Resource Exhaustion | |
Buffer Overflow | |
Out-of-bounds Read | |
Out-of-bounds Write | |
CVE-2025-38234 | |
CVE-2025-38498 | |
CVE-2025-38304 | |
CVE-2025-38289 | |
Improper Check for Unusual or Exceptional Conditions | |
CVE-2025-38298 | |
Use After Free | |
CVE-2025-22089 | |
Memory Leak | |
CVE-2025-22122 | |
CVE-2025-22116 | |
CVE-2025-22086 | |
CVE-2025-22111 | |
Improper Input Validation | |
CVE-2025-21983 | |
CVE-2025-22045 | |
Deadlock | |
CVE-2025-21932 | |
NULL Pointer Dereference | |
Race Condition | |
Directory Traversal | |
CVE-2025-38346 | |
CVE-2025-22105 | |
Resource Injection | |
Memory Leak | |
Memory Leak | |
Improper Input Validation | |
Use of Uninitialized Resource | |
Memory Leak | |
Resource Injection | |
Improper Initialization | |
Improper Check or Handling of Exceptional Conditions | |
CVE-2025-22092 | |
Improper Input Validation | |
Race Condition | |
CVE-2025-21958 | |
CVE-2025-22025 | |
NULL Pointer Dereference | |
Improper Resource Locking | |
Resource Injection | |
CVE-2025-21930 | |
CVE-2025-38166 | |
CVE-2025-22034 | |
Buffer Overflow | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Memory Leak | |
Stack-based Buffer Overflow | |
Divide By Zero | |
CVE-2025-21954 | |
Incomplete Cleanup | |
Use of Uninitialized Resource | |
CVE-2025-38314 | |
NULL Pointer Dereference | |
Improper Initialization | |
CVE-2025-38345 | |
NULL Pointer Dereference | |
CVE-2025-23129 | |
Race Condition | |
NULL Pointer Dereference | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2025-38213 | |
CVE-2025-38330 | |
Race Condition | |
Memory Leak | |
Improper Input Validation | |
Improper Validation of Array Index | |
Memory Leak | |
CVE-2025-38279 | |
Improper Input Validation | |
NULL Pointer Dereference | |
CVE-2025-38329 | |
CVE-2025-38267 | |
Resource Injection | |
CVE-2025-38318 | |
Integer Overflow or Wraparound | |
Improper Synchronization | |
CVE-2025-38165 | |
CVE-2025-38202 | |
CVE-2025-38067 | |
CVE-2025-38097 | |
CVE-2025-38275 | |
CVE-2025-38198 | |
Use After Free | |
Improper Input Validation | |
CVE-2025-38148 | |
CVE-2025-38037 | |
Divide By Zero | |
CVE-2025-38320 | |
Resource Leak | |
CVE-2025-38010 | |
CVE-2025-38313 | |
CVE-2025-38311 | |
CVE-2025-38310 | |
CVE-2025-38013 | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2025-37981 | |
Incorrect Check of Function Return Value | |
CVE-2025-37945 | |
CVE-2025-37980 | |
Improper Input Validation | |
CVE-2025-37909 | |
CVE-2025-37942 | |
CVE-2025-37936 | |
CVE-2025-37932 | |
CVE-2025-37920 | |
CVE-2025-37907 | |
CVE-2025-37928 | |
Allocation of Resources Without Limits or Throttling | |
CVE-2025-37835 | |
CVE-2025-37821 | |
CVE-2025-37837 | |
CVE-2025-37938 | |
CVE-2025-38015 | |
CVE-2025-37804 | |
CVE-2025-37911 | |
CVE-2025-37895 | |
Memory Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Deadlock | |
Use After Free | |
Improper Cross-boundary Removal of Sensitive Data | |
Incomplete Cleanup | |
CVE-2025-22108 | |
Use After Free | |
Incomplete Cleanup | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2025-22064 | |
NULL Pointer Dereference | |
Incorrect Calculation of Buffer Size | |
CVE-2025-22076 | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
NULL Pointer Dereference | |
Improper Resource Locking | |
Out-of-bounds Write | |
Incorrect Conversion between Numeric Types | |
Improper Handling of Exceptional Conditions | |
CVE-2025-22035 | |
Use After Free | |
Improper Input Validation | |
Use of NullPointerException Catch to Detect NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | |
Use of NullPointerException Catch to Detect NULL Pointer Dereference | |
NULL Pointer Dereference | |
Memory Leak | |
NULL Pointer Dereference | |
Memory Leak | |
NULL Pointer Dereference | |
Improper Cleanup on Thrown Exception | |
Race Condition | |
Resource Injection | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Check or Handling of Exceptional Conditions | |
Duplicate Operations on Resource | |
Use of Uninitialized Resource | |
Improper Locking | |
Improper Locking | |
Race Condition | |
Resource Injection | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
Improper Locking | |
Out-of-bounds Read | |
Improper Locking | |
CVE-2025-38349 | |
Resource Injection | |
Out-of-bounds Read | |
Improper Locking | |
CVE-2025-38344 | |
Improper Synchronization | |
CVE-2025-38340 | |
CVE-2025-38324 | |
CVE-2025-38338 | |
CVE-2025-38321 | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Out-of-Bounds | |
CVE-2025-38302 | |
CVE-2025-38306 | |
Operation on a Resource after Expiration or Release | |
CVE-2025-38297 | |
Always-Incorrect Control Flow Implementation | |
CVE-2025-38293 | |
CVE-2025-38294 | |
CVE-2025-38285 | |
CVE-2025-38287 | |
CVE-2025-38305 | |
NULL Pointer Dereference | |
CVE-2025-37780 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-bounds Read | |
Memory Leak | |
Deadlock | |
NULL Pointer Dereference | |
Deadlock | |
Improper Access Control | |
Integer Underflow | |
NULL Pointer Dereference | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Exposure of Data Element to Wrong Session | |
Always-Incorrect Control Flow Implementation | |
CVE-2025-38282 | |
CVE-2025-38246 | |
Operation on a Resource after Expiration or Release | |
CVE-2025-38262 | |
NULL Pointer Dereference | |
CVE-2025-38257 | |
CVE-2025-38215 | |
CVE-2025-38258 | |
Incomplete Cleanup | |
CVE-2025-38253 | |
CVE-2025-38249 | |
CVE-2025-38248 | |
CVE-2025-38256 | |
CVE-2025-38255 | |
CVE-2025-38244 | |
CVE-2025-38238 | |
CVE-2025-38242 | |
CVE-2025-38232 | |
Incomplete Cleanup | |
CVE-2025-38212 | |
CVE-2025-38210 | |
CVE-2025-38231 | |
CVE-2025-38223 | |
CVE-2025-38222 | |
Missing Release of Resource after Effective Lifetime | |
CVE-2025-38201 | |
CVE-2025-38216 | |
CVE-2025-38207 | |
CVE-2025-38208 | |
CVE-2025-38186 | |
CVE-2025-38206 | |
CVE-2025-38192 | |
CVE-2025-38184 | |
CVE-2025-38179 | |
Use After Free | |
CVE-2025-38181 | |
CVE-2025-38183 | |
CVE-2025-38172 | |
NULL Pointer Dereference | |
CVE-2025-38140 | |
CVE-2025-38168 | |
CVE-2025-38157 | |
CVE-2025-38169 | |
CVE-2025-38162 | |
CVE-2025-38161 | |
CVE-2025-38149 | |
CVE-2025-38154 | |
CVE-2025-38141 | |
CVE-2025-38147 | |
CVE-2025-38146 | |
CVE-2025-38120 | |
CVE-2025-38134 | |
CVE-2025-38130 | |
CVE-2025-38138 | |
Use After Free | |
Divide By Zero | |
CVE-2025-38122 | |
CVE-2025-38126 | |
CVE-2025-38129 | |
CVE-2025-38128 | |
CVE-2025-38119 | |
CVE-2025-38118 | |
CVE-2025-38115 | |
CVE-2025-38117 | |
Out-of-bounds Read | |
CVE-2025-38108 | |
CVE-2025-38113 | |
CVE-2025-38109 | |
CVE-2025-38107 | |
CVE-2025-38106 | |
CVE-2025-38112 | |
CVE-2025-38103 | |
CVE-2025-38105 | |
CVE-2025-38095 | |
CVE-2025-38096 | |
CVE-2025-38101 | |
CVE-2025-38102 | |
Race Condition | |
CVE-2025-38100 | |
CVE-2025-38099 | |
CVE-2025-38078 | |
Buffer Overflow | |
CVE-2025-38055 | |
Divide By Zero | |
CVE-2025-38068 | |
CVE-2025-38075 | |
CVE-2025-38071 | |
CVE-2025-38073 | |
Resource Injection | |
CVE-2025-38062 | |
CVE-2025-38060 | |
CVE-2025-38061 | |
CVE-2025-38058 | |
Missing Release of Resource after Effective Lifetime | |
CVE-2025-38064 | |
CVE-2025-38056 | |
CVE-2025-38047 | |
CVE-2025-38045 | |
CVE-2025-38066 | |
Resource Injection | |
CVE-2025-38038 | |
CVE-2025-38036 | |
CVE-2025-38042 | |
CVE-2025-38046 | |
CVE-2025-38051 | |
Improper Input Validation | |
NULL Pointer Dereference | |
CVE-2025-38048 | |
Deadlock | |
CVE-2025-38028 | |
CVE-2025-38029 | |
CVE-2025-38032 | |
CVE-2025-38031 | |
CVE-2025-38017 | |
CVE-2025-38022 | |
CVE-2025-38023 | |
Resource Injection | |
CVE-2025-38014 | |
CVE-2025-38019 | |
CVE-2025-38020 | |
CVE-2025-38018 | |
CVE-2025-38007 | |
CVE-2025-38005 | |
CVE-2025-37995 | |
CVE-2025-38016 | |
CVE-2025-38008 | |
CVE-2025-38004 | |
CVE-2025-37992 | |
CVE-2025-37997 | |
Improper Handling of Unexpected Data Type | |
CVE-2025-37996 | |
CVE-2025-38003 | |
CVE-2025-37993 | |
CVE-2025-37999 | |
CVE-2025-37986 | |
CVE-2025-37988 | |
CVE-2025-37978 | |
Premature Release of Resource During Expected Lifetime | |
CVE-2025-37990 | |
CVE-2025-37989 | |
CVE-2025-37974 | |
CVE-2025-37976 | |
CVE-2025-37973 | |
CVE-2025-37963 | |
CVE-2025-37967 | |
CVE-2025-37954 | |
CVE-2025-37961 | |
CVE-2025-37946 | |
CVE-2025-37955 | |
Improper Initialization | |
CVE-2025-37919 | |
CVE-2025-37944 | |
CVE-2025-37960 | |
CVE-2025-37959 | |
CVE-2025-37918 | |
CVE-2025-37908 | |
CVE-2025-37949 | |
CVE-2025-37948 | |
CVE-2025-37940 | |
CVE-2025-37933 | |
CVE-2025-37906 | |
CVE-2025-37923 | |
CVE-2025-37921 | |
CVE-2025-37927 | |
CVE-2025-37912 | |
CVE-2025-37884 | |
CVE-2025-37894 | |
CVE-2025-37891 | |
Improper Input Validation | |
CVE-2025-37883 | |
CVE-2025-37882 | |
CVE-2025-37878 | |
CVE-2025-37885 | |
CVE-2025-37888 | |
CVE-2025-37877 | |
CVE-2025-37876 | |
Use After Free | |
CVE-2025-37873 | |
CVE-2025-37875 | |
CVE-2025-37867 | |
CVE-2025-37859 | |
NULL Pointer Dereference | |
CVE-2025-37857 | |
CVE-2025-37861 | |
CVE-2025-37862 | |
CVE-2025-37863 | |
CVE-2025-37848 | |
Deadlock | |
CVE-2025-37849 | |
CVE-2025-37842 | |
CVE-2025-37839 | |
CVE-2025-37846 | |
CVE-2025-37844 | |
CVE-2025-37843 | |
NULL Pointer Dereference | |
CVE-2025-37836 | |
CVE-2025-37829 | |
CVE-2025-37834 | |
CVE-2025-37823 | |
CVE-2025-37828 | |
CVE-2025-37826 | |
NULL Pointer Dereference | |
Deadlock | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
CVE-2025-37820 | |
CVE-2025-37819 | |
CVE-2025-37816 | |
CVE-2025-37808 | |
Windows Virtual File Problems | |
Resource Injection | |
CVE-2025-37807 | |
NULL Pointer Dereference | |
Improper Input Validation | |
CVE-2025-37810 | |
CVE-2025-37809 | |
Improper Input Validation | |
Race Condition | |
Use After Free | |
CVE-2025-38475 | |
CVE-2025-38474 | |
CVE-2025-38488 | |
Integer Underflow | |
Use After Free | |
CVE-2025-38491 | |
CVE-2025-38494 | |
Use After Free | |
CVE-2025-38495 | |
CVE-2025-38489 | |
CVE-2025-38288 | |
CVE-2025-38470 | |
CVE-2025-38493 | |
CVE-2025-38496 | |
Untrusted Pointer Dereference | |
Improper Control of a Resource Through its Lifetime | |
CVE-2025-38497 | |
CVE-2025-38492 | |
Improper Check for Unusual or Exceptional Conditions | |
CVE-2025-38473 | |
Race Condition | |
Improper Validation of Specified Quantity in Input | |
Out-of-bounds Read | |
CVE-2025-22091 | |
Use After Free | |
CVE-2025-38088 | |
Improper Null Termination | |
Release of Invalid Pointer or Reference | |
CVE-2024-56699 | |
Release of Invalid Pointer or Reference | |
NULL Pointer Dereference | |
Race Condition | |
CVE-2025-38127 | |
Use After Free | |
Out-of-Bounds | |
CVE-2025-38445 | |
Use After Free | |
CVE-2025-38453 | |
CVE-2025-21777 | |
CVE-2025-38450 | |
CVE-2025-38355 | |
CVE-2025-38383 | |
CVE-2025-38386 | |
Improper Check for Unusual or Exceptional Conditions | |
CVE-2025-38417 | |
CVE-2025-38400 | |
CVE-2025-38379 | |
CVE-2025-38356 | |
Improper Validation of Array Index | |
CVE-2025-38427 | |
Out-of-bounds Read | |
CVE-2025-38387 | |
CVE-2025-38440 | |
CVE-2025-38380 | |
CVE-2025-38359 | |
CVE-2025-38413 | |
CVE-2025-38364 | |
Out-of-Bounds | |
CVE-2025-38405 | |
CVE-2025-38408 | |
NULL Pointer Dereference | |
CVE-2025-38415 | |
CVE-2025-38411 | |
CVE-2025-38375 | |
CVE-2025-38393 | |
Access to Critical Private Variable via Public Method | |
Incorrect Type Conversion or Cast | |
CVE-2025-38353 | |
CVE-2025-38395 | |
NULL Pointer Dereference | |
CVE-2025-38403 | |
Improper Check for Unusual or Exceptional Conditions | |
CVE-2025-38414 | |
CVE-2025-38431 | |
CVE-2025-38419 | |
CVE-2025-38368 | |
CVE-2025-38418 | |
CVE-2025-38385 | |
Incorrect Privilege Assignment | |
CVE-2025-38425 | |
Out-of-bounds Write | |
CVE-2025-38441 | |
CVE-2025-38424 | |
Improper Locking | |
CVE-2025-38455 | |
NULL Pointer Dereference | |
CVE-2025-38466 | |
CVE-2025-38465 | |
CVE-2025-38444 | |
Use After Free | |
Use After Free | |
CVE-2025-38462 | |
CVE-2025-38438 | |
CVE-2025-38463 | |
Use After Free | |
CVE-2025-38457 | |
CVE-2025-37984 | |
Improper Input Validation | |
Improper Locking | |
Improper Locking | |
Deadlock | |
CVE-2022-50168 | |
Use After Free | |
CVE-2022-50088 | |
CVE-2022-50100 | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
CVE-2025-37994 | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Check for Unusual or Exceptional Conditions | |
Out-of-Bounds | |
Use After Free | |
Resource Injection | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-28956 | |
CVE-2025-21732 | |
CVE-2025-38352 | |
Use After Free | |
Out-of-bounds Read | |
Resource Injection | |
CVE-2024-57876 | |
Improper Check for Unusual or Exceptional Conditions | |
Unchecked Return Value | |
Buffer Overflow | |
Incorrect Type Conversion or Cast | |
Double Free | |
Missing Synchronization | |
Use of Uninitialized Resource | |
Information Exposure | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Race Condition | |
Use After Free | |
Write-what-where Condition | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Double Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
Improper Initialization | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Incorrect Check of Function Return Value | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Race Condition | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2017-1000379 | |
Out-of-bounds Read | |
Use After Free | |
NULL Pointer Dereference | |
Heap-based Buffer Overflow | |
Divide By Zero | |
Use After Free | |
Use After Free | |
Use After Free | |
Execution with Unnecessary Privileges | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Improper Check for Unusual or Exceptional Conditions | |
Improper Enforcement of Behavioral Workflow | |
Code | |
Numeric Errors | |
Integer Overflow or Wraparound | |