Use After Free
| |
CVE-2023-52667
| |
Race Condition
| |
Race Condition
| |
Improper Handling of Exceptional Conditions
| |
Use After Free
| |
CVE-2023-52667
| |
Race Condition
| |
Race Condition
| |
Improper Handling of Exceptional Conditions
| |
Use After Free
| |
CVE-2023-52667
| |
Race Condition
| |
Race Condition
| |
Improper Handling of Exceptional Conditions
| |
CVE-2023-52756
| |
CVE-2023-52735
| |
CVE-2023-52749
| |
CVE-2023-52736
| |
CVE-2023-52757
| |
CVE-2023-52738
| |
Use After Free
| |
CVE-2021-47318
| |
CVE-2021-47316
| |
CVE-2021-47308
| |
CVE-2021-47309
| |
CVE-2021-47300
| |
CVE-2021-47301
| |
CVE-2023-52747
| |
CVE-2023-52739
| |
Use After Free
| |
CVE-2023-52743
| |
CVE-2023-52744
| |
CVE-2023-52732
| |
CVE-2023-52751
| |
CVE-2023-52764
| |
CVE-2023-52731
| |
CVE-2023-52745
| |
CVE-2023-52734
| |
CVE-2023-52740
| |
CVE-2023-52759
| |
CVE-2023-52730
| |
CVE-2023-52762
| |
CVE-2021-47304
| |
CVE-2021-47305
| |
CVE-2021-47319
| |
CVE-2021-47303
| |
CVE-2021-47313
| |
CVE-2021-47317
| |
Improper Locking
| |
Improper Locking
| |
Out-of-bounds Read
| |
Resource Injection
| |
Improper Null Termination
| |
Use of Uninitialized Variable
| |
Resource Leak
| |
Use After Free
| |
CVE-2024-36950
| |
Incomplete Cleanup
| |
Resource Leak
| |
Improper Locking
| |
Resource Injection
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Race Condition
| |
Off-by-one Error
| |
Divide By Zero
| |
NULL Pointer Dereference
| |
CVE-2024-36906
| |
CVE-2024-36907
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Initialization
| |
NULL Pointer Dereference
| |
CVE-2024-36933
| |
CVE-2024-36911
| |
CVE-2024-36917
| |
CVE-2024-36881
| |
NULL Pointer Dereference
| |
CVE-2024-36918
| |
CVE-2024-36929
| |
CVE-2024-36910
| |
CVE-2024-36886
| |
CVE-2024-36943
| |
CVE-2024-36030
| |
Use After Free
| |
CVE-2024-36949
| |
CVE-2024-36031
| |
CVE-2024-36940
| |
NULL Pointer Dereference
| |
CVE-2024-36920
| |
CVE-2024-36927
| |
CVE-2024-36017
| |
CVE-2024-36022
| |
CVE-2024-36937
| |
CVE-2024-36924
| |
CVE-2024-36921
| |
CVE-2024-36882
| |
NULL Pointer Dereference
| |
CVE-2024-36914
| |
CVE-2024-36025
| |
CVE-2024-36885
| |
CVE-2024-36880
| |
CVE-2024-36021
| |
CVE-2024-36028
| |
CVE-2024-36019
| |
CVE-2024-36020
| |
CVE-2024-36945
| |
CVE-2024-36944
| |
CVE-2024-36941
| |
CVE-2024-36922
| |
CVE-2024-36883
| |
CVE-2023-52882
| |
CVE-2023-52758
| |
CVE-2024-36016
| |
CVE-2023-52881
| |
CVE-2024-36014
| |
CVE-2024-36015
| |
CVE-2024-26993
| |
Integer Underflow
| |
CVE-2024-26804
| |
Use After Free
| |
Resource Injection
| |
Race Condition
| |
Resource Injection
| |
CVE-2024-26993
| |
Integer Underflow
| |
CVE-2024-26804
| |
Use After Free
| |
Resource Injection
| |
Race Condition
| |
Resource Injection
| |
CVE-2024-26993
| |
Integer Underflow
| |
CVE-2024-26804
| |
Use After Free
| |
Resource Injection
| |
Race Condition
| |
Resource Injection
| |
CVE-2023-52880
| |
Use After Free
| |
NULL Pointer Dereference
| |
CVE-2021-47538
| |
NULL Pointer Dereference
| |
CVE-2021-47548
| |
CVE-2021-47568
| |
CVE-2021-47555
| |
CVE-2021-47558
| |
CVE-2021-47561
| |
CVE-2021-47515
| |
Memory Leak
| |
CVE-2021-47503
| |
Memory Leak
| |
CVE-2021-47500
| |
NULL Pointer Dereference
| |
Memory Leak
| |
CVE-2021-47539
| |
CVE-2021-47527
| |
CVE-2021-47504
| |
CVE-2021-47436
| |
CVE-2021-47536
| |
CVE-2021-47560
| |
Memory Leak
| |
CVE-2021-47501
| |
CVE-2021-47434
| |
CVE-2021-47505
| |
CVE-2021-47499
| |
CVE-2021-47502
| |
CVE-2021-47442
| |
CVE-2021-47433
| |
CVE-2021-47517
| |
CVE-2021-47469
| |
CVE-2021-47446
| |
CVE-2021-47444
| |
CVE-2021-47435
| |
CVE-2021-47473
| |
CVE-2021-47443
| |
CVE-2021-47441
| |
CVE-2021-47445
| |
CVE-2021-47438
| |
CVE-2021-47472
| |
CVE-2023-52746
| |
CVE-2021-47299
| |
CVE-2021-47287
| |
CVE-2021-47283
| |
CVE-2021-47291
| |
CVE-2021-47312
| |
CVE-2021-47269
| |
CVE-2021-47275
| |
CVE-2021-47298
| |
CVE-2021-47258
| |
CVE-2021-47266
| |
CVE-2021-47289
| |
CVE-2021-47264
| |
CVE-2021-47290
| |
CVE-2021-47257
| |
CVE-2021-47272
| |
CVE-2021-47251
| |
CVE-2021-47262
| |
CVE-2021-47277
| |
CVE-2021-47256
| |
CVE-2021-47246
| |
CVE-2021-47255
| |
CVE-2021-47265
| |
CVE-2021-47274
| |
CVE-2021-47276
| |
CVE-2021-47261
| |
CVE-2021-47241
| |
CVE-2021-47259
| |
CVE-2021-47232
| |
CVE-2021-47260
| |
CVE-2021-47238
| |
CVE-2021-47239
| |
CVE-2021-47254
| |
CVE-2021-47280
| |
CVE-2021-47225
| |
CVE-2021-47245
| |
CVE-2021-47220
| |
CVE-2021-47236
| |
CVE-2021-47247
| |
CVE-2021-47223
| |
CVE-2021-47250
| |
CVE-2021-47237
| |
CVE-2021-47222
| |
CVE-2021-47226
| |
CVE-2021-47228
| |
CVE-2021-47230
| |
CVE-2021-47227
| |
CVE-2021-47221
| |
CVE-2024-36013
| |
CVE-2024-36010
| |
CVE-2024-36012
| |
CVE-2024-36011
| |
CVE-2023-52878
| |
CVE-2023-52872
| |
CVE-2023-52874
| |
CVE-2023-52849
| |
CVE-2023-52845
| |
CVE-2023-52864
| |
CVE-2023-52867
| |
CVE-2023-52846
| |
CVE-2023-52838
| |
CVE-2023-52859
| |
CVE-2023-52842
| |
CVE-2023-52840
| |
CVE-2023-52848
| |
CVE-2023-52877
| |
CVE-2023-52834
| |
CVE-2023-52828
| |
CVE-2023-52869
| |
CVE-2023-52801
| |
NULL Pointer Dereference
| |
CVE-2023-52851
| |
CVE-2023-52835
| |
CVE-2023-52811
| |
NULL Pointer Dereference
| |
CVE-2023-52800
| |
NULL Pointer Dereference
| |
CVE-2023-52803
| |
CVE-2023-52813
| |
CVE-2023-52866
| |
CVE-2023-52854
| |
CVE-2023-52781
| |
CVE-2023-52837
| |
CVE-2023-52771
| |
CVE-2023-52808
| |
CVE-2023-52795
| |
CVE-2023-52833
| |
CVE-2023-52832
| |
CVE-2023-52824
| |
CVE-2023-52782
| |
CVE-2023-52830
| |
CVE-2023-52831
| |
CVE-2023-52786
| |
CVE-2023-52823
| |
CVE-2023-52778
| |
CVE-2023-52784
| |
CVE-2023-52819
| |
CVE-2023-52791
| |
CVE-2023-52792
| |
NULL Pointer Dereference
| |
CVE-2023-52818
| |
CVE-2023-52703
| |
CVE-2023-52820
| |
CVE-2023-52787
| |
CVE-2023-52794
| |
NULL Pointer Dereference
| |
CVE-2023-52702
| |
CVE-2023-52798
| |
CVE-2023-52796
| |
CVE-2023-52788
| |
CVE-2023-52706
| |
CVE-2023-52704
| |
CVE-2023-52700
| |
CVE-2023-52775
| |
CVE-2022-48707
| |
CVE-2022-48706
| |
CVE-2022-48710
| |
CVE-2022-48709
| |
CVE-2021-47488
| |
CVE-2021-47484
| |
CVE-2021-47465
| |
CVE-2021-47495
| |
CVE-2021-47497
| |
CVE-2021-47468
| |
CVE-2021-47449
| |
CVE-2021-47454
| |
CVE-2021-47483
| |
CVE-2021-47490
| |
CVE-2021-47481
| |
CVE-2021-47480
| |
CVE-2021-47457
| |
CVE-2021-47459
| |
CVE-2021-47455
| |
CVE-2021-47429
| |
CVE-2021-47421
| |
CVE-2021-47416
| |
CVE-2021-47393
| |
CVE-2021-47400
| |
CVE-2021-47399
| |
CVE-2021-47380
| |
CVE-2021-47384
| |
Incomplete Cleanup
| |
CVE-2021-47432
| |
CVE-2021-47431
| |
CVE-2021-47430
| |
Resource Leak
| |
CVE-2021-47428
| |
CVE-2021-47422
| |
CVE-2021-47343
| |
CVE-2021-47385
| |
CVE-2021-47383
| |
CVE-2021-47342
| |
Resource Leak
| |
Resource Leak
| |
CVE-2021-47386
| |
CVE-2021-47426
| |
CVE-2021-47336
| |
CVE-2021-47413
| |
Resource Injection
| |
CVE-2021-47338
| |
CVE-2021-47337
| |
CVE-2021-47420
| |
CVE-2021-47327
| |
CVE-2021-47332
| |
CVE-2021-47346
| |
CVE-2021-47404
| |
Improper Input Validation
| |
Resource Injection
| |
CVE-2021-47320
| |
CVE-2021-47322
| |
CVE-2021-47335
| |
CVE-2021-47398
| |
CVE-2021-47329
| |
CVE-2021-47378
| |
CVE-2021-47334
| |
CVE-2021-47325
| |
CVE-2021-47331
| |
CVE-2021-47339
| |
CVE-2021-47349
| |
CVE-2021-47333
| |
NULL Pointer Dereference
| |
CVE-2024-36000
| |
CVE-2024-35976
| |
CVE-2024-35998
| |
CVE-2024-35995
| |
Memory Leak
| |
CVE-2024-35957
| |
CVE-2024-35926
| |
CVE-2024-35966
| |
CVE-2024-35964
| |
CVE-2024-35958
| |
CVE-2024-35960
| |
CVE-2024-35944
| |
CVE-2024-35950
| |
CVE-2024-36004
| |
CVE-2024-35939
| |
CVE-2024-35946
| |
CVE-2024-35962
| |
CVE-2024-35942
| |
CVE-2024-35943
| |
CVE-2024-35979
| |
CVE-2024-35959
| |
CVE-2024-35989
| |
CVE-2024-35884
| |
CVE-2024-35963
| |
CVE-2024-35952
| |
CVE-2024-35923
| |
CVE-2024-35872
| |
CVE-2024-35918
| |
CVE-2024-35867
| |
CVE-2024-35864
| |
CVE-2024-35885
| |
CVE-2024-35870
| |
CVE-2024-35879
| |
CVE-2024-35875
| |
CVE-2024-35866
| |
CVE-2024-35868
| |
CVE-2024-35860
| |
CVE-2024-36005
| |
CVE-2024-35861
| |
CVE-2024-35981
| |
CVE-2024-35863
| |
CVE-2024-35969
| |
CVE-2024-35983
| |
CVE-2024-35954
| |
CVE-2024-35974
| |
CVE-2024-35934
| |
CVE-2024-35945
| |
CVE-2024-35922
| |
CVE-2024-35980
| |
CVE-2024-35880
| |
CVE-2024-36002
| |
CVE-2024-35862
| |
CVE-2024-36007
| |
CVE-2024-35991
| |
CVE-2024-35999
| |
CVE-2024-35973
| |
CVE-2024-35876
| |
CVE-2024-35996
| |
CVE-2024-35869
| |
CVE-2024-36006
| |
CVE-2024-35937
| |
CVE-2024-35967
| |
CVE-2024-35941
| |
CVE-2024-35933
| |
Memory Leak
| |
CVE-2024-36003
| |
CVE-2024-35865
| |
CVE-2024-35925
| |
CVE-2024-35938
| |
CVE-2024-35965
| |
CVE-2024-35924
| |
CVE-2024-35878
| |
CVE-2024-35877
| |
CVE-2024-35931
| |
CVE-2024-35890
| |
CVE-2024-35894
| |
CVE-2024-35896
| |
CVE-2024-35899
| |
CVE-2024-35947
| |
CVE-2024-35897
| |
CVE-2024-35930
| |
CVE-2024-35912
| |
CVE-2024-35904
| |
CVE-2024-35927
| |
CVE-2024-35908
| |
CVE-2024-35907
| |
CVE-2024-35892
| |
CVE-2024-35891
| |
CVE-2024-35901
| |
CVE-2024-35886
| |
CVE-2024-35895
| |
CVE-2024-35900
| |
CVE-2024-35905
| |
CVE-2024-35887
| |
CVE-2024-35917
| |
CVE-2024-35898
| |
CVE-2024-35928
| |
CVE-2024-35913
| |
CVE-2024-35903
| |
CVE-2024-35929
| |
CVE-2024-35911
| |
CVE-2024-35888
| |
CVE-2023-52662
| |
CVE-2023-52663
| |
CVE-2023-52661
| |
Resource Leak
| |
Resource Leak
| |
Resource Leak
| |
CVE-2024-35810
| |
CVE-2024-35859
| |
CVE-2024-35823
| |
CVE-2024-35847
| |
CVE-2024-35853
| |
CVE-2024-35840
| |
CVE-2024-35803
| |
CVE-2024-35818
| |
CVE-2024-35855
| |
CVE-2024-35817
| |
CVE-2024-35812
| |
CVE-2024-35808
| |
CVE-2024-35824
| |
CVE-2024-35794
| |
CVE-2024-35805
| |
CVE-2024-35787
| |
CVE-2024-35790
| |
CVE-2024-35789
| |
CVE-2024-35848
| |
CVE-2024-27435
| |
CVE-2024-35857
| |
CVE-2024-35845
| |
CVE-2024-35839
| |
CVE-2024-35836
| |
CVE-2024-35800
| |
CVE-2024-35854
| |
CVE-2024-27429
| |
CVE-2024-35831
| |
CVE-2024-35807
| |
CVE-2024-27425
| |
CVE-2024-27404
| |
CVE-2024-27428
| |
CVE-2024-27431
| |
CVE-2024-27417
| |
CVE-2024-27411
| |
CVE-2024-35838
| |
CVE-2024-35815
| |
CVE-2024-27415
| |
CVE-2024-35852
| |
CVE-2024-27426
| |
CVE-2024-27421
| |
CVE-2024-35814
| |
CVE-2024-35843
| |
CVE-2024-35797
| |
CVE-2024-35834
| |
CVE-2024-35795
| |
CVE-2024-35835
| |
CVE-2024-35827
| |
CVE-2024-27427
| |
CVE-2024-27423
| |
CVE-2024-35801
| |
CVE-2024-35822
| |
CVE-2024-27403
| |
CVE-2024-27420
| |
CVE-2024-27424
| |
CVE-2024-27414
| |
CVE-2024-35809
| |
CVE-2024-35826
| |
CVE-2024-27436
| |
CVE-2024-35804
| |
CVE-2024-35791
| |
CVE-2024-27422
| |
CVE-2024-27430
| |
CVE-2024-35802
| |
CVE-2024-27413
| |
CVE-2024-27419
| |
CVE-2024-27434
| |
CVE-2024-27410
| |
CVE-2023-52669
| |
CVE-2023-52680
| |
CVE-2023-52658
| |
CVE-2023-52674
| |
CVE-2023-52679
| |
CVE-2023-52698
| |
CVE-2023-52696
| |
CVE-2023-52686
| |
CVE-2023-52676
| |
CVE-2023-52667
| |
CVE-2023-52659
| |
CVE-2023-52675
| |
CVE-2023-52664
| |
CVE-2023-52689
| |
CVE-2023-52690
| |
CVE-2023-52697
| |
CVE-2023-52683
| |
CVE-2023-52672
| |
CVE-2024-27393
| |
CVE-2024-27399
| |
CVE-2024-27398
| |
CVE-2024-27397
| |
CVE-2024-27395
| |
CVE-2024-21823
| |
CVE-2023-52656
| |
CVE-2023-52654
| |
CVE-2024-25744
| |
Out-of-bounds Write
| |
CVE-2024-25744
| |
Out-of-bounds Write
| |
CVE-2024-25744
| |
Out-of-bounds Write
| |
Resource Exhaustion
| |
Cross-site Scripting (XSS)
| |
Resource Exhaustion
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2023-39321
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Improper Handling of Missing Special Element
| |
Use After Free
| |
CVE-2023-2728
| |
CVE-2023-2727
| |
Resource Exhaustion
| |
CVE-2024-26974
| |
CVE-2022-48702
| |
Memory Leak
| |
CVE-2022-48694
| |
CVE-2022-48704
| |
Race Condition
| |
Improper Locking
| |
Out-of-bounds Read
| |
CVE-2022-48705
| |
Use After Free
| |
CVE-2022-48703
| |
Improper Locking
| |
Off-by-one Error
| |
CVE-2022-48695
| |
Improper Handling of Exceptional Conditions
| |
Use After Free
| |
CVE-2022-48701
| |
CVE-2022-48697
| |
NULL Pointer Dereference
| |
CVE-2022-48690
| |
Memory Leak
| |
NULL Pointer Dereference
| |
CVE-2024-27057
| |
CVE-2024-27073
| |
CVE-2024-27077
| |
CVE-2024-27390
| |
CVE-2024-27003
| |
CVE-2024-27030
| |
CVE-2024-27011
| |
CVE-2024-27017
| |
Race Condition
| |
Race Condition
| |
CVE-2024-27047
| |
CVE-2024-27038
| |
CVE-2024-27052
| |
CVE-2024-27010
| |
CVE-2024-27389
| |
CVE-2024-27026
| |
CVE-2024-26991
| |
CVE-2024-27065
| |
CVE-2024-27048
| |
CVE-2024-27049
| |
CVE-2024-27056
| |
CVE-2024-27388
| |
CVE-2024-27042
| |
CVE-2024-26976
| |
CVE-2024-27004
| |
Improper Locking
| |
CVE-2024-27027
| |
CVE-2024-27016
| |
CVE-2024-26989
| |
CVE-2024-26947
| |
CVE-2024-27025
| |
CVE-2024-27062
| |
CVE-2024-27031
| |
Improper Locking
| |
CVE-2024-26975
| |
CVE-2024-26931
| |
CVE-2024-27059
| |
CVE-2024-27023
| |
CVE-2024-26962
| |
CVE-2024-26982
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2024-27000
| |
Double Free
| |
CVE-2024-27046
| |
CVE-2024-26972
| |
CVE-2024-26938
| |
CVE-2024-27055
| |
CVE-2024-27050
| |
CVE-2024-26984
| |
CVE-2024-27002
| |
CVE-2024-27079
| |
Use of Uninitialized Resource
| |
CVE-2024-26988
| |
CVE-2024-26992
| |
CVE-2024-26961
| |
CVE-2024-26999
| |
Memory Leak
| |
CVE-2024-26950
| |
CVE-2024-26990
| |
CVE-2024-26958
| |
CVE-2024-26953
| |
CVE-2024-26973
| |
CVE-2024-26945
| |
CVE-2024-27039
| |
CVE-2024-26960
| |
Improper Locking
| |
CVE-2024-26951
| |
CVE-2024-27015
| |
Improper Locking
| |
CVE-2024-26939
| |
NULL Pointer Dereference
| |
CVE-2024-26946
| |
CVE-2024-26964
| |
CVE-2024-26937
| |
CVE-2024-26935
| |
Double Free
| |
CVE-2024-26940
| |
CVE-2023-52651
| |
CVE-2023-52650
| |
CVE-2023-52653
| |
CVE-2023-52649
| |
CVE-2023-52648
| |
CVE-2022-48669
| |
Stack-based Buffer Overflow
| |
Improper Neutralization of Null Byte or NUL Character
| |
Improper Input Validation
| |
Race Condition
| |
Use After Free
| |
Deadlock
| |
Memory Leak
| |
CVE-2024-25743
| |
CVE-2024-25742
| |
CVE-2024-25743
| |
CVE-2024-25742
| |
Memory Leak
| |
CVE-2024-25743
| |
CVE-2024-25742
| |
Memory Leak
| |
Use After Free
| |
Out-of-Bounds
| |
CVE-2024-26927
| |
CVE-2023-52646
| |
CVE-2022-48660
| |
CVE-2022-48643
| |
CVE-2022-48662
| |
CVE-2022-48663
| |
CVE-2022-48651
| |
CVE-2022-48657
| |
CVE-2022-48666
| |
Use of Uninitialized Resource
| |
CVE-2022-48652
| |
CVE-2022-48641
| |
CVE-2022-48653
| |
CVE-2022-48648
| |
CVE-2022-48659
| |
CVE-2022-48658
| |
CVE-2022-48646
| |
CVE-2022-48650
| |
CVE-2022-48644
| |
CVE-2022-48638
| |
CVE-2022-48642
| |
CVE-2022-48647
| |
CVE-2022-48649
| |
CVE-2022-48640
| |
CVE-2022-48632
| |
CVE-2022-48639
| |
CVE-2022-48637
| |
CVE-2022-48635
| |
Integer Underflow
| |
Resource Leak
| |
Improper Validation of Specified Index, Position, or Offset in Input
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Improper Locking
| |
Improper Input Validation
| |
Deadlock
| |
NULL Pointer Dereference
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2024-26921
| |
CVE-2024-26919
| |
Race Condition
| |
Resource Injection
| |
Improper Input Validation
| |
CVE-2024-26915
| |
Stack-based Buffer Overflow
| |
Incomplete Cleanup
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Race Condition
| |
Resource Injection
| |
Race Condition
| |
Race Condition
| |
Stack-based Buffer Overflow
| |
Unchecked Return Value to NULL Pointer Dereference
| |
Resource Leak
| |
Use After Free
| |
Race Condition
| |
Resource Injection
| |
Resource Leak
| |
Resource Leak
| |
Improper Input Validation
| |
CVE-2024-26920
| |
Unchecked Return Value to NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Memory Leak
| |
Resource Injection
| |
Improper Input Validation
| |
Race Condition
| |
CVE-2024-26918
| |
Data Element containing Pointer Item without Proper Copy Control Element
| |
Improper Resource Locking
| |
Improper Input Validation
| |
Use After Free
| |
Stack-based Buffer Overflow
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Divide By Zero
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Resource Leak
| |
Out-of-bounds Write
| |
Return of Wrong Status Code
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Return of Wrong Status Code
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Return of Wrong Status Code
| |
Use After Free
| |
Information Exposure
| |
Improper Input Validation
| |
Buffer Access with Incorrect Length Value
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Out-of-bounds Read
| |
Use After Free
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Resource Injection
| |
Out-of-bounds Read
| |
Improper Neutralization of Null Byte or NUL Character
| |
Excessive Platform Resource Consumption within a Loop
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Improper Handling of Unicode Encoding
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2024-26782
| |
CVE-2024-26786
| |
CVE-2024-26783
| |
Resource Injection
| |
CVE-2024-26803
| |
Use After Free
| |
CVE-2024-26785
| |
CVE-2024-26801
| |
Deadlock
| |
Improper Input Validation
| |
Improper Handling of Values
| |
Improper Handling of Values
| |
Divide By Zero
| |
Incomplete Cleanup
| |
Race Condition
| |
Improper Null Termination
| |
Improper Input Validation
| |
Divide By Zero
| |
Improper Input Validation
| |
Deadlock
| |
Race Condition
| |
Improper Null Termination
| |
Unchecked Input for Loop Condition
| |
Use After Free
| |
Deadlock
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Race Condition
| |
Double Free
| |
Deadlock
| |
Heap-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Divide By Zero
| |
Improper Null Termination
| |
Resource Injection
| |
Improper Input Validation
| |
Race Condition
| |
Improper Handling of Undefined Parameters
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Race Condition
| |
Use After Free
| |
Deadlock
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Resource Injection
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Deadlock
| |
Race Condition
| |
Resource Injection
| |
Improper Protection Against Physical Side Channels
| |
Unchecked Input for Loop Condition
| |
Improper Input Validation
| |
Use After Free
| |
Resource Injection
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Resource Leak
| |
Out-of-bounds Read
| |
Resource Injection
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Resource Injection
| |
Missing Lock Check
| |
Improper Locking
| |
Integer Underflow
| |
Improper Handling of Unicode Encoding
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Deadlock
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Race Condition
| |
Resource Injection
| |
Out-of-bounds Read
| |
Resource Injection
| |
Race Condition
| |
Improper Resource Locking
| |
Incorrect Calculation of Buffer Size
| |
Resource Injection
| |
CVE-2024-26602
| |
Integer Underflow
| |
CVE-2024-26602
| |
Integer Underflow
| |
CVE-2024-26602
| |
Integer Underflow
| |
Improper Resource Locking
| |
Improper Input Validation
| |
Missing Initialization of a Variable
| |
Improper Input Validation
| |
Resource Injection
| |
Missing Lock Check
| |
Resource Injection
| |
Deadlock
| |
Stack-based Buffer Overflow
| |
Unchecked Input for Loop Condition
| |
Memory Leak
| |
Return of Wrong Status Code
| |
Use After Free
| |
Use of NullPointerException Catch to Detect NULL Pointer Dereference
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Deadlock
| |
Deadlock
| |
Improper Resource Locking
| |
Deadlock
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
Improper Input Validation
| |
Resource Exhaustion
| |
Return of Stack Variable Address
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Protection Against Physical Side Channels
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Read
| |
Resource Leak
| |
Use of Uninitialized Variable
| |
Use After Free
| |
Double Free
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Resource Leak
| |
Improper Resource Locking
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
Unchecked Return Value
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Stack-based Buffer Overflow
| |
CVE-2023-52520
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
CVE-2023-52575
| |
Race Condition
| |
Improper Input Validation
| |
Resource Leak
| |
Resource Injection
| |
Improper Handling of Overlap Between Protected Memory Ranges
| |
Missing Encryption of Sensitive Data
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Resource Leak
| |
Resource Injection
| |
Resource Leak
| |
CVE-2024-26615
| |
Memory Leak
| |
Use After Free
| |
Memory Leak
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Deadlock
| |
Use After Free
| |
Resource Leak
| |
Use After Free
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Use After Free
| |
Untrusted Pointer Dereference
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Resource Leak
| |
Resource Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Resource Leak
| |
Resource Leak
| |
Race Condition
| |
Resource Leak
| |
Improper Check or Handling of Exceptional Conditions
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Resource Leak
| |
Range Error
| |
Improper Input Validation
| |
CVE-2021-46914
| |
Missing Support for Integrity Check
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Improper Input Validation
| |
Unchecked Error Condition
| |
Use After Free
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
CVE-2023-52474
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Range Error
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Deadlock
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
Untrusted Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2023-52462
| |
Use After Free
| |
CVE-2023-52455
| |
NULL Pointer Dereference
| |
Improper Validation of Array Index
| |
Buffer Access with Incorrect Length Value
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
NULL Pointer Dereference
| |
CVE-2024-26581
| |
Use After Free
| |
Improper Authentication
| |
Memory Leak
| |
Improper Check for Unusual or Exceptional Conditions
| |
CVE-2024-25744
| |
CVE-2024-25741
| |
Stack-based Buffer Overflow
| |
Out-of-bounds Write
| |
Memory Leak
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Memory Leak
| |
Out-of-bounds Write
| |
Memory Leak
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Memory Leak
| |
Out-of-bounds Write
| |
Memory Leak
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Memory Leak
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Resource Exhaustion
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Improper Handling of Unicode Encoding
| |
Arbitrary Code Injection
| |
Resource Exhaustion
| |
Directory Traversal
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Information Exposure
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Deadlock
| |
Improper Handling of Values
| |
Deadlock
| |
Resource Leak
| |
Information Exposure
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Double Free
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Information Exposure
| |
CVE-2022-27672
| |
Double Free
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Information Exposure
| |
CVE-2022-27672
| |
Double Free
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Information Exposure
| |
CVE-2022-27672
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Handling of Exceptional Conditions
| |
Allocation of Resources Without Limits or Throttling
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Improper Resource Locking
| |
Improper Resource Locking
| |
Improper Resource Locking
| |
Improper Resource Locking
| |
Divide By Zero
| |
Release of Invalid Pointer or Reference
| |
Sensitive Information Uncleared Before Release
| |
Reachable Assertion
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Exposure of Resource to Wrong Sphere
| |
Exposure of Resource to Wrong Sphere
| |
Exposure of Resource to Wrong Sphere
| |
Improper Update of Reference Count
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Use After Free
| |
Interpretation Conflict
| |
Interpretation Conflict
| |
Interpretation Conflict
| |
Interpretation Conflict
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Out-of-bounds Read
| |
Improper Initialization
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2022-27672
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Externally Controlled Reference to a Resource in Another Sphere
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Write-what-where Condition
| |
Write-what-where Condition
| |
Write-what-where Condition
| |
Write-what-where Condition
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Insecure Default Initialization of Resource
| |
Insecure Default Initialization of Resource
| |
Insecure Default Initialization of Resource
| |
Insecure Default Initialization of Resource
| |
Memory Leak
| |
Non-exit on Failed Initialization
| |
Non-exit on Failed Initialization
| |
Non-exit on Failed Initialization
| |
Non-exit on Failed Initialization
| |
NULL Pointer Dereference
| |
Information Exposure
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Improper Locking
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Race Condition During Access to Alternate Channel
| |
Race Condition During Access to Alternate Channel
| |
Race Condition During Access to Alternate Channel
| |
Race Condition During Access to Alternate Channel
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Authentication Bypass by Primary Weakness
| |
Authentication Bypass by Primary Weakness
| |
Authentication Bypass by Primary Weakness
| |
Authentication Bypass by Primary Weakness
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Expected Behavior Violation
| |
Incorrect Control Flow Scoping
| |
Incorrect Control Flow Scoping
| |
Incorrect Control Flow Scoping
| |
Incorrect Control Flow Scoping
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Expected Behavior Violation
| |
Expected Behavior Violation
| |
Expected Behavior Violation
| |
Expected Behavior Violation
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Out-of-bounds Read
| |
Improper Update of Reference Count
| |
Improper Update of Reference Count
| |
Improper Update of Reference Count
| |
Improper Update of Reference Count
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Time-of-check Time-of-use (TOCTOU)
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Race Condition
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Information Exposure
| |
Information Exposure
| |
Memory Leak
| |
Out-of-bounds Write
| |
Improper Preservation of Permissions
| |
Buffer Overflow
| |
Memory Leak
| |
Release of Invalid Pointer or Reference
| |
Out-of-Bounds
| |
Race Condition
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Memory Leak
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Insufficient Comparison
| |
Information Exposure
| |
Use After Free
| |
Improper Initialization
| |
Incorrect Authorization
| |
Information Exposure
| |
Improper Cleanup on Thrown Exception
| |
Authentication Bypass
| |
Incorrect Check of Function Return Value
| |