Improper Input Validation | |
Out-of-Bounds | |
CVE-2024-53103 | |
NULL Pointer Dereference | |
CVE-2024-53104 | |
CVE-2022-48696 | |
CVE-2022-48696 | |
CVE-2022-48696 | |
Time-of-check Time-of-use (TOCTOU) | |
CVE-2022-48696 | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-53135 | |
CVE-2024-53125 | |
CVE-2024-53140 | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
Race Condition | |
CVE-2024-53114 | |
Race Condition | |
Memory Leak | |
Race Condition | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Resource Management Errors | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Information Exposure | |
CVE-2023-52922 | |
Improper Initialization | |
Race Condition | |
CVE-2024-53073 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Race Condition | |
Buffer Overflow | |
CVE-2024-50211 | |
Resource Injection | |
Out-of-bounds Read | |
CVE-2024-50192 | <0:4.18.0-553.32.1.el8_10 |
CVE-2024-50199 | |
CVE-2024-50201 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2024-50189 | |
Use of Uninitialized Resource | |
CVE-2024-53093 | |
CVE-2024-53051 | |
Use After Free | |
CVE-2024-50194 | |
Use of Uninitialized Resource | |
Improper Locking | |
Improper Handling of Exceptional Conditions | |
Out-of-bounds Write | |
CVE-2024-50251 | |
Use After Free | <0:4.18.0-553.32.1.el8_10 |
Improper Check for Unusual or Exceptional Conditions | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
CVE-2024-50290 | |
CVE-2024-50304 | |
CVE-2024-50256 | <0:4.18.0-553.32.1.el8_10 |
Use After Free | |
Race Condition | |
Improper Locking | |
CVE-2024-50191 | |
CVE-2024-50209 | |
Improper Locking | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
CVE-2024-50185 | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Integer Underflow | |
Divide By Zero | |
Improper Locking | |
CVE-2024-50179 | |
CVE-2024-53094 | |
CVE-2024-53095 | |
NULL Pointer Dereference | |
CVE-2024-53042 | |
Use of Uninitialized Resource | |
NULL Pointer Dereference | |
CVE-2024-50219 | |
Expired Pointer Dereference | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
State Issues | |
State Issues | |
State Issues | |
State Issues | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | <0:4.18.0-372.129.1.el8_6 |
Use After Free | <0:4.18.0-372.129.1.el8_6 |
CVE-2022-48695 | <0:4.18.0-372.129.1.el8_6 |
Use After Free | <0:4.18.0-372.129.1.el8_6 |
Use After Free | <0:4.18.0-372.129.1.el8_6 |
CVE-2022-48695 | <0:4.18.0-372.129.1.el8_6 |
Use After Free | <0:4.18.0-372.129.1.el8_6 |
Use After Free | <0:4.18.0-372.129.1.el8_6 |
CVE-2022-48695 | <0:4.18.0-372.129.1.el8_6 |
Improper Handling of Length Parameter Inconsistency | |
Improper Handling of Length Parameter Inconsistency | |
NULL Pointer Dereference | |
Improper Handling of Length Parameter Inconsistency | |
Memory Leak | |
NULL Pointer Dereference | |
Memory Leak | |
NULL Pointer Dereference | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Improper Handling of Length Parameter Inconsistency | |
NULL Pointer Dereference | |
Memory Leak | |
CVE-2024-50142 | <0:4.18.0-553.32.1.el8_10 |
NULL Pointer Dereference | |
CVE-2024-50163 | |
Use of Uninitialized Resource | |
CVE-2024-50148 | |
Memory Leak | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-50162 | |
Race Condition | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
CVE-2024-50138 | |
CVE-2024-50134 | |
CVE-2024-50099 | <0:4.18.0-553.32.1.el8_10 |
Use of Uninitialized Resource | <0:4.18.0-553.32.1.el8_10 |
Use After Free | |
CVE-2024-50093 | |
CVE-2024-50095 | |
CVE-2024-50136 | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2024-50082 | <0:4.18.0-553.32.1.el8_10 |
Use After Free | |
Out-of-bounds Read | |
CVE-2024-50083 | |
Out-of-bounds Write | |
NULL Pointer Dereference | <0:4.18.0-553.32.1.el8_10 |
CVE-2024-40998 | <0:4.18.0-372.127.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.127.1.el8_6 |
CVE-2024-40998 | <0:4.18.0-372.127.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.127.1.el8_6 |
CVE-2024-40998 | <0:4.18.0-372.127.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.127.1.el8_6 |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Information Exposure | |
NULL Pointer Dereference | |
Race Condition | |
Improper Authentication | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Information Exposure | |
NULL Pointer Dereference | |
Race Condition | |
Improper Authentication | |
Race Condition | |
Use After Free | |
Race Condition | |
Information Exposure | |
NULL Pointer Dereference | |
Race Condition | |
Improper Authentication | |
Race Condition | |
Use After Free | |
Race Condition | |
Information Exposure | |
NULL Pointer Dereference | |
Race Condition | |
Improper Authentication | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2024-49971 | |
CVE-2024-50063 | |
Improper Resource Shutdown or Release | |
CVE-2024-49995 | |
Improper Handling of Exceptional Conditions | |
NULL Pointer Dereference | |
Improper Control of a Resource Through its Lifetime | |
NULL Pointer Dereference | |
Improper Access Control | |
Double Free | |
CVE-2024-50008 | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Locking | |
CVE-2024-49948 | |
Integer Overflow or Wraparound | |
Use of Uninitialized Resource | |
Out-of-bounds Write | |
CVE-2024-49967 | |
Access of Uninitialized Pointer | |
Use After Free | |
CVE-2024-47703 | |
Information Exposure | |
Incomplete Cleanup | |
Use After Free | |
Improper Validation of Integrity Check Value | |
Use After Free | |
CVE-2024-50040 | |
Use After Free | |
Use After Free | |
CVE-2024-49861 | |
Out-of-bounds Write | |
CVE-2024-49886 | |
NULL Pointer Dereference | |
Memory Leak | |
CVE-2024-50019 | |
Use After Free | |
CVE-2024-49974 | |
CVE-2024-50038 | |
Improper Validation of Array Index | |
CVE-2024-47713 | |
Use After Free | |
Always-Incorrect Control Flow Implementation | |
CVE-2024-49959 | |
CVE-2024-49858 | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Incomplete Cleanup | |
NULL Pointer Dereference | |
Double Free | |
CVE-2024-49937 | |
Use of Uninitialized Resource | |
Memory Leak | |
NULL Pointer Dereference | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Integer Overflow or Wraparound | |
Race Condition | |
NULL Pointer Dereference | |
Operation on a Resource after Expiration or Release | |
Improper Input Validation | |
CVE-2024-50028 | |
Buffer Overflow | |
Release of Invalid Pointer or Reference | |
NULL Pointer Dereference | |
Improper Locking | |
NULL Pointer Dereference | |
CVE-2024-49944 | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-47738 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
CVE-2024-49940 | |
CVE-2024-49927 | |
Use After Free | |
Improper Locking | |
Incomplete Cleanup | |
CVE-2024-47710 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Race Condition | |
Use After Free | |
CVE-2024-49934 | |
Memory Leak | |
Use After Free | |
Improper Check for Unusual or Exceptional Conditions | |
Use After Free | |
CVE-2022-48978 | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Improper Validation of Array Index | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
CVE-2022-48994 | |
NULL Pointer Dereference | |
Memory Leak | |
Use After Free | |
Out-of-bounds Write | |
Memory Leak | |
Incomplete Cleanup | |
NULL Pointer Dereference | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
CVE-2023-52917 | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2022-49027 | |
NULL Pointer Dereference | |
CVE-2022-48961 | |
CVE-2022-48986 | |
Improper Validation of Array Index | |
Incomplete Cleanup | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Memory Leak | |
Improper Control of a Resource Through its Lifetime | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Improper Input Validation | |
Resource Exhaustion | |
CVE-2024-35884 | <0:4.18.0-372.126.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.126.1.el8_6 |
Use After Free | <0:4.18.0-372.126.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.126.1.el8_6 |
CVE-2024-35884 | <0:4.18.0-372.126.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.126.1.el8_6 |
Use After Free | <0:4.18.0-372.126.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.126.1.el8_6 |
CVE-2024-35884 | <0:4.18.0-372.126.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.126.1.el8_6 |
Use After Free | <0:4.18.0-372.126.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.126.1.el8_6 |
Return of Wrong Status Code | |
Use After Free | |
CVE-2024-40998 | |
Deadlock | |
Improper Initialization | |
Incomplete Cleanup | |
Out-of-bounds Write | |
CVE-2024-35884 | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Return of Wrong Status Code | |
Use After Free | |
CVE-2024-40998 | |
Deadlock | |
Improper Initialization | |
Incomplete Cleanup | |
Out-of-bounds Write | |
CVE-2024-35884 | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Return of Wrong Status Code | |
Use After Free | |
CVE-2024-40998 | |
Deadlock | |
Improper Initialization | |
Incomplete Cleanup | |
Out-of-bounds Write | |
CVE-2024-35884 | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Return of Wrong Status Code | |
Use After Free | |
CVE-2024-40998 | |
Deadlock | |
Improper Initialization | |
Incomplete Cleanup | |
Out-of-bounds Write | |
CVE-2024-35884 | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-47673 | |
Race Condition | <0:4.18.0-553.27.1.el8_10 |
Race Condition | |
Improper Check for Unusual or Exceptional Conditions | |
Improper Validation of Array Index | |
Information Exposure | |
CVE-2022-48695 | |
NULL Pointer Dereference | |
CVE-2022-48695 | |
NULL Pointer Dereference | |
CVE-2022-48695 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
CVE-2022-48695 | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Improper Preservation of Permissions | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Improper Preservation of Permissions | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Improper Preservation of Permissions | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Improper Preservation of Permissions | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
NULL Pointer Dereference | <0:4.18.0-372.125.1.el8_6 |
Race Condition | <0:4.18.0-372.125.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.125.1.el8_6 |
Race Condition | <0:4.18.0-372.125.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.125.1.el8_6 |
Race Condition | <0:4.18.0-372.125.1.el8_6 |
Out-of-bounds Read | |
Use After Free | |
CVE-2024-46834 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | <0:4.18.0-553.30.1.el8_10 |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-46830 | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2024-46839 | |
CVE-2024-46825 | |
CVE-2024-46855 | |
NULL Pointer Dereference | |
CVE-2024-46861 | |
Improper Input Validation | <0:4.18.0-553.27.1.el8_10 |
Double Free | |
Improper Handling of Length Parameter Inconsistency | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Update of Reference Count | |
Deadlock | |
Incomplete Cleanup | |
Improper Locking | |
CVE-2024-38573 | |
Out-of-bounds Write | |
Untrusted Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2024-36005 | |
CVE-2024-35969 | |
CVE-2024-35898 | |
CVE-2024-27399 | |
Race Condition | |
Race Condition | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
Improper Input Validation | |
Improper Input Validation | |
Improper Handling of Values | |
Race Condition | |
Out-of-bounds Read | |
Resource Leak | |
NULL Pointer Dereference | |
Resource Injection | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Attempt to Access Child of a Non-structure Pointer | |
Trust Boundary Violation | |
Resource Injection | |
CVE-2021-47384 | |
Use After Free | |
Improper Input Validation | |
Improper Handling of Length Parameter Inconsistency | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Update of Reference Count | |
Deadlock | |
Incomplete Cleanup | |
Improper Locking | |
CVE-2024-38573 | |
Out-of-bounds Write | |
Untrusted Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2024-36005 | |
CVE-2024-35969 | |
CVE-2024-35898 | |
CVE-2024-27399 | |
Race Condition | |
Race Condition | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
Improper Input Validation | |
Improper Input Validation | |
Improper Handling of Values | |
Race Condition | |
Out-of-bounds Read | |
Resource Leak | |
NULL Pointer Dereference | |
Resource Injection | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Attempt to Access Child of a Non-structure Pointer | |
Trust Boundary Violation | |
Resource Injection | |
CVE-2021-47384 | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Write | <0:4.18.0-372.124.1.el8_6 |
Improper Initialization | <0:4.18.0-372.124.1.el8_6 |
Improper Resource Locking | <0:4.18.0-372.124.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.124.1.el8_6 |
Use After Free | <0:4.18.0-372.124.1.el8_6 |
Attempt to Access Child of a Non-structure Pointer | <0:4.18.0-372.124.1.el8_6 |
Improper Handling of Length Parameter Inconsistency | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Update of Reference Count | |
Deadlock | |
Incomplete Cleanup | |
Improper Locking | |
CVE-2024-38573 | |
Out-of-bounds Write | |
Untrusted Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2024-36005 | |
CVE-2024-35969 | |
CVE-2024-35898 | |
CVE-2024-27399 | |
Race Condition | |
Race Condition | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
Improper Input Validation | |
Improper Input Validation | |
Improper Handling of Values | |
Race Condition | |
Out-of-bounds Read | |
Resource Leak | |
NULL Pointer Dereference | |
Resource Injection | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Attempt to Access Child of a Non-structure Pointer | |
Trust Boundary Violation | |
Resource Injection | |
CVE-2021-47384 | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Write | <0:4.18.0-372.124.1.el8_6 |
Improper Initialization | <0:4.18.0-372.124.1.el8_6 |
Improper Resource Locking | <0:4.18.0-372.124.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.124.1.el8_6 |
Use After Free | <0:4.18.0-372.124.1.el8_6 |
Attempt to Access Child of a Non-structure Pointer | <0:4.18.0-372.124.1.el8_6 |
Improper Handling of Length Parameter Inconsistency | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Update of Reference Count | |
Deadlock | |
Incomplete Cleanup | |
Improper Locking | |
CVE-2024-38573 | |
Out-of-bounds Write | |
Untrusted Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2024-36005 | |
CVE-2024-35969 | |
CVE-2024-35898 | |
CVE-2024-27399 | |
Race Condition | |
Race Condition | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
Improper Input Validation | |
Improper Input Validation | |
Improper Handling of Values | |
Race Condition | |
Out-of-bounds Read | |
Resource Leak | |
NULL Pointer Dereference | |
Resource Injection | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Attempt to Access Child of a Non-structure Pointer | |
Trust Boundary Violation | |
Resource Injection | |
CVE-2021-47384 | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Write | <0:4.18.0-372.124.1.el8_6 |
Improper Initialization | <0:4.18.0-372.124.1.el8_6 |
Improper Resource Locking | <0:4.18.0-372.124.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.124.1.el8_6 |
Use After Free | <0:4.18.0-372.124.1.el8_6 |
Attempt to Access Child of a Non-structure Pointer | <0:4.18.0-372.124.1.el8_6 |
Out-of-bounds Write | <0:4.18.0-305.141.1.el8_4 |
Use After Free | <0:4.18.0-305.141.1.el8_4 |
CVE-2024-26993 | <0:4.18.0-305.141.1.el8_4 |
Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-305.141.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.141.1.el8_4 |
Use After Free | <0:4.18.0-305.141.1.el8_4 |
CVE-2024-26993 | <0:4.18.0-305.141.1.el8_4 |
Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-305.141.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.141.1.el8_4 |
Use After Free | <0:4.18.0-305.141.1.el8_4 |
CVE-2024-26993 | <0:4.18.0-305.141.1.el8_4 |
Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-305.141.1.el8_4 |
Improper Input Validation | <0:4.18.0-193.141.1.el8_2 |
Improper Input Validation | <0:4.18.0-193.141.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.141.1.el8_2 |
Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-193.141.1.el8_2 |
Incorrect Check of Function Return Value | <0:4.18.0-193.141.1.el8_2 |
CVE-2022-48828 | <0:4.18.0-193.141.1.el8_2 |
Resource Injection | <0:4.18.0-193.141.1.el8_2 |
Stack-based Buffer Overflow | <0:4.18.0-372.123.1.el8_6 |
CVE-2024-35898 | <0:4.18.0-372.123.1.el8_6 |
Race Condition | <0:4.18.0-372.123.1.el8_6 |
Race Condition | <0:4.18.0-372.123.1.el8_6 |
Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
Double Free | <0:4.18.0-372.123.1.el8_6 |
Out-of-bounds Read | <0:4.18.0-372.123.1.el8_6 |
Incomplete Internal State Distinction | <0:4.18.0-372.123.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.123.1.el8_6 |
Stack-based Buffer Overflow | <0:4.18.0-372.123.1.el8_6 |
CVE-2024-35898 | <0:4.18.0-372.123.1.el8_6 |
Race Condition | <0:4.18.0-372.123.1.el8_6 |
Race Condition | <0:4.18.0-372.123.1.el8_6 |
Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
Double Free | <0:4.18.0-372.123.1.el8_6 |
Out-of-bounds Read | <0:4.18.0-372.123.1.el8_6 |
Incomplete Internal State Distinction | <0:4.18.0-372.123.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.123.1.el8_6 |
Stack-based Buffer Overflow | <0:4.18.0-372.123.1.el8_6 |
CVE-2024-35898 | <0:4.18.0-372.123.1.el8_6 |
Race Condition | <0:4.18.0-372.123.1.el8_6 |
Race Condition | <0:4.18.0-372.123.1.el8_6 |
Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
Double Free | <0:4.18.0-372.123.1.el8_6 |
Out-of-bounds Read | <0:4.18.0-372.123.1.el8_6 |
Incomplete Internal State Distinction | <0:4.18.0-372.123.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.123.1.el8_6 |
CVE-2024-46787 | |
CVE-2024-46771 | |
Link Following | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Stack-based Buffer Overflow | |
CVE-2024-46783 | |
Race Condition | |
Integer Underflow | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Improper Locking | |
Use After Free | |
NULL Pointer Dereference | |
Integer Underflow | |
Integer Underflow | |
CVE-2024-46745 | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
CVE-2024-46715 | |
NULL Pointer Dereference | |
Improper Initialization | |
Out-of-bounds Read | |
CVE-2024-46777 | |
Uncontrolled Recursion | |
NULL Pointer Dereference | |
CVE-2024-46754 | |
Use After Free | |
Information Exposure | |
NULL Pointer Dereference | |
Resource Injection | |
Unchecked Return Value | |
Double Free | |
Race Condition | |
Improper Authentication | <0:4.18.0-553.32.1.el8_10 |
Improper Locking | |
Improper Synchronization | |
Time-of-check Time-of-use (TOCTOU) | |
Improper Initialization | |
Use After Free | |
Resource Injection | <0:4.18.0-553.27.1.el8_10 |
Out-of-Bounds | |
Use After Free | |
Use of Uninitialized Variable | <0:4.18.0-553.27.1.el8_10 |
Use of Uninitialized Variable | |
NULL Pointer Dereference | |
Insufficient Control Flow Management | |
Improper Control of a Resource Through its Lifetime | |
Improper Locking | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
Deadlock | |
Improper Initialization | |
Improper Locking | |
Improper Initialization | |
Improper Locking | |
Race Condition | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Use After Free | |
Out-of-bounds Write | |
Uncontrolled Memory Allocation | |
Use After Free | |
NULL Pointer Dereference | <0:4.18.0-553.27.1.el8_10 |
Use After Free | |
Improper Check or Handling of Exceptional Conditions | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | <0:4.18.0-553.27.1.el8_10 |
Use After Free | |
Resource Leak | |
NULL Pointer Dereference | |
Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
Deadlock | <0:4.18.0-305.139.1.el8_4 |
Resource Injection | <0:4.18.0-305.139.1.el8_4 |
Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
Deadlock | <0:4.18.0-305.139.1.el8_4 |
Resource Injection | <0:4.18.0-305.139.1.el8_4 |
Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
Deadlock | <0:4.18.0-305.139.1.el8_4 |
Resource Injection | <0:4.18.0-305.139.1.el8_4 |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Memory Leak | |
Improper Input Validation | |
NULL Pointer Dereference | |
Divide By Zero | <0:4.18.0-553.27.1.el8_10 |
Race Condition | <0:4.18.0-553.27.1.el8_10 |
NULL Pointer Dereference | |
Use After Free | |
Improper Input Validation | |
NULL Pointer Dereference | <0:4.18.0-553.27.1.el8_10 |
Out-of-bounds Write | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Reachable Assertion | |
Integer Overflow or Wraparound | |
Divide By Zero | |
Use After Free | |
Out-of-bounds Read | |
Missing Release of Resource after Effective Lifetime | |
NULL Pointer Dereference | |
Use After Free | |
Memory Leak | |
Excessive Iteration | |
Resource Leak | |
Improper Input Validation | |
Double Free | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Operation on a Resource after Expiration or Release | |
NULL Pointer Dereference | |
Use After Free | |
Memory Leak | |
Memory Leak | |
Time-of-check Time-of-use (TOCTOU) | |
Buffer Overflow | |
CVE-2022-48936 | <0:4.18.0-553.27.1.el8_10 |
Race Condition | |
Double Free | |
NULL Pointer Dereference | |
Improper Access Control | <0:4.18.0-553.27.1.el8_10 |
Resource Leak | <0:4.18.0-553.22.1.el8_10 |
Deadlock | |
NULL Pointer Dereference | |
Incorrect Privilege Assignment | |
Resource Leak | |
CVE-2024-42107 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Improper Handling of Length Parameter Inconsistency | |
NULL Pointer Dereference | |
Resource Leak | |
Incorrect Calculation of Buffer Size | |
Use After Free | |
NULL Pointer Dereference | |
Resource Leak | |
Memory Leak | <0:4.18.0-553.27.1.el8_10 |
Use After Free | |
Improper Validation of Array Index | |
Improper Locking | |
Improper Handling of Length Parameter Inconsistency | |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
Multiple Locks of a Critical Resource | |
NULL Pointer Dereference | |
Improper Validation of Array Index | <0:4.18.0-553.27.1.el8_10 |
Resource Exhaustion | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Return of Wrong Status Code | <0:4.18.0-553.27.1.el8_10 |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Resource Injection | |
CVE-2024-42322 | <0:4.18.0-553.22.1.el8_10 |
Out-of-bounds Read | <0:4.18.0-553.27.1.el8_10 |
Information Exposure | |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
Race Condition | |
NULL Pointer Dereference | |
Reachable Assertion | |
NULL Pointer Dereference | |
CVE-2024-42304 | |
Out-of-bounds Read | |
Improper Input Validation | |
NULL Pointer Dereference | |
Deadlock | |
Use After Free | <0:4.18.0-193.138.1.el8_2 |
Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
CVE-2024-35852 | <0:4.18.0-372.118.1.el8_6 |
CVE-2024-21823 | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
CVE-2023-52881 | <0:4.18.0-372.118.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Incorrect Check of Function Return Value | <0:4.18.0-372.118.1.el8_6 |
CVE-2022-48828 | <0:4.18.0-372.118.1.el8_6 |
Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Trust Boundary Violation | <0:4.18.0-372.118.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
CVE-2024-35852 | <0:4.18.0-372.118.1.el8_6 |
CVE-2024-21823 | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
CVE-2023-52881 | <0:4.18.0-372.118.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Incorrect Check of Function Return Value | <0:4.18.0-372.118.1.el8_6 |
CVE-2022-48828 | <0:4.18.0-372.118.1.el8_6 |
Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Trust Boundary Violation | <0:4.18.0-372.118.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
CVE-2024-35852 | <0:4.18.0-372.118.1.el8_6 |
CVE-2024-21823 | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
CVE-2023-52881 | <0:4.18.0-372.118.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Incorrect Check of Function Return Value | <0:4.18.0-372.118.1.el8_6 |
CVE-2022-48828 | <0:4.18.0-372.118.1.el8_6 |
Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Trust Boundary Violation | <0:4.18.0-372.118.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-372.118.1.el8_6 |
Use After Free | <0:4.18.0-305.138.1.el8_4 |
Use After Free | <0:4.18.0-305.138.1.el8_4 |
CVE-2024-36005 | <0:4.18.0-305.138.1.el8_4 |
Incorrect Check of Function Return Value | <0:4.18.0-305.138.1.el8_4 |
CVE-2022-48828 | <0:4.18.0-305.138.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.138.1.el8_4 |
Use After Free | <0:4.18.0-305.138.1.el8_4 |
Use After Free | <0:4.18.0-305.138.1.el8_4 |
CVE-2024-36005 | <0:4.18.0-305.138.1.el8_4 |
Incorrect Check of Function Return Value | <0:4.18.0-305.138.1.el8_4 |
CVE-2022-48828 | <0:4.18.0-305.138.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.138.1.el8_4 |
Use After Free | <0:4.18.0-305.138.1.el8_4 |
Use After Free | <0:4.18.0-305.138.1.el8_4 |
CVE-2024-36005 | <0:4.18.0-305.138.1.el8_4 |
Incorrect Check of Function Return Value | <0:4.18.0-305.138.1.el8_4 |
CVE-2022-48828 | <0:4.18.0-305.138.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.138.1.el8_4 |
Missing Synchronization | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-2201 | <0:4.18.0-553.16.1.el8_10 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <0:4.18.0-553.22.1.el8_10 |
Race Condition | |
Resource Injection | <0:4.18.0-553.27.1.el8_10 |
Improper Clearing of Heap Memory Before Release ('Heap Inspection') | |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
Resource Injection | |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
Use After Free | <0:4.18.0-553.27.1.el8_10 |
Use After Free | <0:4.18.0-372.115.1.el8_6 |
Resource Leak | <0:4.18.0-372.115.1.el8_6 |
CVE-2024-36000 | <0:4.18.0-372.115.1.el8_6 |
CVE-2024-35789 | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Incomplete Cleanup | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Race Condition | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Deadlock | <0:4.18.0-372.115.1.el8_6 |
Improper Check for Unusual or Exceptional Conditions | <0:4.18.0-372.115.1.el8_6 |
Use After Free | <0:4.18.0-372.115.1.el8_6 |
Resource Leak | <0:4.18.0-372.115.1.el8_6 |
CVE-2024-36000 | <0:4.18.0-372.115.1.el8_6 |
CVE-2024-35789 | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Incomplete Cleanup | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Race Condition | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Deadlock | <0:4.18.0-372.115.1.el8_6 |
Improper Check for Unusual or Exceptional Conditions | <0:4.18.0-372.115.1.el8_6 |
Use After Free | <0:4.18.0-372.115.1.el8_6 |
Resource Leak | <0:4.18.0-372.115.1.el8_6 |
CVE-2024-36000 | <0:4.18.0-372.115.1.el8_6 |
CVE-2024-35789 | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Incomplete Cleanup | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Race Condition | <0:4.18.0-372.115.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
Deadlock | <0:4.18.0-372.115.1.el8_6 |
Improper Check for Unusual or Exceptional Conditions | <0:4.18.0-372.115.1.el8_6 |
Use of Uninitialized Variable | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | |
Improper Handling of Length Parameter Inconsistency | <0:4.18.0-553.22.1.el8_10 |
Unchecked Return Value | |
Static Code Injection | <0:4.18.0-553.22.1.el8_10 |
Buffer Overflow | |
Deadlock | |
Resource Injection | |
Out-of-bounds Write | <0:4.18.0-553.22.1.el8_10 |
Use of Uninitialized Resource | |
Unchecked Return Value | |
NULL Pointer Dereference | |
Information Exposure | <0:4.18.0-553.27.1.el8_10 |
Improper Validation of Array Index | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
Improper Input Validation | |
Improper Control of Document Type Definition | |
Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
Integer Overflow or Wraparound | |
Buffer Overflow | |
Information Exposure | <0:4.18.0-553.27.1.el8_10 |
Heap-based Buffer Overflow | <0:4.18.0-553.22.1.el8_10 |
Resource Injection | |
Race Condition | |
Incomplete Internal State Distinction | |
Heap-based Buffer Overflow | <0:4.18.0-553.22.1.el8_10 |
Deadlock | |
Allocation of Resources Without Limits or Throttling | |
Incomplete Internal State Distinction | |
CVE-2024-42129 | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
Stack-based Buffer Overflow | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
Out-of-bounds Write | <0:4.18.0-553.22.1.el8_10 |
Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
Double Free | |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.27.1.el8_10 |
Allocation of Resources Without Limits or Throttling | |
NULL Pointer Dereference | <0:4.18.0-553.27.1.el8_10 |
NULL Pointer Dereference | |
Double Free | |
NULL Pointer Dereference | |
Use of Uninitialized Variable | |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
Memory Leak | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | |
Resource Exhaustion | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Improper Update of Reference Count | <0:4.18.0-553.22.1.el8_10 |
Untrusted Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Use of Uninitialized Variable | <0:4.18.0-553.22.1.el8_10 |
Improper Input Validation | |
Memory Leak | <0:4.18.0-553.22.1.el8_10 |
Improper Resource Locking | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
Improper Resource Shutdown or Release | <0:4.18.0-553.22.1.el8_10 |
Access of Uninitialized Pointer | |
Integer Overflow or Wraparound | <0:4.18.0-553.22.1.el8_10 |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
Incomplete Internal State Distinction | <0:4.18.0-553.22.1.el8_10 |
Stack-based Buffer Overflow | <0:4.18.0-553.27.1.el8_10 |
Resource Leak | |
NULL Pointer Dereference | |
Deadlock | <0:4.18.0-553.22.1.el8_10 |
Improper Resource Locking | |
Unchecked Return Value | |
Race Condition | <0:4.18.0-372.113.1.el8_6 |
Untrusted Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
Deadlock | <0:4.18.0-372.113.1.el8_6 |
Out-of-bounds Write | <0:4.18.0-372.113.1.el8_6 |
Race Condition | <0:4.18.0-372.113.1.el8_6 |
CVE-2024-35960 | <0:4.18.0-372.113.1.el8_6 |
Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
Use After Free | <0:4.18.0-372.113.1.el8_6 |
Heap-based Buffer Overflow | <0:4.18.0-372.113.1.el8_6 |
Resource Injection | <0:4.18.0-372.113.1.el8_6 |
Double Free | <0:4.18.0-372.113.1.el8_6 |
Buffer Underflow | <0:4.18.0-372.113.1.el8_6 |
Improper Validation of Array Index | <0:4.18.0-372.113.1.el8_6 |
Race Condition | <0:4.18.0-372.113.1.el8_6 |
Untrusted Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
Deadlock | <0:4.18.0-372.113.1.el8_6 |
Out-of-bounds Write | <0:4.18.0-372.113.1.el8_6 |
Race Condition | <0:4.18.0-372.113.1.el8_6 |
CVE-2024-35960 | <0:4.18.0-372.113.1.el8_6 |
Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
Use After Free | <0:4.18.0-372.113.1.el8_6 |
Heap-based Buffer Overflow | <0:4.18.0-372.113.1.el8_6 |
Resource Injection | <0:4.18.0-372.113.1.el8_6 |
Double Free | <0:4.18.0-372.113.1.el8_6 |
Buffer Underflow | <0:4.18.0-372.113.1.el8_6 |
Improper Validation of Array Index | <0:4.18.0-372.113.1.el8_6 |
Race Condition | <0:4.18.0-372.113.1.el8_6 |
Untrusted Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
Deadlock | <0:4.18.0-372.113.1.el8_6 |
Out-of-bounds Write | <0:4.18.0-372.113.1.el8_6 |
Race Condition | <0:4.18.0-372.113.1.el8_6 |
CVE-2024-35960 | <0:4.18.0-372.113.1.el8_6 |
Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
Use After Free | <0:4.18.0-372.113.1.el8_6 |
Heap-based Buffer Overflow | <0:4.18.0-372.113.1.el8_6 |
Resource Injection | <0:4.18.0-372.113.1.el8_6 |
Double Free | <0:4.18.0-372.113.1.el8_6 |
Buffer Underflow | <0:4.18.0-372.113.1.el8_6 |
Improper Validation of Array Index | <0:4.18.0-372.113.1.el8_6 |
Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-21823 | <0:4.18.0-305.134.1.el8_4 |
Race Condition | <0:4.18.0-305.134.1.el8_4 |
CVE-2024-21823 | <0:4.18.0-305.134.1.el8_4 |
Race Condition | <0:4.18.0-305.134.1.el8_4 |
CVE-2024-21823 | <0:4.18.0-305.134.1.el8_4 |
Race Condition | <0:4.18.0-305.134.1.el8_4 |
Race Condition | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
Stack-based Buffer Overflow | <0:4.18.0-553.27.1.el8_10 |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
Improper Synchronization | |
Out-of-bounds Write | <0:4.18.0-553.22.1.el8_10 |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | <0:4.18.0-553.27.1.el8_10 |
Race Condition | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-40998 | <0:4.18.0-553.22.1.el8_10 |
Resource Exhaustion | <0:4.18.0-553.22.1.el8_10 |
Resource Injection | |
Untrusted Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Improper Update of Reference Count | <0:4.18.0-553.27.1.el8_10 |
Out-of-Bounds | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Resource Injection | |
Deadlock | <0:4.18.0-553.22.1.el8_10 |
Expired Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Deadlock | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.27.1.el8_10 |
Resource Injection | <0:4.18.0-553.27.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Resource Injection | |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
Return of Wrong Status Code | |
Deadlock | <0:4.18.0-553.22.1.el8_10 |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Expired Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | |
Resource Injection | |
Improper Locking | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | |
Improper Input Validation | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
Deadlock | <0:4.18.0-553.22.1.el8_10 |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Memory Leak | |
Improper Input Validation | |
Out-of-bounds Read | |
Resource Injection | |
Resource Leak | |
Incorrect Check of Function Return Value | |
Use After Free | |
Out-of-bounds Read | |
Improper Initialization | |
Out-of-bounds Read | |
CVE-2022-48834 | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
NULL Pointer Dereference | <0:4.18.0-553.27.1.el8_10 |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2022-48849 | |
Race Condition | |
Incorrect Check of Function Return Value | |
Missing Lock Check | |
Non-exit on Failed Initialization | |
NULL Pointer Dereference | |
Integer Underflow | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
Resource Management Errors | |
Race Condition | |
Memory Leak | |
Use After Free | |
Release of Invalid Pointer or Reference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
CVE-2022-48811 | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2022-48836 | <0:4.18.0-553.22.1.el8_10 |
Deadlock | |
CVE-2022-48802 | |
CVE-2022-48828 | |
Improper Update of Reference Count | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
State Issues | |
Resource Injection | |
Resource Leak | <0:4.18.0-553.16.1.el8_10 |
Race Condition | <0:4.18.0-193.136.1.el8_2 |
Out-of-Bounds | <0:4.18.0-553.22.1.el8_10 |
Resource Leak | <0:4.18.0-553.22.1.el8_10 |
Race Condition | <0:4.18.0-553.22.1.el8_10 |
Race Condition | |
Use After Free | <0:4.18.0-553.27.1.el8_10 |
Use After Free | |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
Use After Free | |
CVE-2024-40901 | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-39509 | |
NULL Pointer Dereference | |
Out-of-bounds Read | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-39488 | |
Incomplete Cleanup | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-36005 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-35969 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-35958 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-27397 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-26804 | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
Race Condition | <0:4.18.0-372.111.1.el8_6 |
Return of Wrong Status Code | <0:4.18.0-372.111.1.el8_6 |
Race Condition | <0:4.18.0-372.111.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.111.1.el8_6 |
Incomplete Cleanup | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-36005 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-35969 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-35958 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-27397 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-26804 | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
Race Condition | <0:4.18.0-372.111.1.el8_6 |
Return of Wrong Status Code | <0:4.18.0-372.111.1.el8_6 |
Race Condition | <0:4.18.0-372.111.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.111.1.el8_6 |
Incomplete Cleanup | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-36005 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-35969 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-35958 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-27397 | <0:4.18.0-372.111.1.el8_6 |
CVE-2024-26804 | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
Race Condition | <0:4.18.0-372.111.1.el8_6 |
Return of Wrong Status Code | <0:4.18.0-372.111.1.el8_6 |
Race Condition | <0:4.18.0-372.111.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.111.1.el8_6 |
Use After Free | <0:4.18.0-372.111.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.111.1.el8_6 |
Resource Leak | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Out-of-Bounds | <0:4.18.0-553.16.1.el8_10 |
Use After Free | |
Deadlock | <0:4.18.0-553.16.1.el8_10 |
Covert Timing Channel | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
Improper Initialization | |
Resource Injection | |
Resource Leak | <0:4.18.0-553.16.1.el8_10 |
Resource Injection | |
NULL Pointer Dereference | |
Resource Injection | |
Double Free | |
Resource Injection | |
NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
Resource Leak | <0:4.18.0-553.16.1.el8_10 |
Resource Leak | <0:4.18.0-553.16.1.el8_10 |
Out-of-bounds Read | |
Double Free | <0:4.18.0-553.16.1.el8_10 |
Improper Input Validation | <0:4.18.0-553.16.1.el8_10 |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
Improper Locking | <0:4.18.0-553.16.1.el8_10 |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-38573 | <0:4.18.0-553.16.1.el8_10 |
Resource Injection | <0:4.18.0-553.16.1.el8_10 |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
Deadlock | |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
Use of Uninitialized Variable | <0:4.18.0-553.27.1.el8_10 |
Resource Exhaustion | <0:4.18.0-553.16.1.el8_10 |
Incomplete Cleanup | <0:4.18.0-553.16.1.el8_10 |
Out-of-bounds Read | |
Race Condition | <0:4.18.0-553.16.1.el8_10 |
Improper Locking | <0:4.18.0-553.16.1.el8_10 |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
Improper Initialization | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-38580 | |
Stack-based Buffer Overflow | <0:4.18.0-553.27.1.el8_10 |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.27.1.el8_10 |
Race Condition | |
Improper Initialization | <0:4.18.0-553.30.1.el8_10 |
Out-of-Bounds | |
Out-of-bounds Read | <0:4.18.0-553.27.1.el8_10 |
Improper Resource Locking | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Incomplete Cleanup | |
Out-of-bounds Write | |
Unchecked Return Value | |
CVE-2022-48752 | |
Sequence of Processor Instructions Leads to Unexpected Behavior | |
NULL Pointer Dereference | |
Incomplete Internal State Distinction | |
NULL Pointer Dereference | |
Improper Resource Shutdown or Release | |
Use After Free | |
Resource Injection | <0:4.18.0-553.16.1.el8_10 |
Missing Synchronization | <0:4.18.0-553.22.1.el8_10 |
Missing Initialization of Resource | |
Resource Leak | |
Resource Leak | |
Resource Injection | |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
Improper Input Validation | |
Race Condition | |
Out-of-bounds Read | |
Resource Leak | |
Out-of-bounds Read | |
CVE-2022-48751 | |
Use After Free | |
Out-of-bounds Read | |
CVE-2022-48764 | |
Incorrect Default Permissions | <0:4.18.0-553.16.1.el8_10 |
Buffer Underflow | <0:4.18.0-553.16.1.el8_10 |
Resource Leak | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Memory Leak | |
Out-of-bounds Read | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Null Termination | |
Out-of-bounds Write | |
Use of Uninitialized Variable | <0:4.18.0-553.22.1.el8_10 |
Out-of-bounds Write | <0:4.18.0-553.16.1.el8_10 |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
Out-of-bounds Read | |
Stack-based Buffer Overflow | |
Use After Free | |
Divide By Zero | |
Resource Leak | |
Allocation of Resources Without Limits or Throttling | |
NULL Pointer Dereference | |
Resource Injection | |
Improper Input Validation | |
CVE-2021-47607 | |
Use After Free | |
Out-of-bounds Write | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use of Uninitialized Variable | <0:4.18.0-553.16.1.el8_10 |
Information Exposure | |
Release of Invalid Pointer or Reference | |
NULL Pointer Dereference | |
Use After Free | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
Resource Exhaustion | |
Deadlock | |
Improper Locking | <0:4.18.0-553.22.1.el8_10 |
Improper Update of Reference Count | |
Integer Overflow or Wraparound | |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-36970 | |
Resource Injection | |
Resource Injection | |
CVE-2024-26602 | |
Out-of-bounds Write | |
CVE-2024-25743 | |
CVE-2024-25742 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Sensitive Information Uncleared Before Release | |
Use After Free | |
Use After Free | |
Resource Injection | |
CVE-2024-26602 | |
Out-of-bounds Write | |
CVE-2024-25743 | |
CVE-2024-25742 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Sensitive Information Uncleared Before Release | |
Use After Free | |
Use After Free | |
Resource Injection | |
CVE-2024-26602 | |
Out-of-bounds Write | |
CVE-2024-25743 | |
CVE-2024-25742 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Sensitive Information Uncleared Before Release | |
Use After Free | |
Use After Free | |
Use After Free | <0:4.18.0-372.107.1.el8_6 |
Race Condition | <0:4.18.0-372.107.1.el8_6 |
Time-of-check Time-of-use (TOCTOU) | <0:4.18.0-372.107.1.el8_6 |
Use After Free | <0:4.18.0-372.107.1.el8_6 |
Race Condition | <0:4.18.0-372.107.1.el8_6 |
Time-of-check Time-of-use (TOCTOU) | <0:4.18.0-372.107.1.el8_6 |
Resource Injection | |
CVE-2024-26602 | |
Out-of-bounds Write | |
CVE-2024-25743 | |
CVE-2024-25742 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Sensitive Information Uncleared Before Release | |
Use After Free | |
Use After Free | |
Use After Free | <0:4.18.0-372.107.1.el8_6 |
Race Condition | <0:4.18.0-372.107.1.el8_6 |
Time-of-check Time-of-use (TOCTOU) | <0:4.18.0-372.107.1.el8_6 |
Stack-based Buffer Overflow | |
Use After Free | |
Buffer Overflow | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Improper Input Validation | |
Stack-based Buffer Overflow | <0:4.18.0-553.16.1.el8_10 |
Resource Leak | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | <0:4.18.0-553.16.1.el8_10 |
Resource Injection | |
Out-of-Bounds | |
Use After Free | |
NULL Pointer Dereference | |
Resource Injection | |
Race Condition | |
Resource Leak | |
Out-of-bounds Read | |
Resource Leak | |
Resource Leak | <0:4.18.0-553.16.1.el8_10 |
Resource Leak | |
Use After Free | |
Resource Leak | |
Resource Injection | |
Improper Locking | |
Out-of-bounds Read | <0:4.18.0-553.16.1.el8_10 |
Divide By Zero | <0:4.18.0-553.16.1.el8_10 |
Improper Neutralization of Null Byte or NUL Character | <0:4.18.0-553.22.1.el8_10 |
Resource Leak | |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
Race Condition | |
Improper Initialization | <0:4.18.0-553.16.1.el8_10 |
Incomplete Cleanup | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Resource Leak | <0:4.18.0-553.16.1.el8_10 |
Resource Injection | <0:4.18.0-553.16.1.el8_10 |
Improper Null Termination | <0:4.18.0-553.16.1.el8_10 |
Improper Locking | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
Improper Resource Locking | <0:4.18.0-553.22.1.el8_10 |
Deadlock | <0:4.18.0-553.16.1.el8_10 |
Memory Leak | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
Resource Injection | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
Resource Leak | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
Resource Leak | |
Resource Injection | |
CVE-2024-36920 | <0:4.18.0-553.22.1.el8_10 |
Double Free | <0:4.18.0-553.16.1.el8_10 |
Out-of-Bounds | |
Out-of-bounds Write | <0:4.18.0-553.16.1.el8_10 |
Improper Initialization | |
Out-of-bounds Read | <0:4.18.0-553.16.1.el8_10 |
Out-of-bounds Write | <0:4.18.0-553.22.1.el8_10 |
Untrusted Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
Out-of-bounds Read | <0:4.18.0-553.16.1.el8_10 |
Use of Uninitialized Resource | |
Deadlock | |
Improper Preservation of Permissions | |
Use of Uninitialized Variable | <0:4.18.0-553.16.1.el8_10 |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
Leftover Debug Code | |
Deadlock | |
Race Condition | <0:4.18.0-553.16.1.el8_10 |
Resource Injection | |
Use After Free | <0:4.18.0-305.131.1.el8_4 |
Race Condition | <0:4.18.0-305.131.1.el8_4 |
Use After Free | <0:4.18.0-305.131.1.el8_4 |
Race Condition | <0:4.18.0-305.131.1.el8_4 |
Use After Free | <0:4.18.0-305.131.1.el8_4 |
Race Condition | <0:4.18.0-305.131.1.el8_4 |
Use After Free | <0:4.18.0-193.135.1.el8_2 |
Race Condition | <0:4.18.0-193.135.1.el8_2 |
Out-of-bounds Read | <0:4.18.0-193.135.1.el8_2 |
NULL Pointer Dereference | <0:4.18.0-193.135.1.el8_2 |
Stack-based Buffer Overflow | |
Out-of-bounds Write | <0:4.18.0-553.16.1.el8_10 |
CVE-2023-52881 | |
CVE-2024-36015 | |
Race Condition | <0:4.18.0-372.105.1.el8_6 |
Sensitive Information Uncleared Before Release | <0:4.18.0-372.105.1.el8_6 |
Use After Free | <0:4.18.0-372.105.1.el8_6 |
Race Condition | <0:4.18.0-372.105.1.el8_6 |
Sensitive Information Uncleared Before Release | <0:4.18.0-372.105.1.el8_6 |
Use After Free | <0:4.18.0-372.105.1.el8_6 |
Race Condition | <0:4.18.0-372.105.1.el8_6 |
Sensitive Information Uncleared Before Release | <0:4.18.0-372.105.1.el8_6 |
Use After Free | <0:4.18.0-372.105.1.el8_6 |
Race Condition | <0:4.18.0-372.105.1.el8_6 |
Sensitive Information Uncleared Before Release | <0:4.18.0-372.105.1.el8_6 |
Use After Free | <0:4.18.0-372.105.1.el8_6 |
Deadlock | |
Use After Free | |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
Resource Injection | |
Information Exposure | |
Out-of-Bounds | |
Deadlock | |
Use of Uninitialized Variable | |
Improper Update of Reference Count | |
NULL Pointer Dereference | |
Resource Management Errors | |
Memory Leak | |
Use After Free | |
CVE-2021-47441 | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Time-of-check Time-of-use (TOCTOU) | |
Trust Boundary Violation | |
Deadlock | |
NULL Pointer Dereference | |
Race Condition | |
NULL Pointer Dereference | |
Improper Validation of Array Index | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Resource Exhaustion | <0:4.18.0-553.22.1.el8_10 |
Improper Resource Shutdown or Release | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Resource Leak | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | |
Resource Injection | |
Resource Leak | |
CVE-2021-47246 | |
Use After Free | |
Resource Exhaustion | |
Resource Injection | |
Resource Leak | |
CVE-2021-47222 | |
Improper Initialization | |
NULL Pointer Dereference | |
CVE-2021-47290 | |
Resource Leak | |
Race Condition | |
NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
Deadlock | |
Improper Locking | |
CVE-2021-47276 | |
Resource Injection | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Resource Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Time-of-check Time-of-use (TOCTOU) | |
NULL Pointer Dereference | |
Use After Free | |
Resource Injection | |
Use After Free | |
Improper Input Validation | |
Memory Leak | |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
CVE-2021-47265 | |
Out-of-bounds Read | |
Range Error | |
Resource Leak | |
Resource Leak | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Divide By Zero | |
Improper Input Validation | |
Divide By Zero | |
Divide By Zero | |
Divide By Zero | |
Divide By Zero | |
Improper Input Validation | |
Divide By Zero | |
Divide By Zero | |
Improper Input Validation | |
Divide By Zero | |
Improper Input Validation | |
CVE-2024-25743 | |
CVE-2024-25742 | |
Use After Free | |
NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
Use After Free | |
Race Condition | |
Improper Validation of Array Index | |
Deadlock | |
NULL Pointer Dereference | |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
Improper Input Validation | |
Out-of-bounds Read | <0:4.18.0-553.16.1.el8_10 |
Integer Overflow or Wraparound | <0:4.18.0-553.16.1.el8_10 |
Incomplete Cleanup | <0:4.18.0-553.16.1.el8_10 |
Improper Resource Locking | <0:4.18.0-553.22.1.el8_10 |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Improper Input Validation | <0:4.18.0-553.16.1.el8_10 |
Resource Leak | <0:4.18.0-553.16.1.el8_10 |
Memory Leak | |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Out-of-bounds Read | |
External Control of System or Configuration Setting | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
Use After Free | |
Resource Injection | |
NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
Double Free | |
NULL Pointer Dereference | |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
Improper Input Validation | |
Out-of-Bounds | |
NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
Stack-based Buffer Overflow | <0:4.18.0-553.16.1.el8_10 |
Improper Validation of Array Index | |
Resource Injection | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
Resource Leak | |
NULL Pointer Dereference | |
Resource Injection | <0:4.18.0-553.16.1.el8_10 |
Free of Memory not on the Heap | <0:4.18.0-553.16.1.el8_10 |
Integer Underflow | |
Improper Resource Shutdown or Release | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Improper Initialization | |
Double Free | |
Improper Initialization | |
Use After Free | |
Improper Locking | |
Improper Locking | |
Improper Control of a Resource Through its Lifetime | <0:4.18.0-553.16.1.el8_10 |
Incomplete Internal State Distinction | |
Resource Management Errors | |
Missing Initialization of a Variable | |
Resource Injection | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
Race Condition | <0:4.18.0-553.16.1.el8_10 |
Resource Leak | <0:4.18.0-553.22.1.el8_10 |
Divide By Zero | |
Improper Resource Shutdown or Release | |
CVE-2021-47455 | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
Resource Leak | |
Improper Locking | |
Improper Check for Unusual or Exceptional Conditions | <0:4.18.0-553.22.1.el8_10 |
Out-of-bounds Write | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Resource Leak | <0:4.18.0-553.16.1.el8_10 |
Improper Input Validation | |
Memory Leak | |
NULL Pointer Dereference | |
CVE-2021-47384 | <0:4.18.0-553.22.1.el8_10 |
Memory Leak | |
CVE-2021-47387 | |
Resource Injection | |
NULL Pointer Dereference | |
Resource Injection | |
NULL Pointer Dereference | |
CVE-2021-47327 | |
Stack-based Buffer Overflow | |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
CVE-2021-47376 | |
Resource Leak | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Memory Leak | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Resource Leak | |
NULL Pointer Dereference | |
Error Handling | <0:4.18.0-553.22.1.el8_10 |
Resource Leak | |
Memory Leak | |
Reachable Assertion | |
Access of Uninitialized Pointer | |
CVE-2021-47432 | <0:4.18.0-553.22.1.el8_10 |
Resource Leak | |
CVE-2021-47359 | |
Use After Free | |
Improper Initialization | |
Use After Free | |
Deadlock | |
Resource Leak | |
Resource Leak | |
Improper Locking | <0:4.18.0-553.16.1.el8_10 |
Incomplete Cleanup | |
Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
Logging of Excessive Data | |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-35979 | |
CVE-2024-35938 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35965 | |
CVE-2024-35944 | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-35884 | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-35860 | |
CVE-2024-35876 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35959 | |
CVE-2024-35976 | |
Memory Leak | |
CVE-2024-35989 | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-35939 | <0:4.18.0-553.27.1.el8_10 |
CVE-2024-35934 | |
CVE-2024-35952 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35945 | |
CVE-2024-35925 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-36007 | |
CVE-2024-35963 | |
CVE-2024-35995 | |
CVE-2024-36006 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-36004 | |
CVE-2024-35983 | |
CVE-2024-35957 | |
CVE-2024-35961 | |
CVE-2024-35885 | |
CVE-2024-35933 | |
CVE-2024-35877 | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-36005 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35958 | |
CVE-2024-35969 | |
CVE-2024-35966 | |
CVE-2024-35960 | |
CVE-2024-36000 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35924 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35937 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35967 | |
CVE-2024-35950 | |
CVE-2024-35962 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35946 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35922 | |
CVE-2024-35875 | |
CVE-2024-35912 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35910 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35947 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35899 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35886 | |
CVE-2024-35898 | <0:4.18.0-553.27.1.el8_10 |
CVE-2024-35893 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35895 | |
CVE-2024-35888 | |
CVE-2024-35901 | |
CVE-2024-35896 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35929 | |
CVE-2024-35931 | |
CVE-2024-35907 | |
CVE-2024-35897 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35900 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35905 | |
CVE-2024-35927 | |
CVE-2024-35890 | |
CVE-2024-35928 | |
CVE-2024-35904 | |
CVE-2024-35930 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35911 | |
CVE-2023-52663 | |
CVE-2023-52662 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35824 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35808 | |
CVE-2024-35803 | |
CVE-2024-35789 | |
CVE-2024-35843 | |
CVE-2024-35835 | |
CVE-2024-35814 | <0:4.18.0-553.16.1.el8_10 |
Improper Input Validation | |
CVE-2024-35852 | |
CVE-2024-35853 | |
CVE-2024-35855 | |
CVE-2024-35839 | <0:4.18.0-553.27.1.el8_10 |
CVE-2024-35840 | |
CVE-2024-35823 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35838 | |
CVE-2024-35790 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35854 | |
CVE-2024-35847 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35817 | |
CVE-2024-35807 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35791 | |
CVE-2024-35810 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-35805 | |
CVE-2024-35794 | |
CVE-2024-35809 | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-35802 | |
CVE-2024-27431 | |
CVE-2024-35801 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-27415 | |
CVE-2024-27436 | |
CVE-2024-27435 | |
CVE-2024-27434 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-27413 | |
CVE-2024-27410 | |
CVE-2024-27403 | |
CVE-2024-27417 | |
CVE-2023-52669 | |
CVE-2023-52698 | |
CVE-2023-52697 | |
CVE-2023-52664 | |
CVE-2023-52686 | |
CVE-2023-52679 | <0:4.18.0-553.16.1.el8_10 |
Double Free | |
CVE-2023-52675 | |
CVE-2023-52658 | <0:4.18.0-553.16.1.el8_10 |
CVE-2023-52680 | |
CVE-2023-52676 | |
CVE-2023-52683 | <0:4.18.0-553.22.1.el8_10 |
CVE-2023-52689 | |
CVE-2023-52674 | |
Directory Traversal | |
CVE-2024-27398 | |
CVE-2024-27397 | |
CVE-2024-27395 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-27399 | <0:4.18.0-553.30.1.el8_10 |
CVE-2024-21823 | <0:4.18.0-553.16.1.el8_10 |
Directory Traversal | |
Use After Free | |
CVE-2024-27043 | <0:4.18.0-553.30.1.el8_10 |
CVE-2022-48700 | |
CVE-2022-48690 | |
Use After Free | |
CVE-2022-48694 | |
CVE-2022-48697 | |
Out-of-bounds Read | |
CVE-2022-48705 | |
CVE-2022-48695 | |
NULL Pointer Dereference | |
Off-by-one Error | |
CVE-2022-48703 | |
CVE-2022-48704 | |
CVE-2022-48702 | |
CVE-2022-48701 | |
Improper Handling of Exceptional Conditions | |
CVE-2022-48696 | |
Memory Leak | |
Out-of-bounds Write | <0:4.18.0-372.102.1.el8_6 |
Authentication Bypass | <0:4.18.0-372.102.1.el8_6 |
Out-of-bounds Write | <0:4.18.0-372.102.1.el8_6 |
Authentication Bypass | <0:4.18.0-372.102.1.el8_6 |
Out-of-bounds Write | <0:4.18.0-372.102.1.el8_6 |
Authentication Bypass | <0:4.18.0-372.102.1.el8_6 |
Out-of-bounds Write | <0:4.18.0-372.102.1.el8_6 |
Authentication Bypass | <0:4.18.0-372.102.1.el8_6 |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Memory Leak | <0:4.18.0-553.16.1.el8_10 |
Out-of-bounds Read | |
CVE-2024-27010 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-27052 | |
CVE-2024-26960 | <0:4.18.0-553.16.1.el8_10 |
Improper Locking | |
CVE-2024-27048 | |
CVE-2024-26974 | |
Improper Locking | |
CVE-2024-26938 | |
CVE-2024-27059 | |
CVE-2024-26999 | |
CVE-2024-27017 | <0:4.18.0-553.27.1.el8_10 |
Improper Input Validation | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-26935 | |
Incomplete Cleanup | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-27023 | |
CVE-2024-27075 | |
Race Condition | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-27042 | <0:4.18.0-553.22.1.el8_10 |
Double Free | |
CVE-2024-27056 | |
Double Free | <0:4.18.0-553.16.1.el8_10 |
Race Condition | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-27065 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-27025 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-27004 | |
CVE-2024-26939 | <0:4.18.0-553.22.1.el8_10 |
CVE-2024-26962 | |
CVE-2024-27057 | |
Allocation of Resources Without Limits or Throttling | <0:4.18.0-553.22.1.el8_10 |
Improper Resource Locking | <0:4.18.0-553.27.1.el8_10 |
CVE-2024-26976 | <0:4.18.0-553.27.1.el8_10 |
CVE-2024-26964 | |
CVE-2024-26993 | |
CVE-2024-26958 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-27073 | |
CVE-2024-27011 | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-26973 | |
Race Condition | |
CVE-2023-52653 | <0:4.18.0-553.16.1.el8_10 |
Improper Locking | |
NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
CVE-2023-52648 | <0:4.18.0-553.16.1.el8_10 |
CVE-2022-48669 | |
Improper Neutralization of Null Byte or NUL Character | |
Use After Free | |
Stack-based Buffer Overflow | |
Improper Input Validation | <0:4.18.0-553.27.1.el8_10 |
CVE-2024-25744 | |
Race Condition | |
Access of Uninitialized Pointer | |
Use After Free | |
Integer Overflow or Wraparound | |
Memory Leak | |
Race Condition | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Validation of Array Index | |
Double Free | |
Use After Free | |
Race Condition | |
Race Condition | |
Race Condition | |
Information Exposure | |
Memory Leak | |
Race Condition | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Validation of Array Index | |
Double Free | |
Use After Free | |
Race Condition | |
Race Condition | |
Race Condition | |
Information Exposure | |
Memory Leak | |
Race Condition | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Validation of Array Index | |
Double Free | |
Use After Free | |
Race Condition | |
Race Condition | |
Race Condition | |
Information Exposure | |
Memory Leak | |
Race Condition | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Validation of Array Index | |
Double Free | |
Use After Free | |
Race Condition | |
Race Condition | |
Race Condition | |
Information Exposure | |
CVE-2024-25744 | |
Race Condition | |
Access of Uninitialized Pointer | |
Use After Free | |
Integer Overflow or Wraparound | |
CVE-2024-25744 | |
Race Condition | |
Access of Uninitialized Pointer | |
Use After Free | |
Integer Overflow or Wraparound | |
CVE-2024-25744 | |
Race Condition | |
Access of Uninitialized Pointer | |
Use After Free | |
Integer Overflow or Wraparound | |
CVE-2024-26602 | <0:4.18.0-305.130.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.130.1.el8_4 |
Use After Free | <0:4.18.0-305.130.1.el8_4 |
Divide By Zero | <0:4.18.0-305.130.1.el8_4 |
CVE-2024-26602 | <0:4.18.0-305.130.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.130.1.el8_4 |
Use After Free | <0:4.18.0-305.130.1.el8_4 |
Divide By Zero | <0:4.18.0-305.130.1.el8_4 |
CVE-2024-26602 | <0:4.18.0-305.130.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.130.1.el8_4 |
Use After Free | <0:4.18.0-305.130.1.el8_4 |
Divide By Zero | <0:4.18.0-305.130.1.el8_4 |
Deadlock | |
Integer Underflow | |
NULL Pointer Dereference | |
Reachable Assertion | |
Use After Free | |
Integer Underflow | |
Incomplete Internal State Distinction | |
Resource Exhaustion | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Reachable Assertion | |
CVE-2022-48662 | |
Improper Handling of Values | |
Heap-based Buffer Overflow | <0:4.18.0-553.16.1.el8_10 |
Modules with Circular Dependencies | |
Attempt to Access Child of a Non-structure Pointer | |
Resource Exhaustion | |
Improper Resource Shutdown or Release | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Out-of-Bounds | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
Improper Validation of Specified Index, Position, or Offset in Input | |
Race Condition | <0:4.18.0-553.22.1.el8_10 |
Race Condition | |
Improper Input Validation | |
Improper Locking | <0:4.18.0-553.16.1.el8_10 |
Use After Free | |
NULL Pointer Dereference | |
Race Condition | |
Resource Leak | <0:4.18.0-553.27.1.el8_10 |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Leak | |
CVE-2024-26602 | <0:4.18.0-193.133.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.133.1.el8_2 |
Memory Leak | <0:4.18.0-193.133.1.el8_2 |
NULL Pointer Dereference | <0:4.18.0-193.133.1.el8_2 |
Use After Free | <0:4.18.0-193.133.1.el8_2 |
Use After Free | <0:4.18.0-193.133.1.el8_2 |
Divide By Zero | <0:4.18.0-193.133.1.el8_2 |
CVE-2024-26602 | <0:4.18.0-193.133.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.133.1.el8_2 |
Memory Leak | <0:4.18.0-193.133.1.el8_2 |
NULL Pointer Dereference | <0:4.18.0-193.133.1.el8_2 |
Use After Free | <0:4.18.0-193.133.1.el8_2 |
Use After Free | <0:4.18.0-193.133.1.el8_2 |
Divide By Zero | <0:4.18.0-193.133.1.el8_2 |
CVE-2024-26602 | <0:4.18.0-193.133.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.133.1.el8_2 |
Memory Leak | <0:4.18.0-193.133.1.el8_2 |
NULL Pointer Dereference | <0:4.18.0-193.133.1.el8_2 |
Use After Free | <0:4.18.0-193.133.1.el8_2 |
Use After Free | <0:4.18.0-193.133.1.el8_2 |
Divide By Zero | <0:4.18.0-193.133.1.el8_2 |
Buffer Underflow | <0:4.18.0-553.16.1.el8_10 |
Use After Free | |
Buffer Overflow | |
Stack-based Buffer Overflow | <0:4.18.0-553.16.1.el8_10 |
Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
Resource Leak | |
CVE-2024-26916 | |
Memory Leak | <0:4.18.0-553.22.1.el8_10 |
Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Improper Input Validation | <0:4.18.0-553.16.1.el8_10 |
Race Condition | <0:4.18.0-553.16.1.el8_10 |
Integer Underflow | |
Improper Input Validation | |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
Improper Input Validation | |
Resource Injection | |
Resource Injection | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Improper Input Validation | <0:4.18.0-553.16.1.el8_10 |
Race Condition | <0:4.18.0-553.22.1.el8_10 |
Resource Injection | <0:4.18.0-553.22.1.el8_10 |
Improper Input Validation | |
CVE-2024-26919 | |
Resource Leak | |
Race Condition | |
Race Condition | |
Resource Leak | <0:4.18.0-553.16.1.el8_10 |
Improper Input Validation | |
Race Condition | <0:4.18.0-553.16.1.el8_10 |
Divide By Zero | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | |
Access of Uninitialized Pointer | <0:4.18.0-372.100.1.el8_6 |
Use After Free | <0:4.18.0-372.100.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.100.1.el8_6 |
Use After Free | <0:4.18.0-372.100.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.100.1.el8_6 |
Exposure of Resource to Wrong Sphere | <0:4.18.0-372.100.1.el8_6 |
Improper Input Validation | |
Stack-based Buffer Overflow | |
Access of Uninitialized Pointer | <0:4.18.0-372.100.1.el8_6 |
Use After Free | <0:4.18.0-372.100.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.100.1.el8_6 |
Use After Free | <0:4.18.0-372.100.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.100.1.el8_6 |
Exposure of Resource to Wrong Sphere | <0:4.18.0-372.100.1.el8_6 |
Access of Uninitialized Pointer | <0:4.18.0-372.100.1.el8_6 |
Use After Free | <0:4.18.0-372.100.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.100.1.el8_6 |
Use After Free | <0:4.18.0-372.100.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.100.1.el8_6 |
Exposure of Resource to Wrong Sphere | <0:4.18.0-372.100.1.el8_6 |
Access of Uninitialized Pointer | <0:4.18.0-372.100.1.el8_6 |
Use After Free | <0:4.18.0-372.100.1.el8_6 |
NULL Pointer Dereference | <0:4.18.0-372.100.1.el8_6 |
Use After Free | <0:4.18.0-372.100.1.el8_6 |
Improper Input Validation | <0:4.18.0-372.100.1.el8_6 |
Exposure of Resource to Wrong Sphere | <0:4.18.0-372.100.1.el8_6 |
NULL Pointer Dereference | |
Improper Input Validation | |
Resource Leak | |
Improper Input Validation | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Resource Injection | |
Improper Neutralization of Null Byte or NUL Character | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Resource Injection | |
Excessive Platform Resource Consumption within a Loop | |
Improper Input Validation | |
Improper Input Validation | |
Buffer Access with Incorrect Length Value | |
Use After Free | |
Resource Leak | |
Unchecked Return Value to NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
Resource Injection | |
Use After Free | |
CVE-2024-26803 | |
CVE-2024-26782 | |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
CVE-2024-26804 | |
Race Condition | |
Divide By Zero | |
Deadlock | |
Improper Handling of Undefined Parameters | |
Resource Injection | |
Race Condition | |
Improper Input Validation | |
Improper Null Termination | |
Use After Free | |
NULL Pointer Dereference | |
Improper Null Termination | |
Improper Null Termination | |
Double Free | <0:4.18.0-553.16.1.el8_10 |
Improper Input Validation | |
Stack-based Buffer Overflow | |
Write-what-where Condition | |
Resource Injection | |
NULL Pointer Dereference | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Read | <0:4.18.0-553.16.1.el8_10 |
Heap-based Buffer Overflow | <0:4.18.0-553.16.1.el8_10 |
Unchecked Input for Loop Condition | |
Divide By Zero | |
Improper Handling of Values | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
Improper Handling of Values | <0:4.18.0-553.16.1.el8_10 |
Deadlock | |
NULL Pointer Dereference | |
Improper Resource Locking | <0:4.18.0-553.16.1.el8_10 |
Race Condition | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Deadlock | <0:4.18.0-553.22.1.el8_10 |
Incomplete Cleanup | |
Double Free | |
Deadlock | <0:4.18.0-553.16.1.el8_10 |
Race Condition | |
Improper Input Validation | |
Use After Free | |
Integer Overflow or Wraparound | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
Resource Leak | <0:4.18.0-553.16.1.el8_10 |
Resource Injection | |
Out-of-Bounds | |
Race Condition | |
Out-of-bounds Read | |
Resource Injection | |
Unchecked Input for Loop Condition | |
Improper Input Validation | |
Improper Input Validation | |
Improper Locking | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Resource Injection | |
Race Condition | <0:4.18.0-553.16.1.el8_10 |
Incorrect Calculation of Buffer Size | <0:4.18.0-553.16.1.el8_10 |
Resource Injection | |
Improper Resource Locking | |
Out-of-bounds Read | |
Race Condition | <0:4.18.0-553.22.1.el8_10 |
Resource Injection | |
Resource Injection | |
Resource Leak | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
Resource Injection | |
Resource Injection | |
Resource Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | |
Resource Leak | |
Non-exit on Failed Initialization | |
Improper Input Validation | |
Resource Injection | |
Resource Injection | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Injection | |
Improper Cleanup on Thrown Exception | |
Improper Input Validation | |
Race Condition | |
Resource Injection | |
Resource Injection | |
CVE-2023-28746 | <0:4.18.0-553.16.1.el8_10 |
Improper Input Validation | |
Improper Input Validation | <0:4.18.0-553.16.1.el8_10 |
Improper Input Validation | |
Resource Injection | <0:4.18.0-553.16.1.el8_10 |
Stack-based Buffer Overflow | |
Resource Leak | |
Missing Initialization of a Variable | <0:4.18.0-553.22.1.el8_10 |
Resource Exhaustion | |
Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
Memory Leak | <0:4.18.0-305.125.1.el8_4 |
Use After Free | <0:4.18.0-305.125.1.el8_4 |
NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.125.1.el8_4 |
NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
Use After Free | <0:4.18.0-305.125.1.el8_4 |
NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
Use After Free | <0:4.18.0-305.125.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
Memory Leak | <0:4.18.0-305.125.1.el8_4 |
Use After Free | <0:4.18.0-305.125.1.el8_4 |
NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.125.1.el8_4 |
NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
Use After Free | <0:4.18.0-305.125.1.el8_4 |
NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
Use After Free | <0:4.18.0-305.125.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
Memory Leak | <0:4.18.0-305.125.1.el8_4 |
Use After Free | <0:4.18.0-305.125.1.el8_4 |
NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.125.1.el8_4 |
NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
Use After Free | <0:4.18.0-305.125.1.el8_4 |
NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
Use After Free | <0:4.18.0-305.125.1.el8_4 |
Use After Free | |
NULL Pointer Dereference | |
Resource Leak | |
Use After Free | |
Memory Leak | |
Use of NullPointerException Catch to Detect NULL Pointer Dereference | |
Improper Input Validation | |
Deadlock | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Deadlock | |
Deadlock | <0:4.18.0-553.16.1.el8_10 |
Improper Input Validation | |
Improper Resource Locking | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Resource Locking | |
Use After Free | |
Improper Resource Locking | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Protection Against Physical Side Channels | |
Race Condition | <0:4.18.0-553.22.1.el8_10 |
Integer Overflow to Buffer Overflow | |
NULL Pointer Dereference | <0:4.18.0-553.27.1.el8_10 |
Race Condition | |
Return of Stack Variable Address | |
Improper Resource Shutdown or Release | <0:4.18.0-553.22.1.el8_10 |
NULL Pointer Dereference | |
Improper Input Validation | |
Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Double Free | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Buffer Overflow | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Improper Validation of Array Index | <0:4.18.0-193.128.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
Out-of-bounds Read | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Information Exposure | <0:4.18.0-193.128.1.el8_2 |
NULL Pointer Dereference | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Double Free | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Buffer Overflow | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Improper Validation of Array Index | <0:4.18.0-193.128.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
Out-of-bounds Read | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Information Exposure | <0:4.18.0-193.128.1.el8_2 |
NULL Pointer Dereference | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Double Free | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Buffer Overflow | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Improper Validation of Array Index | <0:4.18.0-193.128.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
Out-of-bounds Read | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
Information Exposure | <0:4.18.0-193.128.1.el8_2 |
NULL Pointer Dereference | <0:4.18.0-193.128.1.el8_2 |
Use After Free | <0:4.18.0-193.128.1.el8_2 |
NULL Pointer Dereference | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Stack-based Buffer Overflow | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
Improper Input Validation | |
Use of Uninitialized Variable | <0:4.18.0-553.22.1.el8_10 |
CVE-2023-52575 | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Memory Leak | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Improper Input Validation | |
Incorrect Calculation of Buffer Size | |
CVE-2024-26602 | |
Out-of-bounds Read | |
Race Condition | |
Memory Leak | |
Use After Free | |
Unchecked Return Value | |
CVE-2023-52520 | |
Use After Free | |
Resource Injection | |
Missing Encryption of Sensitive Data | |
Improper Input Validation | |
NULL Pointer Dereference | |
Improper Handling of Overlap Between Protected Memory Ranges | |
Race Condition | |
Resource Injection | |
NULL Pointer Dereference | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Divide By Zero | |
Use After Free | |
NULL Pointer Dereference | |
Memory Leak | |
CVE-2021-47055 | |
Memory Leak | |
NULL Pointer Dereference | |
Improper Input Validation | <0:4.18.0-553.16.1.el8_10 |
Improper Input Validation | |
Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
Deadlock | |
Out-of-Bounds | |
Deadlock | |
Resource Leak | |
Improper Input Validation | |
Resource Leak | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Resource Leak | |
NULL Pointer Dereference | |
Use After Free | |
Resource Leak | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Memory Leak | |
Use After Free | |
Memory Leak | |
NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
Use After Free | <0:4.18.0-553.16.1.el8_10 |
Improper Check or Handling of Exceptional Conditions | |
Deadlock | <0:4.18.0-553.16.1.el8_10 |
Resource Leak | |
Resource Injection | |
Missing Support for Integrity Check | |
Use After Free | |
Improper Input Validation | |
Resource Leak | |
Use After Free | |
Race Condition | |
Resource Leak | |
Improper Input Validation | |
Range Error | |
Improper Input Validation | |
Divide By Zero | |
Information Exposure | |
Unchecked Error Condition | |
Use After Free | |
Out-of-bounds Read | |
Race Condition | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | <0:4.18.0-553.27.1.el8_10 |
Out-of-bounds Read | |
CVE-2023-52474 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Out-of-bounds Write | <0:4.18.0-553.16.1.el8_10 |
Use After Free | |
NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
Out-of-bounds Read | <0:4.18.0-553.16.1.el8_10 |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Initialization | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
Use After Free | |
Untrusted Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Buffer Access with Incorrect Length Value | |
Return of Wrong Status Code | |
Race Condition | |
Race Condition | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Authentication | |
CVE-2024-25744 | |
Memory Leak | |
Improper Check for Unusual or Exceptional Conditions | <0:4.18.0-553.16.1.el8_10 |
Stack-based Buffer Overflow | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Information Exposure | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Information Exposure | |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Buffer Overflow | <0:4.18.0-305.120.1.el8_4 |
Integer Underflow | <0:4.18.0-305.120.1.el8_4 |
Improper Validation of Array Index | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Incorrect Calculation | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Information Exposure | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Buffer Overflow | <0:4.18.0-305.120.1.el8_4 |
Integer Underflow | <0:4.18.0-305.120.1.el8_4 |
Improper Validation of Array Index | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Incorrect Calculation | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Information Exposure | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Buffer Overflow | <0:4.18.0-305.120.1.el8_4 |
Integer Underflow | <0:4.18.0-305.120.1.el8_4 |
Improper Validation of Array Index | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Incorrect Calculation | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Use After Free | <0:4.18.0-305.120.1.el8_4 |
Information Exposure | <0:4.18.0-305.120.1.el8_4 |
NULL Pointer Dereference | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Resource Exhaustion | |
NULL Pointer Dereference | |
Use After Free | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
Deadlock | |
Deadlock | |
Improper Handling of Values | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-Bounds | <0:4.18.0-553.22.1.el8_10 |
Resource Leak | |
Resource Exhaustion | <0:4.18.0-553.22.1.el8_10 |
Use After Free | |
Information Exposure | |
Race Condition | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Man-in-the-Middle (MitM) | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Improper Zeroization of Hardware Register | |
Execution with Unnecessary Privileges | |
Out-of-Bounds | |
Sensitive Information Uncleared Before Release | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Improper Zeroization of Hardware Register | |
Execution with Unnecessary Privileges | |
Out-of-Bounds | |
Sensitive Information Uncleared Before Release | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Improper Zeroization of Hardware Register | |
Execution with Unnecessary Privileges | |
Out-of-Bounds | |
Sensitive Information Uncleared Before Release | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
Use After Free | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
Use After Free | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
Execution with Unnecessary Privileges | <0:4.18.0-305.103.1.el8_4 |
Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Improper Zeroization of Hardware Register | |
Execution with Unnecessary Privileges | |
Out-of-Bounds | |
Sensitive Information Uncleared Before Release | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
Use After Free | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
Use After Free | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
Execution with Unnecessary Privileges | <0:4.18.0-305.103.1.el8_4 |
Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
Use After Free | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
Use After Free | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
Execution with Unnecessary Privileges | <0:4.18.0-305.103.1.el8_4 |
Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
Race Condition | |
Use After Free | |
Improper Handling of Exceptional Conditions | |
Improper Update of Reference Count | |
Out-of-bounds Write | |
Double Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Integer Underflow | |
Incorrect Calculation | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Race Condition | |
Improper Access Control | |
Use After Free | |
Use After Free | |
Improper Validation of Array Index | |
Information Exposure | |
Information Exposure | |
Out-of-bounds Read | |
Use After Free | |
Time-of-check Time-of-use (TOCTOU) | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Zeroization of Hardware Register | |
Improper Zeroization of Hardware Register | |
Improper Zeroization of Hardware Register | |
Improper Zeroization of Hardware Register | |
Improper Zeroization of Hardware Register | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Double Free | |
Use After Free | |
Information Exposure | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Race Condition | |
Double Free | |
Use of a Broken or Risky Cryptographic Algorithm | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Incorrect Bitwise Shift of Integer | |
CVE-2023-31084 | |
Divide By Zero | |
Race Condition | |
Release of Invalid Pointer or Reference | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Sensitive Information Uncleared Before Release | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Write | |
Improper Resource Locking | |
Exposure of Resource to Wrong Sphere | |
Exposure of Resource to Wrong Sphere | |
Exposure of Resource to Wrong Sphere | |
Exposure of Resource to Wrong Sphere | |
Exposure of Resource to Wrong Sphere | |
Improperly Implemented Security Check for Standard | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Sensitive Information Uncleared Before Release | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Use After Free | |
Use After Free | |
Double Free | |
Interpretation Conflict | |
Interpretation Conflict | |
Interpretation Conflict | |
Interpretation Conflict | |
Interpretation Conflict | |
Double Free | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Out-of-bounds Read | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Out-of-Bounds | |
Double Free | |
Improper Initialization | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
Excessive Platform Resource Consumption within a Loop | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Authentication Bypass | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Memory Leak | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Externally Controlled Reference to a Resource in Another Sphere | |
Memory Leak | |
Use After Free | |
Write-what-where Condition | |
Write-what-where Condition | |
Write-what-where Condition | |
Write-what-where Condition | |
Write-what-where Condition | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Insecure Default Initialization of Resource | |
Insecure Default Initialization of Resource | |
Insecure Default Initialization of Resource | |
Insecure Default Initialization of Resource | |
Insecure Default Initialization of Resource | |
Memory Leak | |
Non-exit on Failed Initialization | |
Non-exit on Failed Initialization | |
Non-exit on Failed Initialization | |
Non-exit on Failed Initialization | |
Non-exit on Failed Initialization | |
NULL Pointer Dereference | |
Information Exposure | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Logging of Excessive Data | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Race Condition | |
Race Condition | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Memory Leak | |
Race Condition | |
Race Condition | |
Race Condition | |
Access of Uninitialized Pointer | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Race Condition During Access to Alternate Channel | |
Race Condition During Access to Alternate Channel | |
Race Condition During Access to Alternate Channel | |
Race Condition During Access to Alternate Channel | |
Race Condition During Access to Alternate Channel | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2022-23960 | |
CVE-2022-23960 | |
CVE-2022-23960 | |
CVE-2022-23960 | |
CVE-2022-23960 | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Expected Behavior Violation | |
Incorrect Control Flow Scoping | |
Incorrect Control Flow Scoping | |
Incorrect Control Flow Scoping | |
Incorrect Control Flow Scoping | |
Incorrect Control Flow Scoping | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Buffer Overflow | |
Use After Free | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Restriction of Communication Channel to Intended Endpoints | |
Improper Restriction of Communication Channel to Intended Endpoints | |
Improper Restriction of Communication Channel to Intended Endpoints | |
Improper Restriction of Communication Channel to Intended Endpoints | |
Improper Restriction of Communication Channel to Intended Endpoints | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Update of Reference Count | |
Improper Update of Reference Count | |
Improper Update of Reference Count | |
Improper Update of Reference Count | |
Improper Update of Reference Count | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2022-36946 | |
CVE-2022-36946 | |
CVE-2022-36946 | |
CVE-2022-36946 | |
CVE-2022-36946 | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Public Key Re-Use for Signing both Debug and Production Code | |
Privilege Defined With Unsafe Actions | |
Privilege Defined With Unsafe Actions | |
Privilege Defined With Unsafe Actions | |
Privilege Defined With Unsafe Actions | |
Privilege Defined With Unsafe Actions | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Improper Cross-boundary Removal of Sensitive Data | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2022-0002 | |
CVE-2022-0002 | |
CVE-2022-0002 | |
CVE-2022-0002 | |
CVE-2022-0002 | |
CVE-2022-0002 | |
CVE-2022-0002 | |
CVE-2022-0002 | |
CVE-2022-0002 | |
CVE-2022-0001 | |
CVE-2022-0001 | |
CVE-2022-0001 | |
CVE-2022-0001 | |
CVE-2022-0001 | |
CVE-2022-0001 | |
CVE-2022-0001 | |
CVE-2022-0001 | |
CVE-2022-0001 | |
CVE-2021-26401 | |
CVE-2021-26401 | |
CVE-2021-26401 | |
CVE-2021-26401 | |
CVE-2021-26401 | |
CVE-2021-26401 | |
CVE-2021-26401 | |
CVE-2021-26401 | |
CVE-2021-26401 | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Out-of-bounds Write | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Buffer Overflow | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Release of Invalid Pointer or Reference | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Integer Underflow | |
Integer Underflow | |
Integer Underflow | |
Integer Underflow | |
Improper Handling of Exceptional Conditions | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Out-of-Bounds | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Memory Leak | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
CVE-2019-0136 | |
CVE-2019-0136 | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Time-of-check Time-of-use (TOCTOU) | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Out-of-bounds Write | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Use After Free | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Information Exposure | |
Cleartext Transmission of Sensitive Information | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Race Condition | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Improper Validation of Integrity Check Value | |
Improper Validation of Integrity Check Value | |
Improper Validation of Integrity Check Value | |
Improper Validation of Integrity Check Value | |
Improper Validation of Integrity Check Value | |
Improper Validation of Integrity Check Value | |
Improper Validation of Integrity Check Value | |
Improper Validation of Integrity Check Value | |
Improper Validation of Integrity Check Value | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Time-of-check Time-of-use (TOCTOU) | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
NULL Pointer Dereference | |
Improper Initialization | |
Integer Overflow or Wraparound | |
Incorrect Permission Assignment for Critical Resource | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Information Exposure | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Resource Exhaustion | |
Out-of-bounds Write | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Operation on a Resource after Expiration or Release | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
Mirrored Regions with Different Values | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Null Byte Interaction Error (Poison Null Byte) | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Incorrect Check of Function Return Value | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Improper Cleanup on Thrown Exception | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Insufficient Entropy | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Missing Initialization of a Variable | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Privilege Dropping / Lowering Errors | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Covert Timing Channel | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Missing Initialization of Resource | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Initialization | |
Incorrect Conversion between Numeric Types | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Directory Traversal | |
Incorrect Calculation | |
Incorrect Calculation | |
Incorrect Calculation | |
Incorrect Calculation | |
Incorrect Calculation | |
Incorrect Calculation | |
Incorrect Calculation | |
Incorrect Calculation | |
Incorrect Calculation | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Integer Overflow or Wraparound | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Access Control | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
CVE-2020-36311 | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Incorrect Authorization | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Integer Underflow | |
Information Exposure | |
Resource Exhaustion | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Improper Restriction of Excessive Authentication Attempts | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Origin Validation Error | |
Inclusion of Functionality from Untrusted Control Sphere | |
Inclusion of Functionality from Untrusted Control Sphere | |
Inclusion of Functionality from Untrusted Control Sphere | |
Inclusion of Functionality from Untrusted Control Sphere | |
Inclusion of Functionality from Untrusted Control Sphere | |
Inclusion of Functionality from Untrusted Control Sphere | |
Inclusion of Functionality from Untrusted Control Sphere | |
Inclusion of Functionality from Untrusted Control Sphere | |
Inclusion of Functionality from Untrusted Control Sphere | |
Use After Free | |
Cleartext Transmission of Sensitive Information | |
NULL Pointer Dereference | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Information Exposure | |
Improper Cleanup on Thrown Exception | |
Race Condition | |
Missing Release of Resource after Effective Lifetime | |
Memory Leak | |
Information Exposure | |
NULL Pointer Dereference | |
Incorrect Permission Assignment for Critical Resource | |
Authentication Bypass | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Resource Exhaustion | |
Missing Release of Resource after Effective Lifetime | |
Race Condition | |
Use After Free | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Information Exposure | |
Resource Exhaustion | |
Resource Exhaustion | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Incorrect Check of Function Return Value | |
Operation on a Resource after Expiration or Release | |
Out-of-bounds Read | |
Out-of-Bounds | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Out-of-bounds Read | |
Unchecked Return Value | |
Unchecked Return Value | |
Information Exposure | |
Resource Exhaustion | |
Information Exposure | |
Information Exposure | |