CVE-2024-27073
| |
CVE-2024-27057
| |
CVE-2024-27390
| |
CVE-2024-27077
| |
CVE-2024-27003
| |
CVE-2024-27019
| |
CVE-2024-27030
| |
CVE-2024-27038
| |
CVE-2024-27017
| |
CVE-2024-27011
| |
CVE-2024-27020
| |
CVE-2024-27026
| |
CVE-2024-26993
| |
CVE-2024-27389
| |
CVE-2024-27047
| |
CVE-2024-27052
| |
CVE-2024-27049
| |
CVE-2024-26991
| |
CVE-2024-27010
| |
CVE-2024-27065
| |
CVE-2024-27388
| |
CVE-2024-27056
| |
CVE-2024-27004
| |
CVE-2024-27048
| |
CVE-2024-27042
| |
CVE-2024-27027
| |
CVE-2024-26976
| |
CVE-2024-26947
| |
CVE-2024-27014
| |
CVE-2024-27016
| |
CVE-2024-26934
| |
CVE-2024-26989
| |
CVE-2024-27025
| |
CVE-2024-27031
| |
CVE-2024-27062
| |
CVE-2024-26975
| |
CVE-2024-27023
| |
CVE-2024-26931
| |
CVE-2024-27013
| |
CVE-2024-27059
| |
CVE-2024-26982
| |
CVE-2024-26962
| |
CVE-2024-27046
| |
CVE-2024-26938
| |
CVE-2024-27000
| |
CVE-2024-26930
| |
CVE-2024-26972
| |
CVE-2024-26984
| |
CVE-2024-27079
| |
CVE-2024-27050
| |
CVE-2024-27055
| |
CVE-2024-27002
| |
CVE-2024-26992
| |
CVE-2024-26988
| |
CVE-2024-27022
| |
CVE-2024-27012
| |
CVE-2024-26961
| |
CVE-2024-26953
| |
CVE-2024-26999
| |
CVE-2024-26973
| |
CVE-2024-26950
| |
CVE-2024-26990
| |
CVE-2024-26933
| |
CVE-2024-26958
| |
CVE-2024-26951
| |
CVE-2024-26945
| |
CVE-2024-27039
| |
CVE-2024-26979
| |
CVE-2024-26960
| |
CVE-2024-27015
| |
CVE-2024-26987
| |
CVE-2024-26939
| |
CVE-2024-26946
| |
CVE-2024-26964
| |
CVE-2024-26937
| |
CVE-2024-26935
| |
CVE-2024-26929
| |
CVE-2024-26940
| |
CVE-2023-52651
| |
CVE-2023-52650
| |
CVE-2023-52653
| |
CVE-2023-52649
| |
CVE-2023-52648
| |
CVE-2022-48669
| |
Stack-based Buffer Overflow
| |
Improper Neutralization of Null Byte or NUL Character
| |
Improper Input Validation
| |
Use After Free
| |
Race Condition
| |
Deadlock
| |
CVE-2024-25743
| |
CVE-2024-25742
| |
CVE-2024-25743
| |
CVE-2024-25742
| |
Memory Leak
| |
Memory Leak
| |
CVE-2024-25743
| |
CVE-2024-25742
| |
Memory Leak
| |
Use After Free
| |
Out-of-Bounds
| |
CVE-2024-26927
| |
CVE-2023-52646
| |
CVE-2022-48643
| |
CVE-2022-48660
| |
CVE-2022-48651
| |
CVE-2022-48666
| |
CVE-2022-48663
| |
CVE-2022-48662
| |
CVE-2022-48657
| |
CVE-2022-48653
| |
CVE-2022-48654
| |
CVE-2022-48652
| |
CVE-2022-48659
| |
CVE-2022-48641
| |
CVE-2022-48648
| |
CVE-2022-48650
| |
CVE-2022-48658
| |
CVE-2022-48644
| |
CVE-2022-48646
| |
CVE-2022-48647
| |
CVE-2022-48642
| |
CVE-2022-48649
| |
CVE-2022-48638
| |
CVE-2022-48632
| |
CVE-2022-48631
| |
CVE-2022-48640
| |
CVE-2022-48637
| |
CVE-2022-48639
| |
CVE-2022-48635
| |
Integer Underflow
| |
Resource Leak
| |
Improper Validation of Specified Index, Position, or Offset in Input
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Improper Locking
| |
Improper Input Validation
| |
Deadlock
| |
NULL Pointer Dereference
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2024-26921
| |
CVE-2024-26919
| |
Resource Injection
| |
Race Condition
| |
Improper Input Validation
| |
Stack-based Buffer Overflow
| |
CVE-2024-26915
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Incomplete Cleanup
| |
Race Condition
| |
Race Condition
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Unchecked Return Value to NULL Pointer Dereference
| |
Race Condition
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Race Condition
| |
Resource Leak
| |
Resource Injection
| |
Resource Leak
| |
Resource Leak
| |
Unchecked Return Value to NULL Pointer Dereference
| |
Improper Input Validation
| |
CVE-2024-26920
| |
Improper Input Validation
| |
Stack-based Buffer Overflow
| |
Memory Leak
| |
Out-of-bounds Read
| |
Resource Injection
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Resource Locking
| |
CVE-2024-26918
| |
Race Condition
| |
Data Element containing Pointer Item without Proper Copy Control Element
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Divide By Zero
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Resource Leak
| |
Out-of-bounds Write
| |
Return of Wrong Status Code
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Return of Wrong Status Code
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Return of Wrong Status Code
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Write
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Buffer Access with Incorrect Length Value
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Resource Leak
| |
Use After Free
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Resource Injection
| |
Out-of-bounds Read
| |
Improper Neutralization of Null Byte or NUL Character
| |
Excessive Platform Resource Consumption within a Loop
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Improper Handling of Unicode Encoding
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2024-26782
| |
CVE-2024-26786
| |
CVE-2024-26783
| |
Resource Injection
| |
CVE-2024-26803
| |
Use After Free
| |
CVE-2024-26785
| |
CVE-2024-26804
| |
CVE-2024-26801
| |
Improper Input Validation
| |
Deadlock
| |
Improper Handling of Values
| |
Improper Handling of Values
| |
Divide By Zero
| |
CVE-2024-26743
| |
Race Condition
| |
Improper Null Termination
| |
Improper Input Validation
| |
Divide By Zero
| |
Improper Input Validation
| |
Improper Null Termination
| |
Deadlock
| |
Race Condition
| |
Unchecked Input for Loop Condition
| |
CVE-2024-26734
| |
Resource Injection
| |
CVE-2024-26736
| |
Deadlock
| |
NULL Pointer Dereference
| |
CVE-2024-26737
| |
Double Free
| |
Deadlock
| |
Stack-based Buffer Overflow
| |
CVE-2024-26733
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Divide By Zero
| |
Resource Injection
| |
Improper Null Termination
| |
Improper Input Validation
| |
Race Condition
| |
CVE-2024-26742
| |
Race Condition
| |
Improper Input Validation
| |
CVE-2024-26744
| |
CVE-2024-26739
| |
CVE-2024-26740
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
CVE-2024-26735
| |
Resource Injection
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Deadlock
| |
Race Condition
| |
Unchecked Input for Loop Condition
| |
Improper Protection Against Physical Side Channels
| |
Improper Input Validation
| |
Use After Free
| |
Resource Injection
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Resource Leak
| |
Resource Injection
| |
Resource Injection
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Resource Injection
| |
Improper Input Validation
| |
Missing Lock Check
| |
Improper Locking
| |
Integer Underflow
| |
Improper Handling of Unicode Encoding
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Deadlock
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Race Condition
| |
Resource Injection
| |
Out-of-bounds Read
| |
Race Condition
| |
Resource Injection
| |
Improper Resource Locking
| |
Incorrect Calculation of Buffer Size
| |
Resource Injection
| |
CVE-2024-26602
| |
Integer Underflow
| |
CVE-2024-26602
| |
Integer Underflow
| |
CVE-2024-26602
| |
Integer Underflow
| |
Race Condition
| |
Improper Resource Locking
| |
Improper Input Validation
| |
Missing Initialization of a Variable
| |
Improper Input Validation
| |
Resource Injection
| |
Missing Lock Check
| |
Resource Injection
| |
Deadlock
| |
Stack-based Buffer Overflow
| |
Unchecked Input for Loop Condition
| |
Memory Leak
| |
Use After Free
| |
Return of Wrong Status Code
| |
Use of NullPointerException Catch to Detect NULL Pointer Dereference
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Deadlock
| |
Deadlock
| |
Improper Resource Locking
| |
Deadlock
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Resource Exhaustion
| |
Return of Stack Variable Address
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Protection Against Physical Side Channels
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
NULL Pointer Dereference
| |
CVE-2024-26602
| |
Out-of-bounds Write
| |
Memory Leak
| |
Use After Free
| |
Race Condition
| |
Out-of-bounds Write
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Validation of Array Index
| |
Double Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Use After Free
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2024-26602
| |
Out-of-bounds Write
| |
Memory Leak
| |
Use After Free
| |
Race Condition
| |
Out-of-bounds Write
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Validation of Array Index
| |
Double Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Use After Free
| |
Allocation of Resources Without Limits or Throttling
| |
Use After Free
| |
Improper Resource Locking
| |
Improper Resource Locking
| |
Use After Free
| |
Out-of-bounds Read
| |
Resource Leak
| |
Use of Uninitialized Variable
| |
Use After Free
| |
Double Free
| |
Improper Input Validation
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Resource Leak
| |
Improper Resource Locking
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
Unchecked Return Value
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
CVE-2023-52520
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
CVE-2023-52575
| |
Improper Input Validation
| |
Race Condition
| |
Resource Leak
| |
Memory Leak
| |
Resource Injection
| |
Missing Encryption of Sensitive Data
| |
Improper Handling of Overlap Between Protected Memory Ranges
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Use After Free
| |
Resource Leak
| |
Divide By Zero
| |
Resource Injection
| |
Resource Leak
| |
Resource Leak
| |
Improper Input Validation
| |
CVE-2024-26615
| |
Memory Leak
| |
Use After Free
| |
Memory Leak
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Deadlock
| |
Use After Free
| |
Resource Leak
| |
Memory Leak
| |
Use After Free
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
CVE-2021-47018
| |
Memory Leak
| |
Use After Free
| |
NULL Pointer Dereference
| |
Untrusted Pointer Dereference
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Resource Leak
| |
Resource Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Resource Leak
| |
Resource Leak
| |
Race Condition
| |
Resource Leak
| |
Improper Check or Handling of Exceptional Conditions
| |
Use After Free
| |
Stack-based Buffer Overflow
| |
Range Error
| |
Resource Leak
| |
Improper Input Validation
| |
Missing Support for Integrity Check
| |
CVE-2021-46914
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Unchecked Error Condition
| |
Improper Input Validation
| |
Use After Free
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
CVE-2023-52474
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Range Error
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Deadlock
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
Untrusted Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2023-52462
| |
Use After Free
| |
CVE-2023-52455
| |
NULL Pointer Dereference
| |
Improper Validation of Array Index
| |
Buffer Access with Incorrect Length Value
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
NULL Pointer Dereference
| |
CVE-2024-26581
| |
Use After Free
| |
Improper Authentication
| |
Memory Leak
| |
Improper Check for Unusual or Exceptional Conditions
| |
CVE-2024-25744
| |
CVE-2024-25741
| |
Stack-based Buffer Overflow
| |
Out-of-bounds Write
| |
Memory Leak
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Memory Leak
| |
Out-of-bounds Write
| |
Memory Leak
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Memory Leak
| |
Out-of-bounds Write
| |
Memory Leak
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Memory Leak
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Resource Exhaustion
| |
Information Exposure
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Improper Handling of Unicode Encoding
| |
Arbitrary Code Injection
| |
Resource Exhaustion
| |
Directory Traversal
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Information Exposure
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Improper Privilege Management
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Update of Reference Count
| |
Double Free
| |
Improper Privilege Management
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Update of Reference Count
| |
Use After Free
| |
Use After Free
| |
Deadlock
| |
Deadlock
| |
Improper Handling of Values
| |
Resource Leak
| |
Information Exposure
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Double Free
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Information Exposure
| |
CVE-2022-27672
| |
Double Free
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Information Exposure
| |
CVE-2022-27672
| |
Double Free
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Information Exposure
| |
CVE-2022-27672
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Zeroization of Hardware Register
| |
Use After Free
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Zeroization of Hardware Register
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Handling of Exceptional Conditions
| |
Allocation of Resources Without Limits or Throttling
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Improper Resource Locking
| |
Improper Resource Locking
| |
Improper Resource Locking
| |
Improper Resource Locking
| |
Incorrect Bitwise Shift of Integer
| |
Incorrect Bitwise Shift of Integer
| |
Divide By Zero
| |
Release of Invalid Pointer or Reference
| |
Sensitive Information Uncleared Before Release
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Reachable Assertion
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Exposure of Resource to Wrong Sphere
| |
Exposure of Resource to Wrong Sphere
| |
Exposure of Resource to Wrong Sphere
| |
Improper Update of Reference Count
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Improper Validation of Array Index
| |
Improper Validation of Array Index
| |
Improper Validation of Array Index
| |
Improper Validation of Array Index
| |
Improper Validation of Array Index
| |
Improper Validation of Array Index
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Use After Free
| |
Interpretation Conflict
| |
Interpretation Conflict
| |
Interpretation Conflict
| |
Interpretation Conflict
| |
Use of Uninitialized Variable
| |
Use of Uninitialized Variable
| |
Use of Uninitialized Variable
| |
Use of Uninitialized Variable
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Out-of-bounds Read
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Improper Ownership Management
| |
Improper Ownership Management
| |
Improper Ownership Management
| |
Improper Ownership Management
| |
Improper Ownership Management
| |
Improper Ownership Management
| |
Improper Initialization
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Authentication Bypass
| |
Authentication Bypass
| |
Authentication Bypass
| |
Authentication Bypass
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2022-27672
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Externally Controlled Reference to a Resource in Another Sphere
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Write-what-where Condition
| |
Write-what-where Condition
| |
Write-what-where Condition
| |
Write-what-where Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Insecure Default Initialization of Resource
| |
Insecure Default Initialization of Resource
| |
Insecure Default Initialization of Resource
| |
Insecure Default Initialization of Resource
| |
Memory Leak
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Non-exit on Failed Initialization
| |
Non-exit on Failed Initialization
| |
Non-exit on Failed Initialization
| |
Non-exit on Failed Initialization
| |
NULL Pointer Dereference
| |
Information Exposure
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Unchecked Return Value
| |
Unchecked Return Value
| |
Unchecked Return Value
| |
Unchecked Return Value
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Memory Leak
| |
Memory Leak
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Improper Locking
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Race Condition During Access to Alternate Channel
| |
Race Condition During Access to Alternate Channel
| |
Race Condition During Access to Alternate Channel
| |
Race Condition During Access to Alternate Channel
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Authentication Bypass by Primary Weakness
| |
Authentication Bypass by Primary Weakness
| |
Authentication Bypass by Primary Weakness
| |
Authentication Bypass by Primary Weakness
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Expected Behavior Violation
| |
Incorrect Control Flow Scoping
| |
Incorrect Control Flow Scoping
| |
Incorrect Control Flow Scoping
| |
Incorrect Control Flow Scoping
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Missing Report of Error Condition
| |
Missing Report of Error Condition
| |
Missing Report of Error Condition
| |
Missing Report of Error Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Expected Behavior Violation
| |
Expected Behavior Violation
| |
Expected Behavior Violation
| |
Expected Behavior Violation
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Update of Reference Count
| |
Improper Update of Reference Count
| |
Improper Update of Reference Count
| |
Improper Update of Reference Count
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2022-36946
| |
CVE-2022-36946
| |
CVE-2022-36946
| |
CVE-2022-36946
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Comparison Using Wrong Factors
| |
Comparison Using Wrong Factors
| |
Comparison Using Wrong Factors
| |
Comparison Using Wrong Factors
| |
Comparison Using Wrong Factors
| |
Comparison Using Wrong Factors
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Privilege Defined With Unsafe Actions
| |
Privilege Defined With Unsafe Actions
| |
Privilege Defined With Unsafe Actions
| |
Privilege Defined With Unsafe Actions
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Time-of-check Time-of-use (TOCTOU)
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Missing Initialization of Resource
| |
Missing Initialization of Resource
| |
Missing Initialization of Resource
| |
Missing Initialization of Resource
| |
Missing Initialization of Resource
| |
Missing Initialization of Resource
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Information Exposure
| |
Memory Leak
| |
Authentication Bypass
| |
Authentication Bypass
| |
Authentication Bypass
| |
Authentication Bypass
| |
Out-of-bounds Write
| |
Improper Preservation of Permissions
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Memory Leak
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Release of Invalid Pointer or Reference
| |
Out-of-Bounds
| |
Race Condition
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Memory Leak
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Insufficient Comparison
| |
Information Exposure
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Improper Initialization
| |
Out-of-bounds Read
| |
Incorrect Authorization
| |
Improper Restriction of Excessive Authentication Attempts
| |
Authentication Bypass
| |
Origin Validation Error
| |
Information Exposure
| |
Improper Cleanup on Thrown Exception
| |
Authentication Bypass
| |
Incorrect Check of Function Return Value
| |