CVE-2025-39825 | |
CVE-2025-39819 | |
CVE-2025-39818 | |
CVE-2025-39806 | |
CVE-2025-39835 | |
CVE-2025-39813 | |
CVE-2025-39823 | |
CVE-2025-39829 | |
CVE-2025-39830 | |
CVE-2025-39824 | |
CVE-2025-39828 | |
CVE-2025-39817 | |
CVE-2025-39809 | |
CVE-2025-39832 | |
CVE-2025-39810 | |
CVE-2025-39808 | |
CVE-2025-39811 | |
CVE-2025-39834 | |
Race Condition | |
CVE-2022-50342 | |
CVE-2024-26918 | |
CVE-2023-53334 | |
CVE-2023-53321 | |
CVE-2023-53332 | |
CVE-2023-53291 | |
CVE-2023-53299 | |
CVE-2023-53317 | |
CVE-2023-53268 | |
CVE-2023-53331 | |
CVE-2023-53296 | |
CVE-2023-53306 | |
CVE-2023-53293 | |
CVE-2023-53282 | |
CVE-2023-53315 | |
CVE-2023-53261 | |
CVE-2023-53271 | |
CVE-2023-53307 | |
CVE-2023-53326 | |
CVE-2023-53320 | |
CVE-2023-53287 | |
CVE-2023-53329 | |
CVE-2023-53199 | |
CVE-2023-53288 | |
CVE-2023-53273 | |
CVE-2023-53286 | |
CVE-2023-53292 | |
CVE-2023-53297 | |
CVE-2023-53270 | |
CVE-2023-53280 | |
CVE-2023-53241 | |
CVE-2023-53279 | |
CVE-2023-53309 | |
CVE-2023-53333 | |
CVE-2023-53290 | |
CVE-2023-53319 | |
CVE-2023-53322 | |
CVE-2023-53263 | |
CVE-2023-53304 | |
CVE-2023-53295 | |
CVE-2023-53313 | |
CVE-2023-53285 | |
CVE-2023-53305 | |
CVE-2023-53264 | |
CVE-2023-53272 | |
CVE-2023-53327 | |
CVE-2023-53275 | |
CVE-2023-53265 | |
CVE-2022-50347 | |
CVE-2022-50341 | |
CVE-2022-50345 | |
CVE-2022-50351 | |
CVE-2022-50352 | |
CVE-2022-50349 | |
CVE-2022-50348 | |
CVE-2022-50339 | |
CVE-2022-50304 | |
CVE-2022-50350 | |
CVE-2022-50344 | |
CVE-2022-50313 | |
CVE-2025-38683 | |
CVE-2025-38706 | |
Access of Uninitialized Pointer | |
CVE-2025-38703 | |
CVE-2025-38695 | |
Out-of-bounds Read | |
CVE-2025-38724 | |
CVE-2025-39801 | |
CVE-2025-39773 | |
CVE-2025-38511 | |
CVE-2025-38709 | |
CVE-2025-38688 | |
Improper Update of Reference Count | |
CVE-2025-38700 | |
CVE-2025-38509 | |
CVE-2025-38512 | |
CVE-2025-38470 | |
CVE-2025-38710 | |
CVE-2025-38701 | |
CVE-2025-38684 | |
CVE-2025-38489 | |
Improper Input Validation | |
Integer Underflow | |
Resource Injection | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | |
CVE-2024-36007 | |
CVE-2024-39490 | |
NULL Pointer Dereference | |
Improper Locking | |
Improper Locking | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2024-35860 | |
CVE-2023-53254 | |
CVE-2023-53236 | |
CVE-2023-53258 | |
CVE-2023-53259 | |
CVE-2023-53249 | |
CVE-2023-53233 | |
CVE-2023-53221 | |
CVE-2023-53196 | |
CVE-2023-53205 | |
CVE-2023-53242 | |
Out-of-bounds Read | |
CVE-2023-53180 | |
CVE-2023-53175 | |
CVE-2023-53150 | |
CVE-2023-53215 | |
CVE-2023-53152 | |
CVE-2023-53252 | |
CVE-2023-53184 | |
CVE-2023-53218 | |
CVE-2023-53248 | |
Memory Leak | |
CVE-2023-53202 | |
CVE-2023-53197 | |
CVE-2023-53235 | |
CVE-2023-53182 | |
CVE-2023-53173 | |
CVE-2023-53167 | |
CVE-2023-53165 | |
CVE-2023-53232 | |
CVE-2023-53234 | |
CVE-2023-53151 | |
CVE-2023-53192 | |
CVE-2023-53178 | |
CVE-2023-53195 | |
CVE-2023-53216 | |
CVE-2023-53189 | |
NULL Pointer Dereference | |
CVE-2023-53224 | |
CVE-2023-53237 | |
CVE-2023-53250 | |
CVE-2023-53198 | |
CVE-2023-53185 | |
CVE-2023-53153 | |
CVE-2023-53186 | |
CVE-2023-53228 | |
CVE-2023-53172 | |
CVE-2023-53149 | |
NULL Pointer Dereference | |
CVE-2023-53147 | |
CVE-2023-53193 | |
CVE-2023-53253 | |
CVE-2023-53230 | |
CVE-2023-53260 | |
CVE-2023-53190 | |
CVE-2023-53220 | |
CVE-2023-53181 | |
CVE-2023-53211 | |
CVE-2023-53240 | |
CVE-2023-53245 | |
CVE-2023-53209 | |
CVE-2023-53208 | |
CVE-2023-53251 | |
CVE-2023-53257 | |
CVE-2023-53246 | |
CVE-2023-53164 | |
CVE-2023-53256 | |
CVE-2023-53204 | |
CVE-2023-52675 | |
CVE-2023-53168 | |
CVE-2023-53210 | |
CVE-2023-53213 | |
CVE-2023-53176 | |
CVE-2023-53229 | |
CVE-2023-53179 | |
CVE-2023-53174 | |
CVE-2023-53225 | |
CVE-2023-53148 | |
CVE-2023-53201 | |
CVE-2023-53188 | |
Use After Free | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
Out-of-bounds Read | |
CVE-2022-50328 | |
Improper Resource Locking | |
Improper Control of a Resource Through its Lifetime | |
Resource Injection | |
CVE-2022-50295 | |
CVE-2022-50269 | |
CVE-2022-50303 | |
CVE-2022-50251 | |
CVE-2022-50317 | |
CVE-2022-50329 | |
CVE-2022-50334 | |
CVE-2022-50315 | |
CVE-2022-50287 | |
CVE-2022-50320 | |
CVE-2022-50337 | |
CVE-2022-50314 | |
CVE-2022-50280 | |
CVE-2022-50322 | |
CVE-2022-50325 | |
CVE-2022-50302 | |
CVE-2022-50326 | |
CVE-2022-50290 | |
CVE-2022-50307 | |
CVE-2022-50276 | |
CVE-2022-50259 | |
CVE-2022-50258 | |
CVE-2022-50299 | |
CVE-2022-50279 | |
CVE-2022-50268 | |
CVE-2022-50266 | |
CVE-2022-50282 | |
CVE-2022-50272 | |
CVE-2022-50312 | |
CVE-2022-50332 | |
CVE-2022-50319 | |
CVE-2022-50249 | |
CVE-2022-50244 | |
Improper Input Validation | |
CVE-2022-50318 | |
CVE-2022-50241 | |
CVE-2022-50271 | |
CVE-2022-50235 | |
CVE-2022-50308 | |
CVE-2022-50248 | |
CVE-2022-50250 | |
CVE-2022-50297 | |
CVE-2022-50284 | |
CVE-2022-50234 | |
CVE-2022-50305 | |
CVE-2022-50327 | |
CVE-2022-50306 | |
CVE-2022-50286 | |
Memory Leak | |
Memory Leak | |
CVE-2022-50275 | |
CVE-2022-50311 | |
CVE-2022-50239 | |
CVE-2022-50252 | |
CVE-2022-50263 | |
CVE-2022-50247 | |
CVE-2022-50285 | |
CVE-2022-50267 | |
Missing Release of Resource after Effective Lifetime | |
CVE-2022-50253 | |
Memory Leak | |
Incomplete Cleanup | |
NULL Pointer Dereference | |
Memory Leak | |
Integer Overflow or Wraparound | |
Resource Injection | |
Missing Release of Resource after Effective Lifetime | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Deadlock | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2021-47607 | |
NULL Pointer Dereference | |
Memory Leak | |
Allocation of Resources Without Limits or Throttling | |
Unexpected Status Code or Return Value | |
NULL Pointer Dereference | |
Deadlock | |
Resource Injection | |
Memory Leak | |
CVE-2024-26666 | |
Race Condition | |
NULL Pointer Dereference | |
Resource Injection | |
Deadlock | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Deadlock | |
Out-of-bounds Read | |
Improper Input Validation | |
Deadlock | |
Improper Handling of Exceptional Conditions | |
CVE-2022-48694 | |
Out-of-bounds Read | |
Race Condition | |
Out-of-bounds Read | |
CVE-2025-39756 | |
Race Condition | |
CVE-2025-39765 | |
CVE-2025-39746 | |
CVE-2025-39764 | |
CVE-2025-39766 | |
Missing Standardized Error Handling Mechanism | |
Resource Leak | |
CVE-2025-39750 | |
CVE-2025-39791 | |
CVE-2025-39737 | |
Buffer Overflow | |
CVE-2025-39753 | |
CVE-2025-39782 | |
NULL Pointer Dereference | |
CVE-2025-39754 | |
CVE-2025-39760 | |
CVE-2025-39784 | |
CVE-2025-39775 | |
Divide By Zero | |
Missing Default Case in Switch Statement | |
CVE-2025-39776 | |
Out-of-bounds Read | |
Improper Input Validation | |
Deadlock | |
CVE-2025-39790 | |
NULL Pointer Dereference | |
Improper Access Control | |
Out-of-bounds Write | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2022-50193 | |
NULL Pointer Dereference | |
Time-of-check Time-of-use (TOCTOU) | |
Buffer Overflow | |
Use After Free | |
Out-of-bounds Read | |
Improper Synchronization | |
NULL Pointer Dereference | |
Comparison Using Wrong Factors | |
Time-of-check Time-of-use (TOCTOU) | |
Use After Free | |
Race Condition | |
CVE-2025-39677 | |
CVE-2025-39721 | |
Out-of-bounds Write | |
CVE-2025-39702 | |
Race Condition | |
Use of Multiple Resources with Duplicate Identifier | |
Improper Control of a Resource Through its Lifetime | |
Improper Validation of Syntactic Correctness of Input | |
CVE-2025-38593 | |
CVE-2025-38592 | |
Race Condition | |
Improper Input Validation | |
Improper Control of a Resource Through its Lifetime | |
Divide By Zero | |
Race Condition | |
Unexpected Status Code or Return Value | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
Use After Free | |
Race Condition | |
CVE-2025-38733 | |
Out-of-bounds Read | |
Improper Handling of Parameters | |
Out-of-bounds Read | |
CVE-2025-38491 | |
CVE-2025-39682 | |
Improper Update of Reference Count | |
CVE-2025-38731 | |
Improper Validation of Specified Index, Position, or Offset in Input | |
Use After Free | |
Race Condition | |