| CVE-2025-58149 | |
| CVE-2025-58148 | |
| CVE-2025-58147 | |
| CVE-2025-58143 | |
| CVE-2025-58142 | |
| CVE-2025-27466 | |
| CVE-2025-58145 | |
| CVE-2025-58144 | |
| CVE-2024-36350 | |
| CVE-2024-36357 | |
| CVE-2025-27465 | |
| CVE-2024-28956 | |
| CVE-2025-1713 | |
| CVE-2024-45819 | |
| CVE-2024-45818 | |
| CVE-2024-45817 | |
| CVE-2024-31145 | |
| CVE-2024-31146 | |
| CVE-2024-31143 | |
| CVE-2024-31142 | |
| CVE-2024-2201 | |
| CVE-2023-46842 | |
| CVE-2024-2193 | |
| CVE-2023-28746 | |
| CVE-2023-46841 | |
| CVE-2023-46839 | <4.17.3+10-g091466ba55-1~deb12u1 |
| CVE-2023-46840 | <4.17.3+10-g091466ba55-1~deb12u1 |
| Out-of-Bounds | <4.17.3+10-g091466ba55-1~deb12u1 |
| CVE-2023-46835 | <4.17.2+76-ge1f9cb16e2-1~deb12u1 |
| CVE-2023-46836 | <4.17.2+76-ge1f9cb16e2-1~deb12u1 |
| CVE-2023-34327 | <4.17.2+76-ge1f9cb16e2-1~deb12u1 |
| Out-of-bounds Write | <4.17.2+76-ge1f9cb16e2-1~deb12u1 |
| NULL Pointer Dereference | <4.17.2+76-ge1f9cb16e2-1~deb12u1 |
| CVE-2023-34328 | <4.17.2+76-ge1f9cb16e2-1~deb12u1 |
| CVE-2023-34326 | <4.17.2+76-ge1f9cb16e2-1~deb12u1 |
| Improper Check for Dropped Privileges | <4.17.2+76-ge1f9cb16e2-1~deb12u1 |
| Out-of-Bounds | <4.17.2+76-ge1f9cb16e2-1~deb12u1 |
| Divide By Zero | <4.17.2+76-ge1f9cb16e2-1~deb12u1 |
| Improper Locking | <4.17.2+76-ge1f9cb16e2-1~deb12u1 |
| CVE-2022-42336 | |
| NULL Pointer Dereference | |
| Use After Free | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2022-42331 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2022-27672 | |
| CVE-2022-42330 | |
| CVE-2022-23824 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2022-42327 | |
| Memory Leak | |
| Memory Leak | |
| Release of Invalid Pointer or Reference | |
| Memory Leak | |
| Memory Leak | |
| Uncontrolled Recursion | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Memory Leak | |
| Incorrect Conversion between Numeric Types | |
| Improper Handling of Exceptional Conditions | |
| Improper Resource Shutdown or Release | |
| Improper Resource Shutdown or Release | |
| CVE-2022-33745 | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Exposure of Resource to Wrong Sphere | |
| Information Exposure | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Information Exposure | |
| Memory Leak | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| CVE-2022-26364 | |
| CVE-2022-26363 | |
| Race Condition | |
| Improper Locking | |
| CVE-2022-26361 | |
| CVE-2022-26358 | |
| Race Condition | |
| CVE-2022-26359 | |
| CVE-2022-26360 | |
| Improper Resource Shutdown or Release | |
| Incomplete Cleanup | |
| Integer Underflow | |
| Improper Handling of Exceptional Conditions | |
| CVE-2021-28704 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2021-28707 | |
| Improper Handling of Exceptional Conditions | |
| CVE-2021-28703 | |
| CVE-2021-28708 | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| CVE-2021-28699 | |
| CVE-2021-28695 | |
| Improper Authentication | |
| Allocation of Resources Without Limits or Throttling | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Incorrect Authorization | |
| Exposure of Resource to Wrong Sphere | |
| CVE-2021-28690 | |
| Information Exposure | |
| CVE-2021-28693 | |
| Improper Privilege Management | |
| Out-of-Bounds | |
| Missing Initialization of Resource | |
| Improper Privilege Management | |
| CVE-2021-26933 | |
| CVE-2021-3308 | |
| NULL Pointer Dereference | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Uncontrolled Recursion | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Use After Free | |
| Exposure of Resource to Wrong Sphere | |
| Untrusted Search Path | |
| Information Exposure | |
| Incorrect Permission Assignment for Critical Resource | |
| Off-by-one Error | |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Privilege Management | |
| Race Condition | |
| Insufficient Verification of Data Authenticity | |
| Memory Leak | |
| Race Condition | |
| Improper Handling of Exceptional Conditions | |
| Resource Exhaustion | |
| Out-of-Bounds | |
| Race Condition | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Improper Privilege Management | |
| Improper Input Validation | |
| Race Condition | |
| Improper Handling of Exceptional Conditions | |
| Improper Input Validation | |
| Resource Exhaustion | |
| Missing Authorization | |
| Improper Handling of Exceptional Conditions | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2020-11742 | |
| Improper Input Validation | |
| Memory Leak | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Race Condition | |
| Out-of-Bounds | |
| Incorrect Calculation | |
| Improper Input Validation | |
| CVE-2019-11135 | |
| Improper Input Validation | |
| Race Condition | |
| Incorrect Permission Assignment for Critical Resource | |
| Use of Externally-Controlled Format String | |
| OS Command Injection | |
| Off-by-one Error | |
| Improper Privilege Management | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Input Validation | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| CVE-2019-11091 | |
| Information Exposure | |
| Information Exposure | |
| Incomplete Cleanup | |
| Reachable Assertion | |
| Information Exposure | |
| Improper Input Validation | |
| CVE-2018-19965 | |
| CVE-2018-19964 | |
| Interpretation Conflict | |
| NULL Pointer Dereference | |
| Incorrect Authorization | <4.11.1~pre.20180911.5acdd26fdc+dfsg-2 |
| Resource Exhaustion | <4.11.1~pre.20180911.5acdd26fdc+dfsg-2 |
| Resource Exhaustion | <4.11.1~pre.20180911.5acdd26fdc+dfsg-2 |
| Information Exposure | <4.11.1~pre.20180911.5acdd26fdc+dfsg-2 |
| CVE-2018-3646 | <4.11.1~pre.20180911.5acdd26fdc+dfsg-2 |
| Information Exposure | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9 |
| CVE-2018-12891 | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9 |
| CVE-2018-12893 | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9 |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Information Exposure | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u8 |
| Information Exposure | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7 |
| CVE-2018-10982 | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
| Loop with Unreachable Exit Condition ('Infinite Loop') | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
| Race Condition | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
| Out-of-bounds Write | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
| Information Exposure | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
| CVE-2018-7541 | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
| Resource Exhaustion | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
| NULL Pointer Dereference | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
| Information Exposure | <4.11.1~pre+1.733450b39b-1 |
| Information Exposure | <4.11.1~pre+1.733450b39b-1 |
| Error Handling | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
| CVE-2017-17566 | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
| Out-of-Bounds | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
| Improper Input Validation | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
| Information Exposure | |
| Improper Check for Unusual or Exceptional Conditions | |
| Use After Free | |
| Out-of-Bounds | |
| CVE-2017-15594 | |
| Resource Exhaustion | |
| Information Exposure | |
| Race Condition | |
| Missing Release of Resource after Effective Lifetime | |
| Improper Input Validation | |
| CVE-2017-15590 | |
| Exposure of Resource to Wrong Sphere | |
| Resource Exhaustion | |
| Missing Release of Resource after Effective Lifetime | |
| NULL Pointer Dereference | |
| Race Condition | |
| Out-of-bounds Read | |
| CVE-2017-14319 | |
| Incorrect Calculation | |
| Race Condition | |
| Buffer Overflow | |
| Information Exposure | |
| CVE-2017-10919 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| CVE-2017-10912 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Resource Exhaustion | |
| CVE-2017-10913 | |
| Race Condition | |
| Information Exposure | |
| Race Condition | |
| NULL Pointer Dereference | |
| CVE-2017-8904 | |
| CVE-2017-8903 | |
| Incorrect Calculation | |
| Information Exposure | |
| Improper Validation of Array Index | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Incorrect Calculation | |
| Information Exposure | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Information Exposure | |
| Access Restriction Bypass | |
| Race Condition | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Race Condition | |
| Out-of-Bounds | |
| Use After Free | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Improper Input Validation | |
| CVE-2016-5242 | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Resource Exhaustion | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Out-of-Bounds | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| CVE-2016-2271 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Code | |
| Security Features | |
| Security Features | |
| Code | |
| Resource Management Errors | |
| Improper Data Handling | |
| Security Features | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Data Handling | |
| Code | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| CVE-2015-4163 | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Incorrect Authorization | |
| Out-of-Bounds | |
| Information Exposure | |
| Access Restriction Bypass | |
| Code | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Information Exposure | |
| Information Exposure | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2015-0361 | |
| Code | |
| Code | |
| Code | |
| Code | |
| Improper Input Validation | |
| Improper Input Validation | |
| Code | |
| Out-of-Bounds | |
| Race Condition | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| CVE-2014-3967 | |
| CVE-2014-3968 | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| CVE-2013-4369 | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Buffer Overflow | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Numeric Errors | |
| CVE-2013-2196 | |
| Numeric Errors | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Configuration | |
| CVE-2013-0153 | |
| Buffer Overflow | |
| Configuration | |
| CVE-2012-5510 | |
| CVE-2012-5515 | |
| Improper Input Validation | |
| CVE-2012-5514 | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| CVE-2012-2934 | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
| CVE-2012-0218 | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
| Improper Input Validation | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Configuration | |
| Improper Input Validation | |
| Numeric Errors | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Information Exposure | |
| Resource Management Errors | |
| Configuration | |
| CVE-2012-4536 | |
| Resource Management Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
| Out-of-Bounds | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Numeric Errors | |
| CVE-2010-4255 | |
| Resource Management Errors | |