Deadlock | |
NULL Pointer Dereference | |
CVE-2024-36000 | |
Memory Leak | |
CVE-2024-35998 | |
CVE-2024-35976 | |
CVE-2024-35995 | |
CVE-2024-35957 | |
CVE-2024-35926 | |
CVE-2024-35966 | |
CVE-2024-35960 | |
CVE-2024-35964 | |
CVE-2024-35958 | |
CVE-2024-35944 | |
CVE-2024-35950 | |
CVE-2024-35939 | |
CVE-2024-36004 | |
CVE-2024-35946 | |
CVE-2024-35962 | |
CVE-2024-35979 | |
CVE-2024-35959 | |
CVE-2024-35942 | |
CVE-2024-35943 | |
CVE-2024-35989 | |
CVE-2024-35963 | |
CVE-2024-35952 | |
CVE-2024-35884 | |
CVE-2024-35923 | |
CVE-2024-35918 | |
CVE-2024-35872 | |
CVE-2024-35867 | |
Use After Free | |
Use After Free | |
CVE-2024-35885 | |
CVE-2024-35879 | |
Use After Free | |
CVE-2024-35875 | |
CVE-2024-35860 | |
CVE-2024-35868 | |
CVE-2024-36005 | |
CVE-2024-35861 | |
CVE-2024-35981 | |
CVE-2024-35969 | |
CVE-2024-35983 | |
Use After Free | |
CVE-2024-35954 | |
CVE-2024-35974 | |
CVE-2024-35934 | |
CVE-2024-35945 | |
CVE-2024-35922 | |
CVE-2024-35880 | |
CVE-2024-35980 | |
CVE-2024-36002 | |
CVE-2024-36007 | |
Use After Free | |
CVE-2024-35991 | |
CVE-2024-35999 | |
CVE-2024-35973 | |
CVE-2024-35876 | |
CVE-2024-36006 | |
CVE-2024-35869 | |
CVE-2024-35937 | |
CVE-2024-35967 | |
Memory Leak | |
CVE-2024-35933 | |
CVE-2024-36003 | |
CVE-2024-35865 | |
CVE-2024-35925 | |
CVE-2024-35938 | |
CVE-2024-35924 | |
CVE-2024-35965 | |
CVE-2024-35878 | |
CVE-2024-35877 | |
CVE-2024-35931 | |
CVE-2024-35890 | |
CVE-2024-35896 | |
CVE-2024-35947 | |
CVE-2024-35894 | |
CVE-2024-35899 | |
CVE-2024-35897 | |
CVE-2024-35930 | |
CVE-2024-35912 | |
CVE-2024-35904 | |
CVE-2024-35927 | |
CVE-2024-35892 | |
CVE-2024-35907 | |
CVE-2024-35908 | |
CVE-2024-35891 | |
CVE-2024-35886 | |
CVE-2024-35901 | |
CVE-2024-35900 | |
CVE-2024-35895 | |
CVE-2024-35905 | |
CVE-2024-35887 | |
CVE-2024-35898 | |
CVE-2024-35917 | |
CVE-2024-35928 | |
CVE-2024-35913 | |
CVE-2024-35911 | |
CVE-2024-35903 | |
CVE-2024-35929 | |
CVE-2024-35888 | |
CVE-2023-52662 | |
CVE-2023-52663 | |
CVE-2023-52661 | |
CVE-2024-35810 | |
CVE-2024-35859 | |
CVE-2024-35823 | |
CVE-2024-35853 | |
CVE-2024-35847 | |
CVE-2024-35840 | |
CVE-2024-35855 | |
CVE-2024-35803 | |
CVE-2024-35818 | |
CVE-2024-35817 | |
CVE-2024-35812 | |
CVE-2024-35794 | |
CVE-2024-35808 | |
CVE-2024-35824 | |
CVE-2024-35805 | |
CVE-2024-35789 | |
CVE-2024-35787 | |
CVE-2024-35790 | |
CVE-2024-35848 | |
CVE-2024-27435 | |
CVE-2024-35839 | |
NULL Pointer Dereference | |
Improper Input Validation | |
CVE-2024-35836 | |
CVE-2024-35800 | |
Resource Leak | |
CVE-2024-35854 | |
Missing Synchronization | |
CVE-2024-35807 | |
Missing Synchronization | |
CVE-2024-27404 | |
CVE-2024-27417 | |
Missing Synchronization | |
CVE-2024-27431 | |
Premature Release of Resource During Expected Lifetime | |
CVE-2024-35838 | |
CVE-2024-35852 | |
CVE-2024-27415 | |
Missing Synchronization | |
Missing Synchronization | |
CVE-2024-35814 | |
CVE-2024-35843 | |
Resource Exhaustion | |
CVE-2024-35797 | |
CVE-2024-35834 | |
CVE-2024-35835 | |
CVE-2024-35827 | |
CVE-2024-35801 | |
Missing Synchronization | |
Missing Synchronization | |
CVE-2024-35822 | |
CVE-2024-27414 | |
CVE-2024-27403 | |
Missing Synchronization | |
Missing Synchronization | |
CVE-2024-35809 | |
CVE-2024-27436 | |
CVE-2024-35826 | |
CVE-2024-35804 | |
CVE-2024-35791 | |
Missing Synchronization | |
Missing Synchronization | |
CVE-2024-27413 | |
CVE-2024-35802 | |
Missing Synchronization | |
CVE-2024-27434 | |
CVE-2024-27410 | |
CVE-2023-52669 | |
CVE-2023-52680 | |
CVE-2023-52658 | |
CVE-2023-52679 | |
CVE-2023-52674 | |
CVE-2023-52698 | |
CVE-2023-52696 | |
CVE-2023-52686 | |
Double Free | |
CVE-2023-52676 | |
CVE-2023-52659 | |
CVE-2023-52675 | |
CVE-2023-52664 | |
CVE-2023-52689 | |
CVE-2023-52690 | |
CVE-2023-52697 | |
CVE-2023-52683 | |
CVE-2023-52672 | |
CVE-2024-27393 | |
CVE-2024-27399 | |
CVE-2024-27398 | |
CVE-2024-27397 | |
CVE-2024-27395 | |
CVE-2024-21823 | |
CVE-2023-52656 | |
CVE-2023-52654 | |
CVE-2024-26974 | |
CVE-2022-48702 | |
Memory Leak | |
CVE-2022-48694 | |
CVE-2022-48704 | |
Out-of-bounds Read | |
Race Condition | |
CVE-2022-48705 | |
CVE-2022-48703 | |
Off-by-one Error | |
Improper Locking | |
Use After Free | |
CVE-2022-48701 | |
CVE-2022-48695 | |
Improper Handling of Exceptional Conditions | |
CVE-2022-48697 | |
CVE-2022-48690 | |
NULL Pointer Dereference | |
Memory Leak | |
NULL Pointer Dereference | |
CVE-2024-27057 | |
CVE-2024-27390 | |
CVE-2024-27073 | |
CVE-2024-27003 | |
CVE-2024-27077 | |
CVE-2024-27030 | |
Race Condition | |
CVE-2024-27017 | |
CVE-2024-27011 | |
Race Condition | |
CVE-2024-27038 | |
CVE-2024-26993 | |
CVE-2024-27026 | |
CVE-2024-27052 | |
CVE-2024-27389 | |
CVE-2024-26991 | |
CVE-2024-27049 | |
CVE-2024-27010 | |
CVE-2024-27065 | |
CVE-2024-27056 | |
CVE-2024-27004 | |
Memory Leak | |
CVE-2024-27048 | |
CVE-2024-27042 | |
CVE-2024-26976 | |
Improper Locking | |
CVE-2024-27016 | |
Behavioral Change in New Version or Environment | |
CVE-2024-27027 | |
CVE-2024-26989 | |
CVE-2024-27025 | |
Improper Locking | |
CVE-2024-27031 | |
Improper Resource Locking | |
NULL Pointer Dereference | |
CVE-2024-26975 | |
Allocation of Resources Without Limits or Throttling | |
CVE-2024-27023 | |
CVE-2024-27059 | |
CVE-2024-26962 | |
Out-of-bounds Read | |
CVE-2024-26938 | |
Double Free | |
CVE-2024-27046 | |
Missing Synchronization | |
Race Condition | |
CVE-2024-27055 | |
CVE-2024-27002 | |
CVE-2024-26992 | |
CVE-2024-27079 | |
CVE-2024-26988 | |
Race Condition | |
Incomplete Cleanup | |
Memory Leak | |
CVE-2024-26953 | |
CVE-2024-26999 | |
CVE-2024-26990 | |
CVE-2024-26950 | |
CVE-2024-26973 | |
Improper Locking | |
CVE-2024-26958 | |
CVE-2024-27039 | |
CVE-2024-26945 | |
CVE-2024-26951 | |
NULL Pointer Dereference | |
CVE-2024-26960 | |
Improper Locking | |
CVE-2024-27015 | |
CVE-2024-26946 | |
CVE-2024-26964 | |
CVE-2024-26939 | |
Reachable Assertion | |
CVE-2024-26935 | |
Double Free | |
Improper Input Validation | |
CVE-2023-52651 | |
CVE-2023-52650 | |
CVE-2023-52653 | |
CVE-2023-52649 | |
CVE-2023-52648 | |
CVE-2022-48669 | |
Stack-based Buffer Overflow | |
Improper Neutralization of Null Byte or NUL Character | |
Race Condition | |
Use After Free | |
Deadlock | |
Use After Free | |
Out-of-Bounds | |
Integer Underflow | |
NULL Pointer Dereference | |
Integer Underflow | |
Double Free | |
Integer Overflow or Wraparound | |
CVE-2022-48662 | |
Use After Free | |
Incomplete Internal State Distinction | |
Improper Handling of Values | |
Resource Exhaustion | |
NULL Pointer Dereference | |
Modules with Circular Dependencies | |
Resource Exhaustion | |
Access of Uninitialized Pointer | |
NULL Pointer Dereference | |
Attempt to Access Child of a Non-structure Pointer | |
NULL Pointer Dereference | |
Heap-based Buffer Overflow | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Resource Exhaustion | |
Integer Underflow | |
Resource Leak | |
Improper Validation of Specified Index, Position, or Offset in Input | |
Use After Free | |
Race Condition | |
Race Condition | |
Improper Locking | |
Improper Input Validation | |
Deadlock | |
NULL Pointer Dereference | |
Resource Leak | |
NULL Pointer Dereference | |
Race Condition | |
Buffer Underflow | |
Race Condition | |
Resource Injection | |
Race Condition | |
Improper Input Validation | |
Buffer Overflow | |
Improper Input Validation | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
Resource Injection | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Resource Leak | |
Resource Leak | |
Resource Injection | |
Resource Leak | |
Unchecked Return Value to NULL Pointer Dereference | |
Improper Input Validation | |
CVE-2024-26920 | |
Improper Input Validation | |
Stack-based Buffer Overflow | |
Memory Leak | |
Out-of-bounds Read | |
Resource Injection | |
Improper Input Validation | |
Improper Resource Locking | |
Data Element containing Pointer Item without Proper Copy Control Element | |
CVE-2024-26918 | |
Race Condition | |
Stack-based Buffer Overflow | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Divide By Zero | |
NULL Pointer Dereference | |
Improper Input Validation | |
Resource Leak | |
Improper Input Validation | |
Buffer Access with Incorrect Length Value | |
NULL Pointer Dereference | |
Resource Leak | |
Out-of-bounds Read | |
Use After Free | |
NULL Pointer Dereference | |
Resource Leak | |
Resource Injection | |
Improper Neutralization of Null Byte or NUL Character | |
Excessive Platform Resource Consumption within a Loop | |
Improper Input Validation | |
Out-of-bounds Read | |
Resource Injection | |
NULL Pointer Dereference | |
Race Condition | |
CVE-2024-26782 | |
CVE-2024-26786 | |
Mismatched Memory Management Routines | |
Resource Injection | |
CVE-2024-26803 | |
Use After Free | |
Resource Exhaustion | |
CVE-2024-26804 | |
CVE-2024-26801 | |
Improper Input Validation | |
Deadlock | |
Improper Handling of Values | |
Divide By Zero | |
Improper Handling of Values | |
Incomplete Cleanup | |
Race Condition | |
Improper Null Termination | |
Improper Input Validation | |
Divide By Zero | |
Race Condition | |
Deadlock | |
Unchecked Input for Loop Condition | |
Improper Null Termination | |
Use After Free | |
Resource Injection | |
NULL Pointer Dereference | |
Deadlock | |
Double Free | |
Race Condition | |
Deadlock | |
Heap-based Buffer Overflow | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Divide By Zero | |
Improper Input Validation | |
Resource Injection | |
Improper Null Termination | |
Improper Input Validation | |
Improper Handling of Undefined Parameters | |
Race Condition | |
Race Condition | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Improper Input Validation | |
CVE-2024-26707 | |
NULL Pointer Dereference | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Use After Free | |
Deadlock | |
Race Condition | |
Resource Injection | |
Unchecked Input for Loop Condition | |
Improper Protection Against Physical Side Channels | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Read | |
Resource Injection | |
CVE-2024-26666 | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-bounds Read | |
Resource Leak | |
Resource Injection | |
Resource Injection | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Resource Injection | |
Missing Lock Check | |
Improper Locking | |
Integer Underflow | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Race Condition | |
Resource Injection | |
Out-of-bounds Read | |
Race Condition | |
Resource Injection | |
Improper Resource Locking | |
Incorrect Calculation of Buffer Size | |
Resource Injection | |
Race Condition | |
CVE-2023-28746 | |
Improper Input Validation | |
Improper Input Validation | |
Missing Initialization of a Variable | |
Improper Input Validation | |
Resource Injection | |
Missing Lock Check | |
Resource Injection | |
Resource Exhaustion | |
Stack-based Buffer Overflow | |
Resource Leak | |
Stack-based Buffer Overflow | |
Unchecked Input for Loop Condition | |
Memory Leak | |
Return of Wrong Status Code | |
Use After Free | |
Use of NullPointerException Catch to Detect NULL Pointer Dereference | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Improper Input Validation | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Deadlock | |
Deadlock | |
Improper Resource Locking | |
Deadlock | |
NULL Pointer Dereference | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Resource Exhaustion | |
Return of Stack Variable Address | |
Race Condition | |
Race Condition | |
NULL Pointer Dereference | |
Improper Resource Shutdown or Release | |
NULL Pointer Dereference | |
Improper Protection Against Physical Side Channels | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
Use of Uninitialized Variable | |
Improper Input Validation | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Resource Leak | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
CVE-2024-26602 | |
Unchecked Return Value | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Incorrect Calculation of Buffer Size | |
Use After Free | |
Stack-based Buffer Overflow | |
Race Condition | |
NULL Pointer Dereference | |
CVE-2023-52520 | |
CVE-2023-52575 | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Improper Input Validation | |
Race Condition | |
Improper Input Validation | |
Memory Leak | |
Resource Leak | |
Memory Leak | |
Resource Injection | |
Improper Handling of Overlap Between Protected Memory Ranges | |
Missing Encryption of Sensitive Data | |
Use After Free | |
NULL Pointer Dereference | |
Resource Leak | |
Resource Injection | |
Resource Leak | |
Resource Leak | |
NULL Pointer Dereference | |
Memory Leak | |
Use After Free | |
Memory Leak | |
Deadlock | |
Use After Free | |
Out-of-bounds Read | |
Resource Leak | |
Deadlock | |
Out-of-Bounds | |
Use After Free | |
Resource Leak | |
Resource Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Resource Leak | |
Resource Leak | |
Race Condition | |
Improper Check or Handling of Exceptional Conditions | |
Stack-based Buffer Overflow | |
Use After Free | |
Range Error | |
Resource Leak | |
Improper Input Validation | |
Resource Injection | |
Missing Support for Integrity Check | |
Unchecked Error Condition | |
Use After Free | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
CVE-2023-52474 | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Range Error | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
NULL Pointer Dereference | |
Deadlock | |
Use After Free | |
NULL Pointer Dereference | |
Untrusted Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2023-52462 | |
Use After Free | |
CVE-2023-52455 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Buffer Access with Incorrect Length Value | |
NULL Pointer Dereference | |
Improper Initialization | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
Return of Wrong Status Code | |
Use After Free | |
CVE-2024-26581 | |
Out-of-Bounds | |
Use After Free | |
Improper Authentication | |
Memory Leak | |
Improper Check for Unusual or Exceptional Conditions | |
CVE-2024-25744 | |
Stack-based Buffer Overflow | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Information Exposure | |
Use After Free | |
Information Exposure | |
Integer Overflow or Wraparound | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | |
Resource Exhaustion | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Deadlock | |
Deadlock | |
Improper Handling of Values | |
Integer Underflow | |
NULL Pointer Dereference | |
Resource Leak | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Race Condition | |
Use After Free | |
Memory Leak | |
Race Condition | |
Race Condition | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Man-in-the-Middle (MitM) | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Sensitive Information Uncleared Before Release | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Insufficient Comparison | |
Resource Exhaustion | |
Authentication Bypass | |
Allocation of Resources Without Limits or Throttling | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Information Exposure | |
Race Condition | |
Use After Free | |
Improper Handling of Exceptional Conditions | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Improper Privilege Management | |
Improper Update of Reference Count | |
Buffer Overflow | |
Double Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Race Condition | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Improper Access Control | |
Use After Free | |
Stack-based Buffer Overflow | |
Improper Validation of Array Index | |
Information Exposure | |
Out-of-bounds Read | |
Use After Free | |
Time-of-check Time-of-use (TOCTOU) | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Improper Zeroization of Hardware Register | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Double Free | |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | |
Information Exposure | |
Out-of-bounds Read | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Race Condition | |
Double Free | |
Use of a Broken or Risky Cryptographic Algorithm | |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
Improper Resource Locking | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Incorrect Bitwise Shift of Integer | |
CVE-2023-31084 | |
Divide By Zero | |
Race Condition | |
Release of Invalid Pointer or Reference | |
Information Exposure | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Reachable Assertion | |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Execution with Unnecessary Privileges | <0:5.14.0-284.18.1.rt14.303.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Improper Resource Locking | |
Exposure of Resource to Wrong Sphere | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Update of Reference Count | |
Improperly Implemented Security Check for Standard | |
Out-of-bounds Write | <0:5.14.0-284.18.1.rt14.303.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Read | |
Out-of-bounds Read | <0:5.14.0-284.18.1.rt14.303.el9_2 |
NULL Pointer Dereference | |
Use After Free | |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Improper Validation of Array Index | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Incorrect Authorization | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Double Free | |
Interpretation Conflict | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | |
Use of Uninitialized Variable | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Out-of-bounds Read | |
Use After Free | |
Double Free | <0:5.14.0-162.22.2.rt21.186.el9_1 |
Improper Ownership Management | <0:5.14.0-162.23.1.rt21.186.el9_1 |
Improper Initialization | |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
NULL Pointer Dereference | |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Authentication Bypass | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
CVE-2022-27672 | |
Use After Free | |
NULL Pointer Dereference | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Memory Leak | |
Out-of-bounds Write | |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Externally Controlled Reference to a Resource in Another Sphere | |
Memory Leak | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Write-what-where Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Use After Free | <0:5.14.0-162.22.2.rt21.186.el9_1 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-162.18.1.rt21.181.el9_1 |
Use After Free | |
Insecure Default Initialization of Resource | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Memory Leak | |
Use After Free | <0:5.14.0-162.18.1.rt21.181.el9_1 |
Non-exit on Failed Initialization | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | |
Information Exposure | |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Logging of Excessive Data | |
Unchecked Return Value | <0:5.14.0-162.6.1.rt21.168.el9_1 |
NULL Pointer Dereference | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Buffer Overflow | <0:5.14.0-162.18.1.rt21.181.el9_1 |
Integer Overflow or Wraparound | |
Memory Leak | |
Memory Leak | |
Race Condition | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Use After Free | <0:5.14.0-162.18.1.rt21.181.el9_1 |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | |
Improper Locking | |
Deadlock | <0:5.14.0-162.22.2.rt21.186.el9_1 |
Improper Preservation of Permissions | <0:5.14.0-162.12.1.rt21.175.el9_1 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Access of Uninitialized Pointer | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition During Access to Alternate Channel | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Allocation of Resources Without Limits or Throttling | <0:5.14.0-162.12.1.rt21.175.el9_1 |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Authentication Bypass by Primary Weakness | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Information Exposure | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Information Exposure | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Information Exposure | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Information Exposure | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Information Exposure | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | |
Expected Behavior Violation | |
Incorrect Control Flow Scoping | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Input Validation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Read | |
Missing Report of Error Condition | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Expected Behavior Violation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Write | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Buffer Overflow | <0:5.14.0-162.12.1.rt21.175.el9_1 |
Improper Restriction of Communication Channel to Intended Endpoints | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Read | |
Out-of-Bounds | <0:5.14.0-162.12.1.rt21.175.el9_1 |
Improper Locking | <0:5.14.0-162.12.1.rt21.175.el9_1 |
Improper Update of Reference Count | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Incorrect Calculation of Buffer Size | <0:5.14.0-162.18.1.rt21.181.el9_1 |
Incomplete Cleanup | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Incomplete Cleanup | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Incomplete Cleanup | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | <0:5.14.0-70.30.1.rt21.102.el9_0 |
CVE-2022-36946 | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Incorrect Conversion between Numeric Types | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Comparison Using Wrong Factors | <0:5.14.0-70.26.1.rt21.98.el9_0 |
Use After Free | <0:5.14.0-70.17.1.rt21.89.el9_0 |
NULL Pointer Dereference | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Privilege Defined With Unsafe Actions | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Buffer Overflow | <0:5.14.0-70.26.1.rt21.98.el9_0 |
Out-of-bounds Write | |
Use After Free | <0:5.14.0-162.6.1.rt21.168.el9_1 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Time-of-check Time-of-use (TOCTOU) | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-70.17.1.rt21.89.el9_0 |
NULL Pointer Dereference | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Race Condition | <0:5.14.0-70.17.1.rt21.89.el9_0 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Incorrect Default Permissions | <0:5.14.0-162.12.1.rt21.175.el9_1 |
Improper Cross-boundary Removal of Sensitive Data | |
Race Condition | |
Use After Free | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Information Exposure | <0:5.14.0-70.17.1.rt21.89.el9_0 |
Use After Free | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Improper Cross-boundary Removal of Sensitive Data | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Double Free | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | <0:5.14.0-70.22.1.rt21.94.el9_0 |
Information Exposure | |
Missing Initialization of Resource | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use After Free | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Heap-based Buffer Overflow | <0:5.14.0-70.17.1.rt21.89.el9_0 |
NULL Pointer Dereference | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Use of Uninitialized Resource | <0:5.14.0-70.22.1.rt21.94.el9_0 |
Memory Leak | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Information Exposure | |
Memory Leak | |
Authentication Bypass | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Out-of-bounds Write | |
Improper Preservation of Permissions | |
NULL Pointer Dereference | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Buffer Overflow | |
Memory Leak | |
Use of Uninitialized Resource | <0:5.14.0-162.6.1.rt21.168.el9_1 |
Allocation of Resources Without Limits or Throttling | |
Release of Invalid Pointer or Reference | |
Out-of-Bounds | |
Out-of-bounds Write | |
Race Condition | <0:5.14.0-162.6.1.rt21.168.el9_1 |