CVE-2024-53241 | |
CVE-2024-45819 | |
CVE-2024-45818 | |
CVE-2024-45817 | |
CVE-2024-31145 | |
CVE-2024-31146 | |
CVE-2024-31143 | |
CVE-2024-31142 | |
CVE-2024-2201 | |
CVE-2023-46842 | |
CVE-2023-28746 | |
CVE-2024-2193 | |
CVE-2023-46841 | |
CVE-2023-46840 | |
CVE-2023-46839 | |
Out-of-Bounds | |
CVE-2023-46836 | |
CVE-2023-46835 | |
CVE-2023-34327 | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
CVE-2023-34328 | |
CVE-2023-34326 | |
Improper Check for Dropped Privileges | |
Out-of-Bounds | |
Divide By Zero | |
Improper Locking | |
CVE-2022-42336 | |
NULL Pointer Dereference | |
Use After Free | |
Allocation of Resources Without Limits or Throttling | |
CVE-2022-42331 | |
Allocation of Resources Without Limits or Throttling | |
CVE-2022-27672 | |
CVE-2022-42330 | |
CVE-2022-23824 | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
CVE-2022-42327 | |
Memory Leak | |
Memory Leak | |
Release of Invalid Pointer or Reference | |
Memory Leak | |
Memory Leak | |
Uncontrolled Recursion | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Memory Leak | |
Incorrect Conversion between Numeric Types | |
Improper Handling of Exceptional Conditions | |
Improper Resource Shutdown or Release | |
Improper Resource Shutdown or Release | |
CVE-2022-33745 | |
Improper Cross-boundary Removal of Sensitive Data | |
Exposure of Resource to Wrong Sphere | |
Information Exposure | |
Improper Cross-boundary Removal of Sensitive Data | |
Information Exposure | |
Memory Leak | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
CVE-2022-26364 | |
CVE-2022-26363 | |
Race Condition | |
Improper Locking | |
CVE-2022-26361 | |
CVE-2022-26358 | |
Race Condition | |
CVE-2022-26359 | |
CVE-2022-26360 | |
Improper Resource Shutdown or Release | |
Incomplete Cleanup | |
Integer Underflow | |
Improper Handling of Exceptional Conditions | |
CVE-2021-28704 | |
Allocation of Resources Without Limits or Throttling | |
CVE-2021-28707 | |
Improper Handling of Exceptional Conditions | |
CVE-2021-28703 | |
CVE-2021-28708 | |
Improper Privilege Management | |
Improper Privilege Management | |
Improper Privilege Management | |
CVE-2021-28699 | |
CVE-2021-28695 | |
Improper Authentication | |
Allocation of Resources Without Limits or Throttling | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Incorrect Authorization | |
Exposure of Resource to Wrong Sphere | |
CVE-2021-28690 | |
Information Exposure | |
CVE-2021-28693 | |
Improper Privilege Management | |
Out-of-Bounds | |
Missing Initialization of Resource | |
Improper Privilege Management | |
CVE-2021-26933 | |
CVE-2021-3308 | |
NULL Pointer Dereference | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Uncontrolled Recursion | |
NULL Pointer Dereference | |
Memory Leak | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Untrusted Search Path | |
Information Exposure | |
Incorrect Permission Assignment for Critical Resource | |
Off-by-one Error | |
Information Exposure | |
Out-of-Bounds | |
Improper Privilege Management | |
Race Condition | |
Insufficient Verification of Data Authenticity | |
Memory Leak | |
Race Condition | |
Improper Handling of Exceptional Conditions | |
Resource Exhaustion | |
Out-of-Bounds | |
Race Condition | |
Out-of-Bounds | |
Arbitrary Code Injection | |
Improper Privilege Management | |
Improper Input Validation | |
Race Condition | |
Improper Handling of Exceptional Conditions | |
Improper Input Validation | |
Resource Exhaustion | |
Missing Authorization | |
Improper Handling of Exceptional Conditions | |
Information Exposure | |
Out-of-Bounds | |
CVE-2020-11742 | |
Improper Input Validation | |
Memory Leak | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Race Condition | |
Out-of-Bounds | |
Incorrect Calculation | |
Improper Input Validation | |
CVE-2019-11135 | |
Improper Input Validation | |
Race Condition | |
Incorrect Permission Assignment for Critical Resource | |
Use of Externally-Controlled Format String | |
OS Command Injection | |
Off-by-one Error | |
Improper Privilege Management | |
Improper Input Validation | |
Race Condition | |
Improper Input Validation | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Input Validation | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Input Validation | |
Race Condition | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
CVE-2019-11091 | |
Information Exposure | |
Information Exposure | |
Incomplete Cleanup | |
Reachable Assertion | |
Information Exposure | |
Improper Input Validation | |
CVE-2018-19965 | |
CVE-2018-19964 | |
Interpretation Conflict | |
NULL Pointer Dereference | |
Incorrect Authorization | <4.11.1~pre.20180911.5acdd26fdc+dfsg-2 |
Resource Exhaustion | <4.11.1~pre.20180911.5acdd26fdc+dfsg-2 |
Resource Exhaustion | <4.11.1~pre.20180911.5acdd26fdc+dfsg-2 |
Information Exposure | <4.11.1~pre.20180911.5acdd26fdc+dfsg-2 |
CVE-2018-3646 | <4.11.1~pre.20180911.5acdd26fdc+dfsg-2 |
Information Exposure | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9 |
CVE-2018-12891 | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9 |
CVE-2018-12893 | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9 |
Out-of-bounds Read | |
Out-of-Bounds | |
Information Exposure | <4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u8 |
Information Exposure | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7 |
CVE-2018-10982 | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
Race Condition | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
Information Exposure | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
Out-of-bounds Write | <4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 |
CVE-2018-7541 | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
Resource Exhaustion | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
NULL Pointer Dereference | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
Information Exposure | <4.11.1~pre+1.733450b39b-1 |
Information Exposure | <4.11.1~pre+1.733450b39b-1 |
Error Handling | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
CVE-2017-17566 | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
Improper Input Validation | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
Out-of-Bounds | <4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 |
Information Exposure | |
Improper Check for Unusual or Exceptional Conditions | |
Use After Free | |
Out-of-Bounds | |
CVE-2017-15590 | |
Resource Exhaustion | |
Exposure of Resource to Wrong Sphere | |
Race Condition | |
Improper Input Validation | |
Resource Exhaustion | |
Information Exposure | |
CVE-2017-15594 | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Race Condition | |
CVE-2017-14319 | |
Incorrect Calculation | |
Buffer Overflow | |
Race Condition | |
Information Exposure | |
Information Exposure | |
Out-of-Bounds | |
Resource Exhaustion | |
CVE-2017-10919 | |
Race Condition | |
Race Condition | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
CVE-2017-10912 | |
CVE-2017-10913 | |
NULL Pointer Dereference | |
CVE-2017-8904 | |
Incorrect Calculation | |
CVE-2017-8903 | |
Information Exposure | |
Improper Validation of Array Index | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Incorrect Calculation | |
Information Exposure | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Information Exposure | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Race Condition | |
Access Restriction Bypass | |
Improper Input Validation | |
Race Condition | |
Access Restriction Bypass | |
Use After Free | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Access Control | |
Improper Access Control | |
Access Restriction Bypass | |
CVE-2016-5242 | |
Resource Exhaustion | |
Access Restriction Bypass | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Access Restriction Bypass | |
Improper Access Control | |
Out-of-Bounds | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
CVE-2016-2271 | |
Code | |
Improper Input Validation | |
Security Features | |
Resource Management Errors | |
Improper Data Handling | |
Code | |
Security Features | |
Security Features | |
Resource Management Errors | |
Resource Management Errors | |
Improper Data Handling | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
Access Restriction Bypass | |
Code | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Information Exposure | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Resource Management Errors | |
CVE-2015-4163 | |
Access Restriction Bypass | |
Resource Management Errors | |
Incorrect Authorization | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Code | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Information Exposure | |
Information Exposure | |
Access Restriction Bypass | |
Resource Management Errors | |
Resource Management Errors | |
CVE-2015-0361 | |
Code | |
Code | |
Code | |
Code | |
Improper Input Validation | |
Code | |
Improper Input Validation | |
Out-of-Bounds | |
Access Restriction Bypass | |
Resource Management Errors | |
Access Restriction Bypass | |
Race Condition | |
Access Restriction Bypass | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2014-3967 | |
CVE-2014-3968 | |
Access Restriction Bypass | |
Improper Input Validation | |
Numeric Errors | |
Improper Input Validation | |
Out-of-Bounds | |
Resource Management Errors | |
Access Restriction Bypass | |
Resource Management Errors | |
Resource Management Errors | |
Improper Input Validation | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
CVE-2013-4369 | |
Out-of-Bounds | |
Resource Management Errors | |
Access Restriction Bypass | |
Buffer Overflow | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Resource Management Errors | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-Bounds | |
Numeric Errors | |
Numeric Errors | |
CVE-2013-2196 | |
Improper Input Validation | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
CVE-2013-0153 | |
Configuration | |
Buffer Overflow | |
CVE-2012-5515 | |
Out-of-Bounds | |
CVE-2012-5514 | |
Resource Management Errors | |
Improper Input Validation | |
Configuration | |
CVE-2012-5510 | |
Resource Management Errors | |
CVE-2012-0218 | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
Access Restriction Bypass | |
CVE-2012-2934 | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Access Restriction Bypass | |
Numeric Errors | |
Configuration | |
Improper Input Validation | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Resource Management Errors | |
Configuration | |
Resource Management Errors | |
CVE-2012-4536 | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
Out-of-Bounds | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
Resource Management Errors | |
Access Restriction Bypass | |
Numeric Errors | |
CVE-2010-4255 | |
Resource Management Errors | |