Out-of-bounds Write | |
Incorrect Default Permissions | <2:4.13.13+dfsg-1~deb11u6 |
CVE-2023-42669 | |
Access of Resource Using Incompatible Type ('Type Confusion') | <2:4.13.13+dfsg-1~deb11u6 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <2:4.13.13+dfsg-1~deb11u6 |
Information Exposure | <2:4.13.13+dfsg-1~deb11u6 |
Out-of-bounds Read | <2:4.13.13+dfsg-1~deb11u6 |
Access Restriction Bypass | |
Cleartext Transmission of Sensitive Information | |
Incorrect Permission Assignment for Critical Resource | |
Cleartext Storage of Sensitive Information | |
Missing Authorization | |
CVE-2022-37967 | |
CVE-2022-38023 | |
Inadequate Encryption Strength | |
CVE-2022-37966 | |
Integer Overflow or Wraparound | |
CVE-2022-44640 | |
Heap-based Buffer Overflow | <2:4.13.13+dfsg-1~deb11u6 |
Race Condition | |
Use of Insufficiently Random Values | |
Incorrect Default Permissions | |
Improper Authentication | <2:4.13.13+dfsg-1~deb11u5 |
Use After Free | <2:4.13.13+dfsg-1~deb11u5 |
Authentication Bypass | <2:4.13.13+dfsg-1~deb11u5 |
Out-of-bounds Read | <2:4.13.13+dfsg-1~deb11u5 |
CVE-2022-32742 | <2:4.13.13+dfsg-1~deb11u5 |
CVE-2021-3670 | |
Link Following | |
Out-of-bounds Read | <2:4.13.13+dfsg-1~deb11u3 |
Incorrect Default Permissions | <2:4.13.13+dfsg-1~deb11u3 |
Race Condition | |
Race Condition | <2:4.13.13+dfsg-1~deb11u4 |
Improper Input Validation | <2:4.13.13+dfsg-1~deb11u2 |
Incorrect Authorization | <2:4.13.13+dfsg-1~deb11u2 |
CVE-2021-23192 | <2:4.13.13+dfsg-1~deb11u2 |
Missing Authorization | <2:4.13.13+dfsg-1~deb11u2 |
Use After Free | <2:4.13.13+dfsg-1~deb11u2 |
Improper Input Validation | <2:4.13.13+dfsg-1~deb11u2 |
Race Condition | <2:4.13.13+dfsg-1~deb11u2 |
Improper Authentication | <2:4.13.13+dfsg-1~deb11u2 |
NULL Pointer Dereference | <2:4.13.13+dfsg-1~deb11u1 |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
CVE-2020-14383 | |
NULL Pointer Dereference | |
Incorrect Privilege Assignment | |
Improper Privilege Management | |
Improper Input Validation | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Use After Free | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
CVE-2019-14902 | |
Out-of-bounds Read | |
Improper Authentication | |
Incorrect Default Permissions | |
Directory Traversal | |
Weak Password Requirements | |
NULL Pointer Dereference | |
Directory Traversal | |
NULL Pointer Dereference | |
Improperly Implemented Security Check for Standard | |
Incorrect Default Permissions | |
Directory Traversal | |
Out-of-bounds Read | |
Resource Exhaustion | |
Improperly Implemented Security Check for Standard | |
Double Free | |
NULL Pointer Dereference | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
NULL Pointer Dereference | |
Improper Input Validation | |
Information Exposure | |
Insufficiently Protected Credentials | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Improper Input Validation | |
Cryptographic Issues | |
CVE-2017-12150 | |
Information Exposure | |
Race Condition | |
Incorrect Authorization | |
NULL Pointer Dereference | |
Race Condition | |
Use After Free | |
Out-of-Bounds | |
Insufficient Verification of Data Authenticity | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Arbitrary Code Injection | |
Access Restriction Bypass | |
Improper Access Control | |
Security Features | |
Security Features | |
CVE-2015-5370 | |
Cryptographic Issues | |
Security Features | |
Security Features | |
Security Features | |
Security Features | |
Improper Access Control | |
Out-of-Bounds | |
Resource Management Errors | |
Numeric Errors | |
Access Restriction Bypass | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Access Restriction Bypass | |
Code | |
Access Restriction Bypass | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2014-0178 | |
Access Restriction Bypass | |
Credentials Management | |
Out-of-Bounds | |
Improper Input Validation | |
Cryptographic Issues | |
Access Restriction Bypass | |
Numeric Errors | |
Access Restriction Bypass | |
Cross-site Request Forgery (CSRF) | |
Improper Input Validation | |
Access Restriction Bypass | |
Numeric Errors | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2010-1635 | |
Access Restriction Bypass | |
Directory Traversal | |
Link Following | |
Improper Input Validation | |
Access Restriction Bypass | |
CVE-2009-2906 | |
Access Restriction Bypass | |
Use of Externally-Controlled Format String | |
Access Restriction Bypass | |
Improper Input Validation | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
CVE-2007-2447 | |
Out-of-Bounds | |
CVE-2007-2444 | |
Use of Externally-Controlled Format String | |
CVE-2007-0452 | |
CVE-2006-3403 | |
CVE-2006-1059 | |
CVE-2004-0930 | |
CVE-2004-0882 | |
CVE-2004-1154 | |
CVE-2004-0829 | |
CVE-2004-2546 | |
CVE-2004-0808 | |
CVE-2004-0815 | |
CVE-2004-0807 | |
CVE-2004-0686 | |
CVE-2004-0600 | |
CVE-2004-0186 | |
CVE-2004-0082 | |
CVE-2003-0201 | |
CVE-2003-0196 | |
CVE-2003-0086 | |
CVE-2003-0085 | |
Out-of-Bounds | |
CVE-2002-1318 | |