Use After Free | |
Use of NullPointerException Catch to Detect NULL Pointer Dereference | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Read | |
CVE-2024-58057 | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2025-21758 | |
Use After Free | |
CVE-2024-28956 | |
CVE-2025-37943 | |
CVE-2025-37944 | |
CVE-2025-37912 | |
CVE-2025-37906 | |
CVE-2025-37981 | |
CVE-2025-37932 | |
CVE-2025-37933 | |
Out-of-bounds Read | |
CVE-2025-37988 | |
CVE-2025-37980 | |
Out-of-bounds Read | |
CVE-2025-37967 | |
CVE-2025-37891 | |
CVE-2025-37895 | |
CVE-2025-37961 | |
CVE-2025-37990 | |
CVE-2025-37949 | |
CVE-2025-37984 | |
CVE-2025-37976 | |
CVE-2025-37960 | |
CVE-2025-37978 | |
CVE-2025-37989 | |
Improper Initialization | |
CVE-2025-37986 | |
Integer Overflow or Wraparound | |
CVE-2025-37963 | |
CVE-2025-37946 | |
CVE-2025-37974 | |
CVE-2025-37973 | |
Integer Overflow or Wraparound | |
CVE-2025-37985 | |
CVE-2025-37957 | |
Use After Free | |
Use After Free | |
CVE-2025-37954 | |
CVE-2025-37958 | |
CVE-2025-37955 | |
CVE-2025-37948 | |
CVE-2025-37959 | |
CVE-2025-37921 | |
Out-of-bounds Write | |
Out-of-Bounds | |
CVE-2024-57979 | |
CVE-2025-37936 | |
CVE-2025-37908 | |
CVE-2025-37894 | |
Use After Free | |
CVE-2025-37911 | |
CVE-2025-37907 | |
CVE-2025-37918 | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Use After Free | |
Improper Cleanup on Thrown Exception | |
Resource Exhaustion | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Race Condition | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
External Initialization of Trusted Variables or Data Stores | |
Arbitrary Code Injection | |
Insufficient Comparison | |
Out-of-bounds Write | |
Use After Free | |
Information Exposure | |
Resource Exhaustion | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Numeric Errors | |
Improper Input Validation | |
Buffer Overflow | |
Out-of-Bounds | |
Use After Free | |
Out-of-bounds Write | |
Resource Exhaustion | |
Out-of-Bounds | |
CVE-2017-1000379 | |
Out-of-bounds Read | |
Use After Free | |
NULL Pointer Dereference | |
Information Exposure | |
Heap-based Buffer Overflow | |
Divide By Zero | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-Bounds | |
Use After Free | |
Execution with Unnecessary Privileges | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Memory Leak | |
Information Exposure | |
Resource Exhaustion | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Improper Check for Unusual or Exceptional Conditions | |
Improper Enforcement of Behavioral Workflow | |
Improper Enforcement of Behavioral Workflow | |
Code | |
Numeric Errors | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Resource Exhaustion | |
Information Exposure | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Out-of-bounds Read | |
Use After Free | |
Incorrect Permission Assignment for Critical Resource | |
Time-of-check Time-of-use (TOCTOU) | |