CVE-2022-26364 | |
CVE-2022-26363 | |
Race Condition | |
Improper Locking | |
CVE-2022-26361 | |
CVE-2022-26358 | |
Race Condition | |
CVE-2022-26359 | |
CVE-2022-26360 | |
Incomplete Cleanup | |
Integer Underflow | |
Improper Handling of Exceptional Conditions | |
CVE-2021-28704 | |
Allocation of Resources Without Limits or Throttling | |
CVE-2021-28707 | |
Improper Handling of Exceptional Conditions | |
CVE-2021-28703 | |
CVE-2021-28708 | |
Improper Privilege Management | |
Improper Privilege Management | |
CVE-2021-28695 | |
Improper Authentication | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Incorrect Authorization | |
Exposure of Resource to Wrong Sphere | |
CVE-2021-28690 | |
Information Exposure | |
Improper Privilege Management | |
Out-of-Bounds | |
CVE-2021-26933 | |
NULL Pointer Dereference | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Uncontrolled Recursion | |
NULL Pointer Dereference | |
Memory Leak | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Untrusted Search Path | |
Information Exposure | |
Incorrect Permission Assignment for Critical Resource | |
Information Exposure | |
Out-of-Bounds | |
Improper Privilege Management | |
Race Condition | |
Insufficient Verification of Data Authenticity | |
Memory Leak | |
Race Condition | |
Improper Handling of Exceptional Conditions | |
Resource Exhaustion | |
Out-of-Bounds | |
Race Condition | |
Out-of-Bounds | |
Arbitrary Code Injection | |
Improper Privilege Management | |
Improper Input Validation | |
Race Condition | |
Improper Handling of Exceptional Conditions | |
Improper Input Validation | |
Resource Exhaustion | |
Missing Authorization | |
Improper Handling of Exceptional Conditions | |
Information Exposure | |
Out-of-Bounds | |
CVE-2020-11742 | |
Improper Input Validation | <4.8.5.final+shim4.10.4-1+deb9u12 |
Memory Leak | <4.8.5.final+shim4.10.4-1+deb9u12 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <4.8.5.final+shim4.10.4-1+deb9u12 |
Race Condition | <4.8.5.final+shim4.10.4-1+deb9u12 |
Out-of-Bounds | <4.8.5.final+shim4.10.4-1+deb9u12 |
Incorrect Calculation | <4.8.5.final+shim4.10.4-1+deb9u12 |
Improper Input Validation | <4.8.5.final+shim4.10.4-1+deb9u12 |
CVE-2019-11135 | <4.8.5.final+shim4.10.4-1+deb9u12 |
Improper Input Validation | <4.8.5.final+shim4.10.4-1+deb9u12 |
Race Condition | <4.8.5.final+shim4.10.4-1+deb9u12 |
Incorrect Permission Assignment for Critical Resource | <4.8.5.final+shim4.10.4-1+deb9u12 |
Use of Externally-Controlled Format String | <4.8.5.final+shim4.10.4-1+deb9u12 |
OS Command Injection | <4.8.5.final+shim4.10.4-1+deb9u12 |
Off-by-one Error | <4.8.5.final+shim4.10.4-1+deb9u12 |
Improper Privilege Management | <4.8.5.final+shim4.10.4-1+deb9u12 |
Improper Input Validation | <4.8.5.final+shim4.10.4-1+deb9u12 |
Race Condition | <4.8.5.final+shim4.10.4-1+deb9u12 |
Improper Input Validation | <4.8.5.final+shim4.10.4-1+deb9u12 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <4.8.5.final+shim4.10.4-1+deb9u12 |
Improper Input Validation | <4.8.5.final+shim4.10.4-1+deb9u12 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <4.8.5.final+shim4.10.4-1+deb9u12 |
Improper Input Validation | <4.8.5.final+shim4.10.4-1+deb9u12 |
Race Condition | <4.8.5.final+shim4.10.4-1+deb9u12 |
Improper Input Validation | <4.8.5.final+shim4.10.4-1+deb9u12 |
Improper Input Validation | <4.8.5.final+shim4.10.4-1+deb9u12 |
Improper Input Validation | <4.8.5.final+shim4.10.4-1+deb9u12 |
Information Exposure | <4.8.5.final+shim4.10.4-1+deb9u12 |
CVE-2019-11091 | <4.8.5.final+shim4.10.4-1+deb9u12 |
Information Exposure | <4.8.5.final+shim4.10.4-1+deb9u12 |
Information Exposure | <4.8.5.final+shim4.10.4-1+deb9u12 |
Incomplete Cleanup | <4.8.5+shim4.10.2+xsa282-1+deb9u11 |
Information Exposure | <4.8.5+shim4.10.2+xsa282-1+deb9u11 |
Improper Input Validation | <4.8.5+shim4.10.2+xsa282-1+deb9u11 |
CVE-2018-19965 | <4.8.5+shim4.10.2+xsa282-1+deb9u11 |
Interpretation Conflict | <4.8.5+shim4.10.2+xsa282-1+deb9u11 |
Incorrect Authorization | <4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10 |
Resource Exhaustion | <4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10 |
Resource Exhaustion | <4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10 |
Information Exposure | <4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10 |
CVE-2018-3646 | <4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10 |
Information Exposure | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9 |
CVE-2018-12891 | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9 |
CVE-2018-12893 | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9 |
Out-of-bounds Read | |
Out-of-Bounds | |
Information Exposure | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u8 |
Information Exposure | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7 |
CVE-2018-10982 | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
Race Condition | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
Out-of-bounds Write | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
Information Exposure | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
NULL Pointer Dereference | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
Resource Exhaustion | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
CVE-2018-7541 | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
Information Exposure | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
Information Exposure | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u4 |
CVE-2017-17566 | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1 |
Error Handling | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1 |
Improper Input Validation | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1 |
Out-of-Bounds | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1 |
Information Exposure | |
Use After Free | |
Improper Check for Unusual or Exceptional Conditions | |
Out-of-Bounds | |
Information Exposure | |
CVE-2017-15594 | |
Improper Input Validation | |
Missing Release of Resource after Effective Lifetime | |
CVE-2017-15590 | |
Resource Exhaustion | |
Race Condition | |
Exposure of Resource to Wrong Sphere | |
Resource Exhaustion | |
Missing Release of Resource after Effective Lifetime | |
CVE-2017-14319 | |
NULL Pointer Dereference | |
Race Condition | |
Out-of-bounds Read | |
Race Condition | |
Buffer Overflow | |
Incorrect Calculation | |
Information Exposure | |
Information Exposure | |
Race Condition | |
Race Condition | |
NULL Pointer Dereference | |
Resource Exhaustion | |
CVE-2017-10919 | |
CVE-2017-10913 | |
Out-of-Bounds | |
CVE-2017-10912 | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2017-8904 | |
Incorrect Calculation | |
CVE-2017-8903 | |
Information Exposure | |
Improper Validation of Array Index | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Information Exposure | |
Improper Access Control | |
Incorrect Calculation | |
Access Restriction Bypass | |
Improper Input Validation | |
Information Exposure | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Improper Input Validation | |
Race Condition | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
Race Condition | |
Access Restriction Bypass | |
Use After Free | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Access Control | |
CVE-2016-5242 | |
Access Restriction Bypass | |
Improper Access Control | |
Resource Exhaustion | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Improper Access Control | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
CVE-2016-2271 | |
Code | |
Improper Input Validation | |
Security Features | |
Code | |
Improper Data Handling | |
Security Features | |
Resource Management Errors | |
Security Features | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Improper Data Handling | |
Out-of-Bounds | |
Access Restriction Bypass | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Code | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Access Restriction Bypass | |
CVE-2015-4163 | |
Resource Management Errors | |
Out-of-bounds Write | |
Resource Management Errors | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Incorrect Authorization | |
Out-of-Bounds | |
Information Exposure | |
Code | |
Improper Input Validation | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Information Exposure | |
Information Exposure | |
Resource Management Errors | |
Resource Management Errors | |
CVE-2015-0361 | |
Code | |
Code | |
Code | |
Code | |
Improper Input Validation | |
Code | |
Improper Input Validation | |
Out-of-Bounds | |
Resource Management Errors | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Race Condition | |
Access Restriction Bypass | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2014-3967 | |
CVE-2014-3968 | |
Access Restriction Bypass | |
Improper Input Validation | |
Numeric Errors | |
Improper Input Validation | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
Access Restriction Bypass | |
Resource Management Errors | |
Improper Input Validation | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Information Exposure | |
Resource Management Errors | |
CVE-2013-4369 | |
Access Restriction Bypass | |
Buffer Overflow | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2013-2196 | |
Numeric Errors | |
Numeric Errors | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Configuration | |
CVE-2013-0153 | |
Buffer Overflow | |
Improper Input Validation | |
CVE-2012-5514 | |
CVE-2012-5515 | |
Resource Management Errors | |
Configuration | |
Resource Management Errors | |
CVE-2012-5510 | |
Out-of-Bounds | |
CVE-2012-0218 | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
CVE-2012-2934 | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
Access Restriction Bypass | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Configuration | |
Improper Input Validation | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Numeric Errors | |
Access Restriction Bypass | |
Configuration | |
CVE-2012-4536 | |
Resource Management Errors | |
Resource Management Errors | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
Out-of-Bounds | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
Resource Management Errors | |
Access Restriction Bypass | |
Numeric Errors | |
CVE-2010-4255 | |
Resource Management Errors | |