| CVE-2023-53711 | |
| CVE-2023-53726 | |
| CVE-2023-53722 | |
| CVE-2023-53705 | |
| CVE-2023-53698 | |
| CVE-2023-53692 | |
| CVE-2023-53695 | |
| CVE-2023-53719 | |
| CVE-2023-53710 | |
| CVE-2023-53716 | |
| CVE-2023-53720 | |
| CVE-2023-53709 | |
| CVE-2023-53715 | |
| CVE-2023-53729 | |
| CVE-2023-53728 | |
| CVE-2023-53697 | |
| CVE-2023-53696 | |
| CVE-2022-50578 | |
| CVE-2023-53712 | |
| CVE-2023-53713 | |
| CVE-2022-50562 | |
| CVE-2022-50577 | |
| CVE-2022-50575 | |
| CVE-2022-50580 | |
| CVE-2022-50569 | |
| CVE-2022-50561 | |
| CVE-2022-50579 | |
| CVE-2022-50566 | |
| CVE-2022-50563 | |
| CVE-2023-53718 | |
| CVE-2023-53717 | |
| CVE-2023-53731 | |
| CVE-2023-53706 | |
| CVE-2023-53708 | |
| CVE-2022-50558 | |
| CVE-2022-50556 | |
| NULL Pointer Dereference | |
| CVE-2025-39977 | |
| Expired Pointer Dereference | |
| CVE-2025-39967 | |
| CVE-2025-39998 | |
| Use After Free | |
| CVE-2025-39996 | |
| CVE-2025-39990 | |
| CVE-2025-39994 | |
| CVE-2025-39972 | |
| CVE-2025-39993 | |
| CVE-2025-39968 | |
| CVE-2025-39969 | |
| CVE-2025-39973 | |
| CVE-2025-39971 | |
| CVE-2025-39970 | |
| CVE-2025-39965 | |
| CVE-2025-39964 | |
| CVE-2025-39958 | |
| CVE-2025-39961 | |
| CVE-2025-39957 | |
| Information Exposure | |
| NULL Pointer Dereference | |
| CVE-2023-53624 | |
| CVE-2023-53627 | |
| Integer Overflow or Wraparound | |
| Reachable Assertion | |
| Incomplete Cleanup | |
| CVE-2023-53673 | |
| CVE-2023-53671 | |
| CVE-2023-53682 | |
| CVE-2023-53680 | |
| CVE-2022-50549 | |
| NULL Pointer Dereference | |
| CVE-2022-50534 | |
| CVE-2022-50546 | |
| Race Condition | |
| Time-of-check Time-of-use (TOCTOU) | |
| CVE-2023-53620 | |
| CVE-2023-53625 | |
| Use After Free | |
| Incorrect Bitwise Shift of Integer | |
| CVE-2022-50554 | |
| CVE-2022-50552 | |
| CVE-2022-50531 | |
| CVE-2023-53646 | |
| Missing Release of Resource after Effective Lifetime | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| CVE-2023-53675 | |
| Information Exposure | |
| CVE-2023-53668 | |
| Improper Resource Locking | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2023-53622 | |
| CVE-2023-53667 | |
| Incorrect Calculation | |
| NULL Pointer Dereference | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2022-50520 | |
| CVE-2022-50543 | |
| CVE-2023-53678 | |
| CVE-2023-53679 | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2023-53639 | |
| CVE-2023-53648 | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Incorrect Calculation | |
| CVE-2022-50536 | |
| Missing Release of Resource after Effective Lifetime | |
| NULL Pointer Dereference | |
| CVE-2022-50527 | |
| CVE-2025-39947 | |
| CVE-2025-39931 | |
| CVE-2025-39932 | |
| CVE-2025-39949 | |
| Race Condition | |
| CVE-2025-39940 | |
| CVE-2025-39953 | |
| CVE-2025-39929 | |
| CVE-2025-39933 | |
| CVE-2025-39937 | |
| CVE-2023-53591 | |
| CVE-2023-53604 | |
| CVE-2023-53602 | |
| CVE-2023-53559 | |
| Improper Initialization | |
| Improper Locking | |
| CVE-2023-53597 | |
| CVE-2023-53539 | |
| CVE-2023-53552 | |
| CVE-2023-53612 | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| CVE-2023-53603 | |
| CVE-2023-53578 | |
| Improper Resource Locking | |
| Excessive Platform Resource Consumption within a Loop | |
| CVE-2023-53594 | |
| CVE-2023-53576 | |
| Improper Resource Shutdown or Release | |
| CVE-2023-53567 | |
| CVE-2023-53596 | |
| CVE-2023-53600 | |
| CVE-2023-53585 | |
| CVE-2023-53549 | |
| CVE-2023-53607 | |
| CVE-2023-53550 | |
| Improper Input Validation | |
| CVE-2023-53598 | |
| Reliance on a Single Factor in a Security Decision | |
| NULL Pointer Dereference | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2022-50473 | |
| CVE-2022-50475 | |
| CVE-2022-50484 | |
| CVE-2022-50493 | |
| CVE-2022-50504 | |
| CVE-2022-50487 | |
| Out-of-bounds Read | |
| CVE-2022-50505 | |
| CVE-2022-50495 | |
| Use of Function with Inconsistent Implementations | |
| CVE-2022-50476 | |
| Out-of-bounds Read | |
| CVE-2023-53606 | |
| CVE-2023-53570 | |
| CVE-2023-53577 | |
| Out-of-bounds Read | |
| Missing Release of Resource after Effective Lifetime | |
| Incorrect Calculation of Buffer Size | |
| CVE-2023-53593 | |
| CVE-2023-53605 | |
| CVE-2023-53560 | |
| CVE-2023-53553 | |
| CVE-2023-53581 | |
| CVE-2023-53586 | |
| Improper Input Validation | |
| CVE-2022-50490 | |
| CVE-2023-53611 | |
| Improper Check for Unusual or Exceptional Conditions | |
| Incorrect Conversion between Numeric Types | |
| Expired Pointer Dereference | |
| CVE-2022-50489 | |
| CVE-2022-50479 | |
| CVE-2022-50470 | |
| CVE-2022-50482 | |
| CVE-2022-50494 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Resource Exhaustion | |
| Unchecked Return Value | |
| CVE-2023-53506 | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Out-of-bounds Read | |
| Heap-based Buffer Overflow | |
| CVE-2025-39913 | |
| CVE-2025-39911 | |
| CVE-2025-39905 | |
| Race Condition | |
| CVE-2025-39902 | |
| Improper Control of a Resource Through its Lifetime | |
| Out-of-bounds Write | |
| CVE-2023-53501 | |
| CVE-2023-53458 | |
| Operation on a Resource after Expiration or Release | |
| Improper Control of a Resource Through its Lifetime | |
| Memory Leak | |
| Improper Control of a Resource Through its Lifetime | |
| CVE-2023-53499 | |
| CVE-2023-53453 | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2023-53487 | |
| Race Condition | |
| Out-of-bounds Read | |
| Improper Control of a Resource Through its Lifetime | |
| CVE-2023-53473 | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2023-53482 | |
| CVE-2023-53517 | |
| CVE-2023-53530 | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2023-53463 | |
| Use of Uninitialized Resource | |
| CVE-2023-53480 | |
| CVE-2023-53489 | |
| Race Condition | |
| Memory Leak | |
| Incorrect Calculation of Buffer Size | |
| Reachable Assertion | |
| Excessive Iteration | |
| Race Condition | |
| Missing Release of Resource after Effective Lifetime | |
| Race Condition | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| CVE-2023-53524 | |
| CVE-2022-50445 | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2022-50431 | |
| NULL Pointer Dereference | |
| Improper Control of a Resource Through its Lifetime | |
| Reachable Assertion | |
| CVE-2022-50427 | |
| NULL Pointer Dereference | |
| Missing Release of Resource after Effective Lifetime | |
| NULL Pointer Dereference | |
| CVE-2022-50460 | |
| CVE-2023-53496 | |
| NULL Pointer Dereference | |
| CVE-2023-53456 | |
| CVE-2023-53491 | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| CVE-2022-50435 | |
| Missing Synchronization | |
| CVE-2022-50423 | |
| Improper Control of a Resource Through its Lifetime | |
| CVE-2021-4460 | |
| CVE-2025-39795 | |
| CVE-2025-39798 | |
| Improper Check or Handling of Exceptional Conditions | |
| CVE-2025-39794 | |
| Inadequate Encryption Strength | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| NULL Pointer Dereference | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Incorrect Calculation of Buffer Size | |
| Improper Handling of Exceptional Conditions | |
| Improper Input Validation | |
| Missing Release of Resource after Effective Lifetime | |
| NULL Pointer Dereference | |
| Use After Free | |
| CVE-2023-53383 | |
| Race Condition | |
| Deadlock | |
| Missing Release of Resource after Effective Lifetime | |
| Time-of-check Time-of-use (TOCTOU) | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| CVE-2023-53391 | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2023-53378 | |
| Expired Pointer Dereference | |
| Use After Free | |
| CVE-2023-53427 | |
| Use After Free | |
| Out-of-bounds Read | |
| Missing Release of Resource after Effective Lifetime | |
| NULL Pointer Dereference | |
| CVE-2023-53369 | |
| Missing Release of Resource after Effective Lifetime | |
| Use After Free | |
| Improper Validation of Specified Index, Position, or Offset in Input | |
| CVE-2023-53400 | |
| CVE-2022-50386 | |
| Race Condition | |
| CVE-2023-53431 | |
| Out-of-bounds Write | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Integer Overflow or Wraparound | |
| NULL Pointer Dereference | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Use After Free | |
| NULL Pointer Dereference | |
| CVE-2023-53372 | |
| Double Free | |
| NULL Pointer Dereference | |
| Use of Uninitialized Resource | |
| Expired Pointer Dereference | |
| Operation on a Resource after Expiration or Release | |
| CVE-2022-50390 | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| CVE-2023-53338 | |
| Out-of-bounds Write | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Race Condition | |
| NULL Pointer Dereference | |
| CVE-2022-50354 | |
| Race Condition | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2022-50370 | |
| CVE-2023-53341 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| CVE-2023-53351 | |
| NULL Pointer Dereference | |
| Buffer Underflow | |
| Improper Input Validation | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2022-50365 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| CVE-2023-53344 | |
| Out-of-bounds Read | |
| CVE-2025-39819 | |
| Out-of-bounds Read | |
| Improper Initialization | |
| CVE-2025-39828 | |
| CVE-2025-39813 | |
| CVE-2025-39810 | |
| CVE-2025-39835 | |
| Unlock of a Resource that is not Locked | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| CVE-2025-39808 | |
| Missing Release of Resource after Effective Lifetime | |
| Use After Free | |
| CVE-2023-53309 | |
| Use After Free | |
| CVE-2023-53317 | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Race Condition | |
| CVE-2022-50345 | |
| NULL Pointer Dereference | |
| Use After Free | |
| Access of Uninitialized Pointer | |
| Missing Release of Resource after Effective Lifetime | |
| Improper Handling of Length Parameter Inconsistency | |
| CVE-2023-53320 | |
| CVE-2025-39824 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2023-53333 | |
| Improper Validation of Array Index | |
| CVE-2023-53313 | |
| CVE-2023-53322 | |
| Insufficient Granularity of Access Control | |
| NULL Pointer Dereference | |
| CVE-2023-53295 | |
| Improper Check or Handling of Exceptional Conditions | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Integer Overflow or Wraparound | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Improper Locking | |
| CVE-2023-53211 | |
| NULL Pointer Dereference | |
| CVE-2023-53151 | |
| CVE-2023-53204 | |
| CVE-2023-53230 | |
| NULL Pointer Dereference | |
| CVE-2023-53165 | |
| Missing Release of Resource after Effective Lifetime | |
| NULL Pointer Dereference | |
| CVE-2023-53254 | |
| Use After Free | |
| NULL Pointer Dereference | |
| CVE-2023-53229 | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2023-53184 | |
| CVE-2023-53215 | |
| CVE-2023-53208 | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2023-53245 | |
| Memory Leak | |
| Deadlock | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2023-53176 | |
| Double Free | |
| Missing Release of Resource after Effective Lifetime | |
| Out-of-bounds Read | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2023-53182 | |
| CVE-2023-53188 | |
| CVE-2023-53252 | |
| CVE-2023-53150 | |
| Improper Validation of Specified Index, Position, or Offset in Input | |
| Out-of-bounds Read | |
| Incorrect Calculation | |
| NULL Pointer Dereference | |
| CVE-2023-53233 | |
| CVE-2023-53257 | |
| NULL Pointer Dereference | |
| CVE-2023-53205 | |
| CVE-2023-53259 | |
| Use After Free | |
| Function Call with Incorrectly Specified Arguments | |
| Integer Overflow or Wraparound | |
| Time-of-check Time-of-use (TOCTOU) | |
| Improper Locking | |
| CVE-2023-53148 | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| NULL Pointer Dereference | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Uncontrolled Recursion | |
| CVE-2022-50318 | |
| Out-of-bounds Read | |
| CVE-2022-50247 | |
| CVE-2022-50280 | |
| CVE-2022-50234 | |
| CVE-2022-50308 | |
| CVE-2022-50286 | |
| CVE-2022-50317 | |
| Memory Leak | |
| CVE-2022-50329 | |
| CVE-2022-50332 | |
| Integer Overflow or Wraparound | |
| CVE-2022-50285 | |
| CVE-2022-50259 | |
| Missing Standardized Error Handling Mechanism | |
| CVE-2022-50253 | |
| CVE-2022-50304 | |
| Use After Free | |
| Buffer Access with Incorrect Length Value | |
| CVE-2022-50282 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2022-50303 | |
| CVE-2022-50311 | |
| Race Condition | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2022-50271 | |
| CVE-2025-39756 | |
| Improper Input Validation | |
| CVE-2025-39760 | |
| CVE-2025-39754 | |
| Deadlock | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Double Free | |
| Divide By Zero | |
| CVE-2025-39737 | |
| CVE-2025-39753 | |
| Missing Default Case in Switch Statement | |
| CVE-2025-39782 | |
| Improper Input Validation | |
| Race Condition | |
| Out-of-bounds Write | |
| Buffer Overflow | |
| Missing Standardized Error Handling Mechanism | |
| CVE-2025-39764 | |
| NULL Pointer Dereference | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Synchronization | |
| Out-of-bounds Read | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Use of Multiple Resources with Duplicate Identifier | |
| Use After Free | |
| Improper Control of a Resource Through its Lifetime | |
| Race Condition | |
| Unexpected Status Code or Return Value | |
| CVE-2025-39677 | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Improper Update of Reference Count | |
| NULL Pointer Dereference | |
| Improper Validation of Specified Index, Position, or Offset in Input | |
| Expired Pointer Dereference | |
| CVE-2025-38724 | |
| Out-of-bounds Read | |
| Time-of-check Time-of-use (TOCTOU) | |
| Reachable Assertion | |
| NULL Pointer Dereference | |
| Access of Uninitialized Pointer | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Buffer Access with Incorrect Length Value | |
| Use After Free | |
| CVE-2025-38516 | |
| CVE-2025-38512 | |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Race Condition | <0:4.18.0-372.158.1.el8_6 |
| Incomplete Cleanup | <0:4.18.0-372.158.1.el8_6 |
| Double Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Release of Invalid Pointer or Reference | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Race Condition | <0:4.18.0-372.158.1.el8_6 |
| Incomplete Cleanup | <0:4.18.0-372.158.1.el8_6 |
| Double Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Release of Invalid Pointer or Reference | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Race Condition | <0:4.18.0-372.158.1.el8_6 |
| Incomplete Cleanup | <0:4.18.0-372.158.1.el8_6 |
| Double Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Release of Invalid Pointer or Reference | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-372.158.1.el8_6 |
| Use After Free | <0:4.18.0-193.165.1.el8_2 |
| Race Condition | <0:4.18.0-193.165.1.el8_2 |
| Incomplete Cleanup | <0:4.18.0-193.165.1.el8_2 |
| Double Free | <0:4.18.0-193.165.1.el8_2 |
| Use After Free | <0:4.18.0-193.165.1.el8_2 |
| Use After Free | <0:4.18.0-193.165.1.el8_2 |
| Use After Free | <0:4.18.0-193.165.1.el8_2 |
| Release of Invalid Pointer or Reference | <0:4.18.0-193.165.1.el8_2 |
| Missing Release of Resource after Effective Lifetime | |
| Use After Free | <0:4.18.0-477.107.1.el8_8 |
| Incomplete Cleanup | <0:4.18.0-477.107.1.el8_8 |
| Double Free | <0:4.18.0-477.107.1.el8_8 |
| Use After Free | <0:4.18.0-477.107.1.el8_8 |
| Use After Free | <0:4.18.0-477.107.1.el8_8 |
| Use After Free | <0:4.18.0-477.107.1.el8_8 |
| Release of Invalid Pointer or Reference | <0:4.18.0-477.107.1.el8_8 |
| Use After Free | <0:4.18.0-477.107.1.el8_8 |
| Use After Free | <0:4.18.0-477.107.1.el8_8 |
| Incomplete Cleanup | <0:4.18.0-477.107.1.el8_8 |
| Double Free | <0:4.18.0-477.107.1.el8_8 |
| Use After Free | <0:4.18.0-477.107.1.el8_8 |
| Use After Free | <0:4.18.0-477.107.1.el8_8 |
| Use After Free | <0:4.18.0-477.107.1.el8_8 |
| Release of Invalid Pointer or Reference | <0:4.18.0-477.107.1.el8_8 |
| Use After Free | <0:4.18.0-477.107.1.el8_8 |
| CVE-2025-38671 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Race Condition | |
| Heap-based Buffer Overflow | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Use of Uninitialized Resource | <0:4.18.0-477.106.1.el8_8 |
| Use of Uninitialized Resource | <0:4.18.0-477.106.1.el8_8 |
| Use After Free | <0:4.18.0-477.106.1.el8_8 |
| Out-of-bounds Write | <0:4.18.0-477.106.1.el8_8 |
| Improper Validation of Specified Quantity in Input | <0:4.18.0-477.106.1.el8_8 |
| Use of Uninitialized Resource | <0:4.18.0-477.106.1.el8_8 |
| Use of Uninitialized Resource | <0:4.18.0-477.106.1.el8_8 |
| Use After Free | <0:4.18.0-477.106.1.el8_8 |
| Out-of-bounds Write | <0:4.18.0-477.106.1.el8_8 |
| Improper Validation of Specified Quantity in Input | <0:4.18.0-477.106.1.el8_8 |
| Race Condition | |
| Use After Free | |
| Improper Handling of Unexpected Data Type | |
| CVE-2022-50055 | |
| CVE-2022-50055 | |
| CVE-2022-50055 | |
| CVE-2022-50055 | |
| CVE-2022-50055 | |
| CVE-2022-50055 | |
| CVE-2022-50055 | |
| CVE-2022-50055 | |
| Uncontrolled Recursion | |
| Unchecked Return Value | |
| Race Condition | |
| CVE-2025-38591 | |
| CVE-2025-38565 | |
| CVE-2025-38581 | |
| CVE-2025-38601 | |
| Use of Uninitialized Variable | |
| CVE-2025-38593 | |
| CVE-2025-38563 | |
| Race Condition | |
| CVE-2025-38611 | |
| CVE-2025-38560 | |
| CVE-2025-38608 | |
| Out-of-bounds Read | |
| CVE-2025-38546 | |
| CVE-2025-38553 | |
| Buffer Overflow | |
| Expired Pointer Dereference | |
| Race Condition | |
| CVE-2025-38528 | |
| Out-of-bounds Read | |
| Expected Behavior Violation | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Use of Uninitialized Resource | <0:4.18.0-305.168.1.el8_4 |
| Use After Free | <0:4.18.0-305.168.1.el8_4 |
| Improper Validation of Specified Quantity in Input | <0:4.18.0-305.168.1.el8_4 |
| CVE-2023-53087 | |
| Use of Uninitialized Resource | <0:4.18.0-372.157.1.el8_6 |
| Use of Uninitialized Resource | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Double Free | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Improper Validation of Specified Quantity in Input | <0:4.18.0-372.157.1.el8_6 |
| Memory Leak | <0:4.18.0-372.157.1.el8_6 |
| Use of Uninitialized Resource | <0:4.18.0-372.157.1.el8_6 |
| Use of Uninitialized Resource | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Double Free | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Improper Validation of Specified Quantity in Input | <0:4.18.0-372.157.1.el8_6 |
| Memory Leak | <0:4.18.0-372.157.1.el8_6 |
| Use of Uninitialized Resource | <0:4.18.0-372.157.1.el8_6 |
| Use of Uninitialized Resource | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Double Free | <0:4.18.0-372.157.1.el8_6 |
| Use After Free | <0:4.18.0-372.157.1.el8_6 |
| Improper Validation of Specified Quantity in Input | <0:4.18.0-372.157.1.el8_6 |
| Memory Leak | <0:4.18.0-372.157.1.el8_6 |
| CVE-2025-38499 | |
| CVE-2022-50233 | |
| Improper Update of Reference Count | |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Out-of-bounds Read | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Double Free | <0:4.18.0-477.104.1.el8_8 |
| Memory Leak | <0:4.18.0-477.104.1.el8_8 |
| Buffer Overflow | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-372.155.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.155.1.el8_6 |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Out-of-bounds Read | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-477.104.1.el8_8 |
| Double Free | <0:4.18.0-477.104.1.el8_8 |
| Memory Leak | <0:4.18.0-477.104.1.el8_8 |
| Buffer Overflow | <0:4.18.0-477.104.1.el8_8 |
| Use After Free | <0:4.18.0-372.155.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.155.1.el8_6 |
| Use After Free | <0:4.18.0-372.155.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.155.1.el8_6 |
| Use After Free | <0:4.18.0-305.166.1.el8_4 |
| Use After Free | <0:4.18.0-305.166.1.el8_4 |
| Use After Free | <0:4.18.0-305.166.1.el8_4 |
| Double Free | <0:4.18.0-305.166.1.el8_4 |
| Memory Leak | <0:4.18.0-305.166.1.el8_4 |
| Improper Update of Reference Count | |
| Use After Free | <0:4.18.0-193.162.1.el8_2 |
| Use After Free | <0:4.18.0-193.162.1.el8_2 |
| Out-of-bounds Read | <0:4.18.0-193.162.1.el8_2 |
| Use After Free | <0:4.18.0-193.162.1.el8_2 |
| Buffer Overflow | <0:4.18.0-193.162.1.el8_2 |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| CVE-2022-50219 | |
| CVE-2022-50219 | |
| CVE-2022-50219 | |
| CVE-2022-50219 | |
| CVE-2022-50116 | |
| CVE-2022-50116 | |
| CVE-2022-50116 | |
| CVE-2022-50116 | |
| CVE-2022-50219 | |
| CVE-2022-50219 | |
| CVE-2022-50219 | |
| CVE-2022-50219 | |
| CVE-2022-50219 | |
| CVE-2022-50219 | |
| CVE-2022-50219 | |
| CVE-2022-50219 | |
| Improper Validation of Array Index | |
| Use After Free | <0:4.18.0-305.165.1.el8_4 |
| Use After Free | <0:4.18.0-305.165.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.165.1.el8_4 |
| Use After Free | <0:4.18.0-305.165.1.el8_4 |
| Buffer Overflow | <0:4.18.0-305.165.1.el8_4 |
| CVE-2025-38498 | |
| CVE-2025-38494 | |
| CVE-2025-38495 | |
| CVE-2025-38473 | |
| CVE-2025-38474 | |
| Improper Check for Unusual or Exceptional Conditions | |
| Improper Update of Reference Count | |
| CVE-2025-38445 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| CVE-2025-38424 | |
| CVE-2025-38457 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Incorrect Type Conversion or Cast | |
| Use After Free | |
| CVE-2025-38387 | |
| Improper Check for Unusual or Exceptional Conditions | |
| CVE-2025-38386 | |
| Out-of-bounds Read | |
| CVE-2025-38462 | |
| CVE-2025-38459 | |
| Improper Locking | |
| CVE-2025-38444 | |
| Improper Check for Unusual or Exceptional Conditions | |
| CVE-2025-38359 | |
| CVE-2025-38415 | |
| CVE-2025-38466 | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| CVE-2025-38403 | |
| CVE-2025-38393 | |
| CVE-2025-38438 | |
| Out-of-Bounds | |
| CVE-2025-38465 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Incorrect Conversion between Numeric Types | |
| Time-of-check Time-of-use (TOCTOU) | |
| NULL Pointer Dereference | |
| Use After Free | |
| Incorrect Conversion between Numeric Types | |
| Time-of-check Time-of-use (TOCTOU) | |
| NULL Pointer Dereference | |
| Use After Free | |
| Incorrect Conversion between Numeric Types | |
| Time-of-check Time-of-use (TOCTOU) | |
| NULL Pointer Dereference | |
| Use After Free | |
| Incorrect Conversion between Numeric Types | |
| Time-of-check Time-of-use (TOCTOU) | |
| NULL Pointer Dereference | |
| Use After Free | |
| Incorrect Conversion between Numeric Types | |
| Time-of-check Time-of-use (TOCTOU) | |
| NULL Pointer Dereference | |
| Use After Free | |
| Incorrect Conversion between Numeric Types | |
| Time-of-check Time-of-use (TOCTOU) | |
| NULL Pointer Dereference | |
| Use After Free | |
| Incorrect Conversion between Numeric Types | |
| Time-of-check Time-of-use (TOCTOU) | |
| NULL Pointer Dereference | |
| Use After Free | |
| Incorrect Conversion between Numeric Types | |
| Time-of-check Time-of-use (TOCTOU) | |
| Use After Free | <0:4.18.0-372.153.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.153.1.el8_6 |
| Buffer Overflow | <0:4.18.0-372.153.1.el8_6 |
| Use After Free | <0:4.18.0-372.153.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.153.1.el8_6 |
| Buffer Overflow | <0:4.18.0-372.153.1.el8_6 |
| Use After Free | <0:4.18.0-372.153.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.153.1.el8_6 |
| Buffer Overflow | <0:4.18.0-372.153.1.el8_6 |
| Use After Free | |
| Out-of-bounds Write | |
| Integer Underflow | |
| Memory Leak | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Improper Update of Reference Count | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Allocation of Resources Without Limits or Throttling | |
| Use After Free | |
| Double Free | |
| Race Condition | |
| CVE-2023-31084 | |
| Improperly Implemented Security Check for Standard | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Resource Locking | |
| Double Free | |
| Memory Leak | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Logging of Excessive Data | |
| Use After Free | |
| Double Free | |
| Out-of-bounds Write | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Deadlock | |
| Processor Optimization Removal or Modification of Security-critical Code | |
| Deadlock | |
| Processor Optimization Removal or Modification of Security-critical Code | |
| Deadlock | |
| Processor Optimization Removal or Modification of Security-critical Code | |
| CVE-2025-38349 | |
| Deadlock | |
| Processor Optimization Removal or Modification of Security-critical Code | |
| Deadlock | |
| Processor Optimization Removal or Modification of Security-critical Code | |
| Deadlock | |
| Processor Optimization Removal or Modification of Security-critical Code | |
| Deadlock | |
| Processor Optimization Removal or Modification of Security-critical Code | |
| Deadlock | |
| Processor Optimization Removal or Modification of Security-critical Code | |
| Use of Out-of-range Pointer Offset | <0:4.18.0-305.162.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.162.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.162.1.el8_4 |
| CVE-2022-49328 | <0:4.18.0-305.162.1.el8_4 |
| Out-of-bounds Read | |
| Use of Out-of-range Pointer Offset | <0:4.18.0-477.101.1.el8_8 |
| Out-of-bounds Write | <0:4.18.0-477.101.1.el8_8 |
| Use of Out-of-range Pointer Offset | <0:4.18.0-477.101.1.el8_8 |
| Out-of-bounds Write | <0:4.18.0-477.101.1.el8_8 |
| CVE-2025-38320 | |
| Always-Incorrect Control Flow Implementation | |
| Divide By Zero | |
| CVE-2025-38346 | |
| Use After Free | |
| Improper Check for Unusual or Exceptional Conditions | |
| CVE-2025-38324 | |
| Improper Null Termination | |
| CVE-2025-38285 | |
| CVE-2025-38293 | |
| CVE-2025-38311 | |
| CVE-2025-38344 | |
| CVE-2025-38345 | |
| NULL Pointer Dereference | |
| Improper Validation of Array Index | |
| Out-of-Bounds | |
| Expired Pointer Dereference | |
| CVE-2025-38262 | |
| CVE-2025-38248 | |
| CVE-2025-38249 | |
| Improper Validation of Array Index | |
| CVE-2025-38245 | |
| Use of Out-of-range Pointer Offset | <0:4.18.0-193.159.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.159.1.el8_2 |
| Resource Injection | |
| Resource Injection | |
| Use of Out-of-range Pointer Offset | <0:4.18.0-372.151.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.151.1.el8_6 |
| CVE-2022-49111 | <0:4.18.0-372.151.1.el8_6 |
| Use of Out-of-range Pointer Offset | <0:4.18.0-372.151.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.151.1.el8_6 |
| CVE-2022-49111 | <0:4.18.0-372.151.1.el8_6 |
| Use of Out-of-range Pointer Offset | <0:4.18.0-372.151.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.151.1.el8_6 |
| CVE-2022-49111 | <0:4.18.0-372.151.1.el8_6 |
| CVE-2025-38229 | |
| CVE-2025-38190 | |
| Integer Underflow | <0:4.18.0-553.71.1.el8_10 |
| CVE-2025-38212 | |
| CVE-2025-38184 | |
| CVE-2025-38181 | |
| CVE-2025-38198 | |
| Incomplete Cleanup | |
| CVE-2025-38232 | |
| CVE-2025-38222 | |
| CVE-2025-38213 | |
| CVE-2025-38234 | <0:4.18.0-553.54.1.el8_10 |
| CVE-2025-38180 | |
| CVE-2025-38202 | |
| CVE-2025-38201 | |
| CVE-2025-38192 | |
| Integer Overflow or Wraparound | |
| CVE-2025-38215 | |
| Incomplete Cleanup | |
| CVE-2025-38118 | |
| CVE-2025-38107 | |
| CVE-2025-38161 | |
| CVE-2025-38129 | |
| CVE-2025-38105 | |
| CVE-2025-38157 | |
| CVE-2025-38108 | |
| CVE-2025-38113 | |
| CVE-2025-38099 | |
| CVE-2025-38115 | |
| CVE-2025-38102 | |
| CVE-2025-38117 | |
| CVE-2025-38096 | |
| CVE-2025-38122 | |
| CVE-2025-38112 | |
| CVE-2025-38147 | |
| CVE-2025-38127 | |
| CVE-2025-38097 | |
| CVE-2025-38126 | |
| Out-of-bounds Read | |
| Use After Free | <0:4.18.0-477.100.1.el8_8 |
| Out-of-bounds Read | <0:4.18.0-477.100.1.el8_8 |
| CVE-2022-49111 | <0:4.18.0-477.100.1.el8_8 |
| CVE-2025-38103 | |
| CVE-2025-38166 | |
| CVE-2025-38162 | |
| CVE-2025-38146 | |
| Use After Free | <0:4.18.0-477.100.1.el8_8 |
| Out-of-bounds Read | <0:4.18.0-477.100.1.el8_8 |
| CVE-2022-49111 | <0:4.18.0-477.100.1.el8_8 |
| CVE-2022-49940 | |
| Out-of-bounds Read | <0:4.18.0-193.156.1.el8_2 |
| CVE-2022-49328 | <0:4.18.0-193.156.1.el8_2 |
| CVE-2022-49122 | <0:4.18.0-193.156.1.el8_2 |
| CVE-2022-49114 | <0:4.18.0-193.156.1.el8_2 |
| CVE-2022-49111 | <0:4.18.0-193.156.1.el8_2 |
| CVE-2022-49940 | |
| CVE-2022-49940 | |
| CVE-2022-49940 | |
| CVE-2022-49122 | <0:4.18.0-372.150.1.el8_6 |
| CVE-2022-49114 | <0:4.18.0-372.150.1.el8_6 |
| CVE-2022-49122 | <0:4.18.0-372.150.1.el8_6 |
| CVE-2022-49114 | <0:4.18.0-372.150.1.el8_6 |
| CVE-2022-49122 | <0:4.18.0-372.150.1.el8_6 |
| CVE-2022-49114 | <0:4.18.0-372.150.1.el8_6 |
| CVE-2022-49122 | <0:4.18.0-305.161.1.el8_4 |
| CVE-2022-49114 | <0:4.18.0-305.161.1.el8_4 |
| CVE-2022-49111 | <0:4.18.0-305.161.1.el8_4 |
| Information Exposure | |
| Use of Uninitialized Resource | <0:4.18.0-553.63.1.el8_10 |
| Use After Free | <0:4.18.0-372.149.1.el8_6 |
| Use After Free | <0:4.18.0-372.149.1.el8_6 |
| CVE-2022-49328 | <0:4.18.0-372.149.1.el8_6 |
| Use After Free | <0:4.18.0-372.149.1.el8_6 |
| Use After Free | <0:4.18.0-372.149.1.el8_6 |
| CVE-2022-49328 | <0:4.18.0-372.149.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-553.58.1.el8_10 |
| Double Free | <0:4.18.0-553.66.1.el8_10 |
| CVE-2025-38073 | |
| CVE-2025-38060 | |
| Improper Input Validation | |
| CVE-2025-38066 | |
| CVE-2025-38017 | |
| CVE-2025-38051 | |
| Improper Input Validation | |
| CVE-2025-38024 | |
| CVE-2025-38075 | |
| Use After Free | <0:4.18.0-553.66.1.el8_10 |
| CVE-2025-38038 | |
| CVE-2025-38067 | |
| CVE-2025-38058 | |
| Out-of-bounds Read | <0:4.18.0-553.64.1.el8_10 |
| CVE-2025-38068 | |
| CVE-2025-38048 | |
| CVE-2025-38029 | |
| CVE-2025-38071 | |
| Missing Release of Resource after Effective Lifetime | |
| Incomplete Cleanup | |
| CVE-2025-38078 | |
| CVE-2025-38045 | |
| CVE-2025-38031 | |
| Resource Injection | |
| CVE-2025-38064 | |
| CVE-2025-38023 | |
| CVE-2025-38061 | |
| CVE-2025-38046 | |
| CVE-2025-38022 | |
| Resource Injection | |
| Race Condition | |
| CVE-2025-38062 | |
| CVE-2025-38015 | |
| NULL Pointer Dereference | |
| Resource Leak | |
| Deadlock | |
| CVE-2022-50088 | |
| Premature Release of Resource During Expected Lifetime | |
| Deadlock | |
| Improper Input Validation | |
| CVE-2022-49979 | |
| CVE-2022-49936 | |
| CVE-2022-50168 | |
| CVE-2022-50100 | |
| CVE-2022-49941 | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | <0:4.18.0-305.159.1.el8_4 |
| Use After Free | <0:4.18.0-305.159.1.el8_4 |
| Use After Free | <0:4.18.0-372.149.1.el8_6 |
| Use After Free | <0:4.18.0-372.149.1.el8_6 |
| CVE-2022-49328 | <0:4.18.0-372.149.1.el8_6 |
| CVE-2022-49938 | |
| Use After Free | <0:4.18.0-193.154.1.el8_2 |
| Use After Free | |
| CVE-2022-50224 | |
| CVE-2022-50220 | |
| CVE-2022-50228 | |
| CVE-2022-50085 | |
| NULL Pointer Dereference | |
| Improper Update of Reference Count | |
| CVE-2022-50025 | |
| Use After Free | |
| Missing Synchronization | |
| Buffer Overflow | |
| CVE-2022-49990 | |
| Time-of-check Time-of-use (TOCTOU) | |
| CVE-2022-49973 | |
| Integer Overflow or Wraparound | |
| CVE-2022-50082 | |
| NULL Pointer Dereference | |
| Incorrect Conversion between Numeric Types | |
| CVE-2022-49961 | |
| Buffer Overflow | |
| Missing Synchronization | |
| Expired Pointer Dereference | |
| Improper Input Validation | |
| CVE-2022-49972 | |
| NULL Pointer Dereference | |
| CVE-2022-49949 | |
| Premature Release of Resource During Expected Lifetime | |
| Memory Leak | |
| Improper Update of Reference Count | |
| CVE-2022-50219 | |
| Improper Update of Reference Count | |
| Use After Free | |
| CVE-2022-50186 | |
| Out-of-bounds Write | |
| Release of Invalid Pointer or Reference | |
| Out-of-bounds Read | |
| Resource Injection | |
| CVE-2022-50080 | |
| CVE-2022-49987 | |
| CVE-2022-49975 | |
| Release of Invalid Pointer or Reference | <0:4.18.0-553.64.1.el8_10 |
| Integer Overflow or Wraparound | |
| Deployment of Wrong Handler | |
| CVE-2022-50226 | |
| Release of Invalid Pointer or Reference | <0:4.18.0-553.22.1.el8_10 |
| Deadlock | |
| CVE-2025-38047 | |
| CVE-2022-49967 | |
| CVE-2022-49982 | |
| CVE-2022-49951 | |
| CVE-2022-50159 | |
| CVE-2022-50065 | |
| CVE-2022-50116 | |
| Improper Validation of Specified Quantity in Input | <0:4.18.0-553.66.1.el8_10 |
| CVE-2022-50048 | |
| CVE-2022-50134 | |
| Memory Leak | |
| CVE-2022-50084 | |
| CVE-2022-50118 | |
| Integer Overflow or Wraparound | |
| NULL Pointer Dereference | |
| CVE-2022-50086 | |
| CVE-2022-50055 | |
| CVE-2022-50103 | |
| CVE-2022-49948 | |
| CVE-2022-50201 | |
| Improper Resource Locking | |
| CVE-2022-50144 | |
| Improper Resource Locking | |
| Improper Update of Reference Count | |
| Improper Input Validation | |
| Expired Pointer Dereference | |
| CVE-2022-50035 | |
| CVE-2022-50222 | |
| CVE-2022-50170 | |
| CVE-2022-50071 | |
| Missing Synchronization | |
| Missing Synchronization | |
| Missing Synchronization | |
| Missing Synchronization | |
| Missing Synchronization | <0:4.18.0-372.157.1.el8_6 |
| Missing Synchronization | <0:4.18.0-372.157.1.el8_6 |
| Missing Synchronization | <0:4.18.0-477.104.1.el8_8 |
| Missing Synchronization | |
| Missing Synchronization | |
| Missing Synchronization | |
| Missing Synchronization | <0:4.18.0-477.104.1.el8_8 |
| Missing Synchronization | <0:4.18.0-372.157.1.el8_6 |
| CVE-2025-38004 | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Race Condition | |
| CVE-2025-37994 | |
| CVE-2025-37995 | |
| Improper Handling of Unexpected Data Type | |
| CVE-2025-37997 | |
| CVE-2023-52973 | |
| CVE-2025-37942 | |
| CVE-2025-37992 | |
| CVE-2025-37940 | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Use After Free | |
| Memory Leak | |
| Use After Free | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Use After Free | |
| Memory Leak | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Use After Free | |
| Memory Leak | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Use After Free | |
| Memory Leak | |
| Use After Free | |
| Memory Leak | |
| CVE-2022-49398 | |
| Use After Free | |
| CVE-2025-37932 | |
| CVE-2025-37920 | |
| CVE-2025-37911 | |
| CVE-2025-37980 | |
| CVE-2025-37928 | |
| CVE-2025-37949 | |
| CVE-2025-37990 | |
| CVE-2025-37963 | |
| Time-of-check Time-of-use (TOCTOU) | |
| CVE-2025-37961 | |
| CVE-2025-37984 | |
| CVE-2025-37967 | |
| Time-of-check Time-of-use (TOCTOU) | |
| CVE-2025-37974 | |
| CVE-2025-37948 | |
| CVE-2025-37959 | |
| CVE-2025-37927 | |
| CVE-2025-37989 | |
| CVE-2025-37923 | |
| CVE-2025-37937 | |
| Use After Free | <0:4.18.0-553.66.1.el8_10 |
| Use After Free | <0:4.18.0-305.157.1.el8_4 |
| Improper Input Validation | <0:4.18.0-305.157.1.el8_4 |
| Use After Free | <0:4.18.0-305.157.1.el8_4 |
| Improper Input Validation | <0:4.18.0-305.157.1.el8_4 |
| Use After Free | <0:4.18.0-305.157.1.el8_4 |
| Improper Input Validation | <0:4.18.0-305.157.1.el8_4 |
| CVE-2024-28956 | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | <0:4.18.0-193.152.1.el8_2 |
| CVE-2023-53146 | |
| Use After Free | <0:4.18.0-372.145.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.145.1.el8_6 |
| Use After Free | <0:4.18.0-372.145.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.145.1.el8_6 |
| Use After Free | <0:4.18.0-372.145.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.145.1.el8_6 |
| CVE-2022-49723 | |
| Use After Free | |
| CVE-2023-53145 | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| Time-of-check Time-of-use (TOCTOU) | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| Time-of-check Time-of-use (TOCTOU) | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| Time-of-check Time-of-use (TOCTOU) | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| Time-of-check Time-of-use (TOCTOU) | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Memory Leak | |
| CVE-2025-37877 | |
| CVE-2025-37861 | |
| CVE-2025-37859 | |
| CVE-2025-37882 | |
| CVE-2025-37884 | |
| CVE-2025-37885 | |
| NULL Pointer Dereference | |
| CVE-2025-37867 | |
| CVE-2025-37849 | |
| CVE-2025-37836 | |
| Improper Locking | |
| CVE-2025-37862 | |
| Resource Exhaustion | |
| Use After Free | |
| CVE-2025-37878 | |
| Use After Free | |
| NULL Pointer Dereference | |
| CVE-2025-37857 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2025-37839 | |
| CVE-2025-37844 | |
| CVE-2025-37875 | |
| NULL Pointer Dereference | |
| CVE-2020-36791 | |
| Memory Leak | |
| Improper Input Validation | |
| Improper Initialization | |
| Improper Input Validation | |
| Race Condition | |
| CVE-2023-53121 | |
| CVE-2023-53073 | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Validation of Array Index | |
| CVE-2023-53116 | |
| NULL Pointer Dereference | |
| Improperly Implemented Security Check for Standard | |
| CVE-2023-53091 | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| CVE-2023-53062 | |
| Expired Pointer Dereference | |
| CVE-2023-53052 | |
| CVE-2023-53068 | |
| CVE-2023-53036 | |
| CVE-2023-53038 | |
| CVE-2023-53128 | |
| CVE-2023-53127 | |
| CVE-2023-53109 | |
| NULL Pointer Dereference | |
| CVE-2023-53071 | |
| Use After Free | |
| Unchecked Return Value | |
| Improperly Implemented Security Check for Standard | |
| CVE-2023-53065 | |
| CVE-2023-53041 | |
| Covert Timing Channel | |
| CVE-2023-53105 | |
| CVE-2023-53108 | |
| CVE-2023-53115 | |
| CVE-2023-53140 | |
| CVE-2023-53075 | |
| NULL Pointer Dereference | |
| Use After Free | |
| Use After Free | |
| CVE-2023-53101 | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| CVE-2023-53110 | |
| CVE-2023-53049 | |
| CVE-2023-53118 | |
| CVE-2023-53063 | |
| CVE-2023-53097 | |
| CVE-2023-53048 | |
| Improper Input Validation | |
| CVE-2023-53077 | |
| CVE-2023-53076 | |
| Improper Validation of Integrity Check Value | |
| CVE-2023-53053 | |
| NULL Pointer Dereference | |
| CVE-2023-53046 | |
| CVE-2023-53131 | |
| CVE-2023-53037 | |
| CVE-2023-53100 | |
| CVE-2023-53088 | |
| Resource Exhaustion | |
| CVE-2023-53080 | |
| CVE-2023-53084 | |
| CVE-2022-49933 | |
| Race Condition | |
| Incorrect Check of Function Return Value | |
| Improper Access Control | |
| CVE-2025-23142 | |
| CVE-2025-23143 | |
| Use After Free | <0:4.18.0-553.62.1.el8_10 |
| NULL Pointer Dereference | |
| Memory Leak | |
| Memory Leak | |
| Improper Input Validation | |
| Improper Input Validation | |
| Deadlock | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| CVE-2025-23161 | |
| Use After Free | <0:4.18.0-553.62.1.el8_10 |
| Out-of-bounds Read | |
| Deadlock | |
| NULL Pointer Dereference | |
| Memory Leak | |
| CVE-2022-49918 | |
| Use After Free | |
| CVE-2022-49900 | |
| Integer Overflow or Wraparound | |
| Race Condition | |
| Memory Leak | |
| CVE-2022-49821 | |
| CVE-2022-49822 | |
| CVE-2022-49779 | |
| CVE-2022-49781 | |
| CVE-2022-49929 | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Out-of-bounds Write | |
| CVE-2022-49907 | |
| Memory Leak | |
| Memory Leak | |
| NULL Pointer Dereference | |
| CVE-2022-49879 | |
| CVE-2022-49829 | |
| CVE-2022-49865 | |
| CVE-2022-49823 | |
| NULL Pointer Dereference | |
| CVE-2022-49789 | |
| CVE-2022-49835 | |
| CVE-2022-49812 | |
| CVE-2022-49825 | |
| CVE-2022-49776 | |
| CVE-2022-49832 | |
| CVE-2022-49771 | |
| Out-of-bounds Read | |
| CVE-2022-49772 | |
| Memory Leak | |
| Memory Leak | <0:4.18.0-553.62.1.el8_10 |
| CVE-2022-49785 | |
| CVE-2022-49813 | |
| Use After Free | |
| Race Condition | |
| CVE-2022-49883 | |
| Incorrect Conversion between Numeric Types | |
| Always-Incorrect Control Flow Implementation | |
| CVE-2022-49917 | |
| CVE-2022-49838 | |
| Memory Leak | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| CVE-2022-49803 | |
| Memory Leak | |
| Incorrect Type Conversion or Cast | |
| Out-of-bounds Write | <0:4.18.0-553.60.1.el8_10 |
| CVE-2022-49783 | |
| CVE-2022-49905 | |
| Memory Leak | |
| CVE-2022-49766 | |
| Use After Free | |
| Memory Leak | |
| CVE-2022-49872 | |
| Out-of-Bounds | |
| CVE-2022-49802 | |
| Use After Free | |
| CVE-2022-49886 | |
| Use After Free | |
| CVE-2022-49824 | |
| Improper Handling of Exceptional Conditions | |
| CVE-2022-49764 | |
| CVE-2022-49769 | |
| CVE-2022-49773 | |
| CVE-2022-49780 | |
| CVE-2022-49782 | |
| CVE-2020-36790 | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2023-52974 | |
| Double Free | |
| Improper Privilege Management | |
| Use After Free | |
| Use After Free | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Use After Free | |
| Race Condition | |
| Out-of-bounds Write | |
| Use After Free | |
| NULL Pointer Dereference | |
| Double Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Incorrect Calculation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Race Condition | |
| CVE-2025-22089 | |
| NULL Pointer Dereference | |
| Buffer Overflow | |
| CVE-2025-22086 | |
| Out-of-bounds Read | |
| CVE-2025-22045 | |
| CVE-2025-22025 | |
| Improper Locking | |
| CVE-2025-22116 | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Use After Free | |
| Integer Overflow or Wraparound | <0:4.18.0-553.71.1.el8_10 |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Use After Free | <0:4.18.0-553.66.1.el8_10 |
| Improper Input Validation | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Resource Injection | |
| Incomplete Cleanup | |
| Improper Resource Locking | |
| NULL Pointer Dereference | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Out-of-bounds Read | <0:4.18.0-193.150.1.el8_2 |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | <0:4.18.0-305.154.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.154.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.154.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-372.143.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.143.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.143.1.el8_6 |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Use of Uninitialized Resource | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Write | <0:4.18.0-553.62.1.el8_10 |
| Memory Leak | |
| Use After Free | <0:4.18.0-553.62.1.el8_10 |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Memory Leak | |
| Integer Overflow or Wraparound | |
| CVE-2025-21976 | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | <0:4.18.0-553.64.1.el8_10 |
| Integer Overflow or Wraparound | |
| Use of Uninitialized Resource | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Check or Handling of Exceptional Conditions | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Race Condition | |
| Race Condition | |
| Use of Uninitialized Resource | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Use After Free | <0:4.18.0-553.66.1.el8_10 |
| CVE-2025-21931 | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Out-of-Bounds | |
| CVE-2025-21872 | |
| CVE-2025-21877 | |
| Use After Free | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Improper Input Validation | |
| CVE-2024-58090 | |
| Use of Uninitialized Resource | |
| Memory Leak | |
| NULL Pointer Dereference | |
| CVE-2023-53019 | |
| CVE-2023-53009 | |
| Integer Underflow | |
| CVE-2023-52997 | |
| CVE-2023-52983 | |
| CVE-2022-49753 | |
| Improper Update of Reference Count | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Memory Leak | |
| CVE-2023-53032 | |
| CVE-2023-53031 | |
| Use of Function with Inconsistent Implementations | |
| Use After Free | |
| Improper Locking | |
| Resource Injection | |
| Improper Check or Handling of Exceptional Conditions | |
| Improper Input Validation | |
| CVE-2025-21881 | |
| Incorrect Calculation | |
| Information Loss or Omission | |
| CVE-2023-52990 | |
| CVE-2023-52992 | |
| CVE-2023-52942 | |
| CVE-2023-52931 | |
| Improper Locking | |
| CVE-2023-53024 | |
| NULL Pointer Dereference | |
| CVE-2023-52974 | |
| Information Exposure | |
| Race Condition | |
| Improper Validation of Array Index | |
| CVE-2022-49739 | |
| NULL Pointer Dereference | |
| Improper Validation of Array Index | |
| CVE-2023-52986 | |
| CVE-2023-53007 | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| NULL Pointer Dereference | |
| CVE-2023-52973 | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Improper Initialization | |
| Improper Update of Reference Count | |
| CVE-2023-53006 | |
| NULL Pointer Dereference | |
| Memory Leak | |
| CVE-2023-52935 | |
| Integer Overflow or Wraparound | |
| Improper Locking | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Read | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Write | |
| Out-of-bounds Write | <0:4.18.0-372.142.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-305.152.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.152.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-372.142.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.142.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-305.152.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-193.148.1.el8_2 |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Double Free | |
| Double Free | |
| Use After Free | |
| Double Free | |
| Double Free | |
| Use After Free | |
| Double Free | |
| Use After Free | |
| Double Free | |
| Use After Free | |
| Double Free | |
| Double Free | |
| Use After Free | |
| Operation on a Resource after Expiration or Release | |
| Use After Free | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Use After Free | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| CVE-2022-49562 | |
| NULL Pointer Dereference | |
| Use of Uninitialized Resource | |
| Deadlock | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Allocation of Resources Without Limits or Throttling | |
| Exposure of Data Element to Wrong Session | |
| Improper Input Validation | |
| Buffer Overflow | |
| Use of Uninitialized Resource | |
| Resource Injection | |
| Use After Free | |
| Buffer Overflow | |
| Use of Uninitialized Resource | |
| Resource Injection | |
| Use After Free | |
| Buffer Overflow | |
| Use of Uninitialized Resource | |
| Resource Injection | |
| Use After Free | |
| Buffer Overflow | |
| Use of Uninitialized Resource | |
| Resource Injection | |
| Use After Free | |
| Buffer Overflow | <0:4.18.0-305.151.1.el8_4 |
| Use of Uninitialized Resource | <0:4.18.0-305.151.1.el8_4 |
| Use After Free | <0:4.18.0-305.151.1.el8_4 |
| Buffer Overflow | <0:4.18.0-305.151.1.el8_4 |
| Use of Uninitialized Resource | <0:4.18.0-305.151.1.el8_4 |
| Use After Free | <0:4.18.0-305.151.1.el8_4 |
| Buffer Overflow | <0:4.18.0-305.151.1.el8_4 |
| Use of Uninitialized Resource | <0:4.18.0-305.151.1.el8_4 |
| Use After Free | <0:4.18.0-305.151.1.el8_4 |
| Buffer Overflow | <0:4.18.0-193.146.1.el8_2 |
| Use of Uninitialized Resource | <0:4.18.0-193.146.1.el8_2 |
| Use After Free | <0:4.18.0-193.146.1.el8_2 |
| Buffer Overflow | <0:4.18.0-372.141.1.el8_6 |
| Use of Uninitialized Resource | <0:4.18.0-372.141.1.el8_6 |
| Use After Free | <0:4.18.0-372.141.1.el8_6 |
| Buffer Overflow | <0:4.18.0-372.141.1.el8_6 |
| Use of Uninitialized Resource | <0:4.18.0-372.141.1.el8_6 |
| Use After Free | <0:4.18.0-372.141.1.el8_6 |
| Buffer Overflow | <0:4.18.0-372.141.1.el8_6 |
| Use of Uninitialized Resource | <0:4.18.0-372.141.1.el8_6 |
| Use After Free | <0:4.18.0-372.141.1.el8_6 |
| Improper Initialization | |
| Resource Exhaustion | |
| CVE-2025-21831 | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| CVE-2024-58079 | |
| Resource Injection | |
| CVE-2024-58083 | |
| Use After Free | |
| Resource Injection | |
| Improper Input Validation | |
| Improper Input Validation | |
| Return of Wrong Status Code | <0:4.18.0-372.139.1.el8_6 |
| Return of Wrong Status Code | <0:4.18.0-372.139.1.el8_6 |
| Return of Wrong Status Code | <0:4.18.0-372.139.1.el8_6 |
| NULL Pointer Dereference | |
| Out-of-bounds Write | <0:4.18.0-553.46.1.el8_10 |
| Use After Free | <0:4.18.0-553.53.1.el8_10 |
| CVE-2025-21732 | |
| NULL Pointer Dereference | |
| Access of Uninitialized Pointer | |
| Use After Free | |
| Race Condition | |
| Double Free | <0:4.18.0-553.62.1.el8_10 |
| Improper Validation of Array Index | |
| Buffer Overflow | |
| CVE-2025-21760 | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Use After Free | |
| Use After Free | |
| Improper Resource Locking | |
| Integer Overflow or Wraparound | |
| NULL Pointer Dereference | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2025-21729 | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| CVE-2025-21733 | |
| Use of Uninitialized Resource | |
| Use After Free | |
| NULL Pointer Dereference | |
| Deadlock | |
| Improper Input Validation | |
| Use After Free | <0:4.18.0-553.58.1.el8_10 |
| Use After Free | |
| Memory Leak | |
| Missing Lock Check | |
| Out-of-bounds Read | |
| Resource Injection | |
| Improper Handling of Structural Elements | |
| Integer Overflow or Wraparound | |
| NULL Pointer Dereference | |
| CVE-2025-21763 | |
| Improper Locking | |
| Missing Synchronization | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Use After Free | <0:4.18.0-553.62.1.el8_10 |
| Improper Input Validation | |
| Out-of-bounds Read | |
| CVE-2024-57979 | <0:4.18.0-553.44.1.el8_10 |
| Memory Leak | |
| CVE-2022-49660 | |
| Improper Input Validation | |
| Memory Leak | |
| CVE-2022-49646 | |
| Integer Overflow or Wraparound | |
| Resource Injection | |
| Improper Locking | |
| Race Condition | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Unsynchronized Access to Shared Data in a Multithreaded Context | |
| Race Condition | |
| Race Condition | |
| CVE-2022-49708 | |
| Race Condition | |
| NULL Pointer Dereference | |
| Race Condition | |
| Integer Underflow | |
| NULL Pointer Dereference | |
| CVE-2022-49524 | |
| CVE-2022-49565 | |
| Double Free | |
| Improper Validation of Array Index | |
| CVE-2022-49700 | |
| Improper Validation of Array Index | |
| Use After Free | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Use After Free | |
| Incomplete Cleanup | |
| Race Condition | |
| Improper Resource Locking | |
| NULL Pointer Dereference | |
| CVE-2022-49378 | |
| Use After Free | |
| Race Condition | |
| CVE-2022-49675 | |
| CVE-2022-49674 | |
| NULL Pointer Dereference | |
| CVE-2022-49497 | |
| CVE-2022-49701 | |
| Use of Uninitialized Resource | |
| Race Condition | |
| CVE-2022-49663 | |
| Memory Leak | |
| Processor Optimization Removal or Modification of Security-critical Code | |
| CVE-2022-49626 | |
| Race Condition | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Race Condition | |
| Race Condition | |
| Use After Free | |
| Integer Underflow | |
| CVE-2022-49297 | |
| Use After Free | |
| Resource Injection | |
| Double Free | |
| Race Condition | |
| Double Free | |
| Memory Leak | |
| Race Condition | |
| Double Free | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Race Condition | |
| CVE-2022-49556 | |
| Race Condition | |
| CVE-2022-49561 | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Use of Uninitialized Resource | |
| Memory Leak | |
| CVE-2022-49722 | |
| Integer Overflow or Wraparound | |
| CVE-2022-49647 | |
| Out-of-bounds Read | |
| CVE-2022-49687 | |
| CVE-2022-49656 | |
| CVE-2022-49545 | |
| Out-of-bounds Read | |
| Resource Injection | |
| Double Free | |
| CVE-2022-49193 | |
| CVE-2022-49237 | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| CVE-2022-49697 | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| NULL Pointer Dereference | |
| CVE-2022-49412 | |
| CVE-2022-49520 | |
| Improper Locking | |
| Improper Locking | |
| Race Condition | |
| CVE-2022-49610 | |
| CVE-2022-49474 | |
| Race Condition | |
| Use of Uninitialized Resource | |
| CVE-2022-49356 | |
| Race Condition | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Use of Uninitialized Resource | |
| NULL Pointer Dereference | |
| Race Condition | |
| Double Free | |
| Race Condition | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Use After Free | |
| Race Condition | |
| CVE-2022-49504 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| CVE-2022-49690 | |
| CVE-2022-49352 | |
| CVE-2022-49287 | |
| CVE-2022-49377 | |
| Buffer Overflow | |
| Race Condition | |
| Memory Leak | |
| Reachable Assertion | |
| CVE-2022-49725 | |
| Race Condition | |
| Race Condition | |
| Memory Leak | |
| Improper Locking | |
| NULL Pointer Dereference | |
| CVE-2022-49559 | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Memory Leak | |
| Race Condition | |
| Memory Leak | |
| Race Condition | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Race Condition | |
| Memory Leak | |
| Integer Overflow or Wraparound | |
| CVE-2022-49111 | <0:4.18.0-553.60.1.el8_10 |
| CVE-2022-49066 | |
| Resource Injection | |
| CVE-2022-49176 | |
| CVE-2022-49293 | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Double Free | |
| CVE-2022-49101 | |
| Memory Leak | |
| Memory Leak | |
| CVE-2022-49140 | |
| Divide By Zero | |
| Integer Underflow | |
| Use of Uninitialized Resource | |
| Race Condition | |
| Improper Validation of Array Index | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Memory Leak | |
| Improper Locking | |
| Improper Input Validation | |
| Memory Leak | |
| Improper Locking | |
| Race Condition | |
| CVE-2022-49552 | |
| Use After Free | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Improper Null Termination | |
| Improper Locking | |
| Race Condition | |
| Improper Input Validation | |
| Race Condition | |
| Out-of-bounds Read | |
| Use of Uninitialized Resource | |
| Memory Leak | |
| CVE-2022-49493 | |
| Out-of-bounds Read | |
| CVE-2022-49076 | |
| CVE-2022-49220 | |
| Memory Leak | |
| Double Free | |
| CVE-2022-49558 | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Out-of-bounds Read | <0:4.18.0-553.56.1.el8_10 |
| Race Condition | |
| CVE-2022-49440 | |
| Improper Locking | |
| CVE-2022-49422 | |
| Resource Injection | |
| CVE-2022-49174 | |
| Resource Injection | |
| CVE-2022-49343 | |
| NULL Pointer Dereference | |
| CVE-2022-49281 | |
| CVE-2022-49236 | |
| CVE-2022-49355 | |
| Improper Validation of Array Index | |
| Memory Leak | |
| Memory Leak | |
| Divide By Zero | |
| NULL Pointer Dereference | |
| CVE-2022-49372 | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| CVE-2022-49226 | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| Resource Injection | |
| Integer Overflow or Wraparound | |
| Memory Leak | |
| Race Condition | |
| Use After Free | |
| Race Condition | |
| CVE-2022-49179 | |
| Improper Locking | |
| CVE-2022-49136 | <0:4.18.0-553.60.1.el8_10 |
| NULL Pointer Dereference | |
| CVE-2022-49333 | |
| Memory Leak | |
| Race Condition | |
| Improper Locking | <0:4.18.0-553.22.1.el8_10 |
| Memory Leak | |
| NULL Pointer Dereference | |
| CVE-2022-49349 | |
| Resource Injection | |
| CVE-2022-49175 | |
| Use of Uninitialized Resource | |
| Race Condition | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2022-49265 | |
| Resource Injection | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Reliance on Untrusted Inputs in a Security Decision | |
| NULL Pointer Dereference | |
| CVE-2022-49390 | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| CVE-2022-49341 | |
| Improper Locking | |
| Incomplete Cleanup | |
| Resource Exhaustion | |
| CVE-2022-49110 | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Improper Input Validation | |
| Integer Underflow | |
| Memory Leak | |
| Buffer Overflow | <0:4.18.0-553.62.1.el8_10 |
| NULL Pointer Dereference | |
| Use After Free | |
| CVE-2022-49082 | |
| Operation on a Resource after Expiration or Release | |
| Off-by-one Error | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Improper Input Validation | |
| Incomplete Cleanup | |
| Improper Locking | |
| Memory Leak | |
| CVE-2022-49063 | |
| Improper Input Validation | |
| CVE-2022-49048 | |
| Resource Injection | |
| NULL Pointer Dereference | |
| CVE-2022-49078 | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| CVE-2021-47659 | |
| CVE-2021-47639 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Detection of Error Condition Without Action | |
| Use of Uninitialized Resource | |
| Race Condition | |
| NULL Pointer Dereference | |
| Race Condition | |
| Memory Leak | |
| Race Condition | |
| NULL Pointer Dereference | |
| CVE-2022-49155 | |
| Race Condition | |
| Use of Uninitialized Resource | |
| CVE-2022-49622 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Memory Leak | |
| CVE-2022-49413 | |
| Race Condition | |
| CVE-2022-49479 | |
| NULL Pointer Dereference | |
| Improper Handling of Length Parameter Inconsistency | |
| Improper Input Validation | |
| Behavioral Problems | |
| Use After Free | |
| CVE-2025-21694 | |
| Improper Input Validation | |
| Race Condition | |
| CVE-2025-21699 | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | <0:4.18.0-372.137.1.el8_6 |
| Out-of-bounds Write | |
| Out-of-bounds Write | <0:4.18.0-372.137.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.137.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-305.150.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.150.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.150.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-193.145.1.el8_2 |
| CVE-2023-52925 | |
| Improper Control of a Resource Through its Lifetime | |
| Improper Input Validation | |
| Race Condition | |
| Use After Free | |
| Memory Leak | |
| Out-of-bounds Read | |
| Stack-based Buffer Overflow | |
| Out-of-bounds Write | |
| Improper Initialization | |
| CVE-2024-36920 | |
| Improper Initialization | |
| CVE-2024-35823 | |
| Resource Leak | |
| Incomplete Cleanup | |
| Race Condition | |
| Race Condition | |
| Memory Leak | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Use After Free | |
| Release of Invalid Pointer or Reference | |
| Out-of-bounds Write | |
| Race Condition | |
| Improper Check for Unusual or Exceptional Conditions | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Race Condition | |
| NULL Pointer Dereference | <0:4.18.0-372.125.1.el8_6 |
| Race Condition | <0:4.18.0-372.125.1.el8_6 |
| Use After Free | |
| Memory Leak | |
| Out-of-bounds Read | |
| Stack-based Buffer Overflow | |
| Out-of-bounds Write | |
| Improper Initialization | |
| CVE-2024-36920 | |
| Improper Initialization | |
| CVE-2024-35823 | |
| Resource Leak | |
| Incomplete Cleanup | |
| Race Condition | |
| Race Condition | |
| Memory Leak | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Use After Free | |
| Release of Invalid Pointer or Reference | |
| Out-of-bounds Write | |
| Race Condition | |
| Improper Check for Unusual or Exceptional Conditions | |
| Out-of-Bounds | |
| Use After Free | |
| Memory Leak | |
| Out-of-bounds Read | |
| Stack-based Buffer Overflow | |
| Out-of-bounds Write | |
| Improper Initialization | |
| CVE-2024-36920 | |
| Improper Initialization | |
| CVE-2024-35823 | |
| Resource Leak | |
| Incomplete Cleanup | |
| Race Condition | |
| Race Condition | |
| Memory Leak | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Use After Free | |
| Release of Invalid Pointer or Reference | |
| Out-of-bounds Write | |
| Race Condition | |
| Improper Check for Unusual or Exceptional Conditions | |
| Out-of-Bounds | |
| Use After Free | |
| Memory Leak | |
| Out-of-bounds Read | |
| Stack-based Buffer Overflow | |
| Out-of-bounds Write | |
| Improper Initialization | |
| CVE-2024-36920 | |
| Improper Initialization | |
| CVE-2024-35823 | |
| Resource Leak | |
| Incomplete Cleanup | |
| Race Condition | |
| Race Condition | |
| Memory Leak | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Use After Free | |
| Release of Invalid Pointer or Reference | |
| Out-of-bounds Write | |
| Race Condition | |
| Improper Check for Unusual or Exceptional Conditions | |
| Out-of-Bounds | |
| CVE-2024-35890 | <0:4.18.0-372.133.1.el8_6 |
| Improper Input Validation | |
| Race Condition | |
| State Issues | <0:4.18.0-372.131.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.125.1.el8_6 |
| Race Condition | <0:4.18.0-372.125.1.el8_6 |
| Improper Input Validation | |
| Race Condition | |
| NULL Pointer Dereference | <0:4.18.0-372.125.1.el8_6 |
| Race Condition | <0:4.18.0-372.125.1.el8_6 |
| CVE-2024-35890 | <0:4.18.0-372.133.1.el8_6 |
| CVE-2024-35890 | <0:4.18.0-372.133.1.el8_6 |
| State Issues | <0:4.18.0-372.131.1.el8_6 |
| State Issues | <0:4.18.0-372.131.1.el8_6 |
| Use After Free | <0:4.18.0-305.145.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.145.1.el8_4 |
| Use After Free | <0:4.18.0-305.145.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.145.1.el8_4 |
| Use After Free | <0:4.18.0-305.145.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.145.1.el8_4 |
| Memory Leak | |
| Out-of-Bounds | |
| Use After Free | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Double Free | |
| NULL Pointer Dereference | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Input Validation | |
| Memory Leak | |
| Improper Input Validation | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Improper Control of a Resource Through its Lifetime | |
| Reachable Assertion | |
| Protection Mechanism Failure | |
| Improper Locking | |
| NULL Pointer Dereference | |
| Divide By Zero | |
| Uncontrolled Memory Allocation | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Operation on a Resource after Expiration or Release | |
| NULL Pointer Dereference | |
| Race Condition | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Integer Overflow or Wraparound | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Locking | |
| Operation on a Resource after Expiration or Release | |
| Race Condition | |
| Deadlock | |
| Use After Free | |
| Improper Control of a Resource Through its Lifetime | |
| Use After Free | |
| Improper Locking | <0:4.18.0-553.44.1.el8_10 |
| Lack of Administrator Control over Security | |
| Improper Locking | |
| Improper Input Validation | |
| Use After Free | |
| NULL Pointer Dereference | |
| Divide By Zero | |
| Use of Uninitialized Variable | |
| Improper Initialization | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Locking | |
| Resource Exhaustion | |
| Improper Locking | |
| NULL Pointer Dereference | |
| Improper Cleanup on Thrown Exception | |
| Incorrect Calculation of Buffer Size | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Use After Free | |
| Memory Leak | |
| Debug Messages Revealing Unnecessary Information | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Check or Handling of Exceptional Conditions | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use of Uninitialized Resource | |
| Improper Resource Shutdown or Release | |
| Incomplete Cleanup | |
| Incorrect Calculation | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Divide By Zero | |
| CVE-2024-35890 | |
| Divide By Zero | |
| CVE-2024-35890 | |
| Divide By Zero | |
| CVE-2024-35890 | |
| Divide By Zero | |
| CVE-2024-35890 | |
| Divide By Zero | <0:4.18.0-372.134.1.el8_6 |
| Divide By Zero | <0:4.18.0-372.134.1.el8_6 |
| Divide By Zero | <0:4.18.0-372.134.1.el8_6 |
| Divide By Zero | <0:4.18.0-305.148.1.el8_4 |
| Divide By Zero | <0:4.18.0-305.148.1.el8_4 |
| Divide By Zero | <0:4.18.0-305.148.1.el8_4 |
| Improper Input Validation | |
| Incorrect Calculation of Buffer Size | |
| Use of Uninitialized Resource | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Improper Cleanup on Thrown Exception | |
| Use After Free | |
| Insufficient Logging | |
| NULL Pointer Dereference | |
| Deadlock | |
| Race Condition | |
| Use After Free | |
| Improper Input Validation | |
| Memory Leak | |
| Incomplete Cleanup | |
| Resource Injection | |
| Improper Locking | |
| NULL Pointer Dereference | |
| Incorrect Check of Function Return Value | |
| Use After Free | |
| Improper Initialization | |
| Improper Validation of Specified Quantity in Input | |
| Double Free | |
| Improper Locking | |
| Use After Free | |
| Off-by-one Error | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Race Condition | |
| Excessive Platform Resource Consumption within a Loop | |
| Memory Leak | |
| Use After Free | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Use After Free | |
| Incomplete Cleanup | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Use After Free | |
| NULL Pointer Dereference | |
| Race Condition | |
| CVE-2024-53229 | |
| Incomplete Cleanup | |
| Improper Input Validation | |
| Use After Free | |
| CVE-2024-53190 | |
| Use After Free | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Handling of Exceptional Conditions | |
| Buffer Overflow | <0:4.18.0-553.44.1.el8_10 |
| Memory Leak | |
| Operation on a Resource after Expiration or Release | |
| Use After Free | |
| Improper Input Validation | |
| Memory Leak | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| CVE-2024-56647 | |
| Improper Handling of Unexpected Data Type | |
| Out-of-bounds Write | |
| Resource Injection | |
| Use After Free | |
| Use of Uninitialized Variable | |
| Resource Injection | |
| Resource Injection | |
| CVE-2024-56583 | |
| Use After Free | |
| Use After Free | |
| Missing Release of Resource after Effective Lifetime | |
| Integer Overflow or Wraparound | |
| Improper Validation of Array Index | |
| Out-of-bounds Read | <0:4.18.0-553.50.1.el8_10 |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | <0:4.18.0-553.52.1.el8_10 |
| Out-of-Bounds | <0:4.18.0-553.50.1.el8_10 |
| Use After Free | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | <0:4.18.0-553.40.1.el8_10 |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Resource Injection | |
| Incorrect Calculation | |
| Use After Free | |
| Race Condition | |
| Race Condition | |
| Out-of-bounds Read | |
| Race Condition | |
| Divide By Zero | <0:4.18.0-553.34.1.el8_10 |
| Improper Initialization | |
| Race Condition | |
| Memory Leak | |
| Race Condition | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Resource Management Errors | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |
| Information Exposure | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | <0:4.18.0-553.45.1.el8_10 |
| Use of Uninitialized Resource | <0:4.18.0-553.44.1.el8_10 |
| Race Condition | <0:4.18.0-553.34.1.el8_10 |
| Improper Control of a Resource Through its Lifetime | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Race Condition | |
| Buffer Overflow | |
| Unchecked Return Value | |
| Resource Injection | <0:4.18.0-553.37.1.el8_10 |
| Out-of-bounds Read | <0:4.18.0-553.58.1.el8_10 |
| Race Condition | <0:4.18.0-553.32.1.el8_10 |
| Improper Input Validation | |
| Resource Injection | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Resource Shutdown or Release | |
| Use of Uninitialized Resource | |
| Deadlock | |
| NULL Pointer Dereference | |
| Use After Free | |
| Incorrect Type Conversion or Cast | |
| Use of Uninitialized Resource | |
| Improper Locking | |
| Improper Handling of Exceptional Conditions | |
| Out-of-bounds Write | |
| CVE-2024-50251 | |
| Use After Free | <0:4.18.0-553.32.1.el8_10 |
| Improper Check for Unusual or Exceptional Conditions | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Integer Underflow | |
| Resource Injection | |
| NULL Pointer Dereference | <0:4.18.0-553.32.1.el8_10 |
| Use After Free | |
| Race Condition | |
| Improper Locking | |
| Deadlock | |
| Unchecked Return Value | |
| Improper Locking | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | <0:4.18.0-553.58.1.el8_10 |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| Integer Underflow | |
| Divide By Zero | |
| Improper Locking | |
| Resource Injection | |
| Improper Input Validation | |
| Use After Free | |
| NULL Pointer Dereference | |
| Improper Synchronization | |
| Use of Uninitialized Resource | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Expired Pointer Dereference | |
| Resource Injection | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | <0:4.18.0-372.129.1.el8_6 |
| Use After Free | <0:4.18.0-372.129.1.el8_6 |
| Use After Free | <0:4.18.0-372.129.1.el8_6 |
| Use After Free | <0:4.18.0-372.129.1.el8_6 |
| Use After Free | <0:4.18.0-372.129.1.el8_6 |
| Use After Free | <0:4.18.0-372.129.1.el8_6 |
| Use After Free | <0:4.18.0-372.129.1.el8_6 |
| Use After Free | <0:4.18.0-372.129.1.el8_6 |
| Use After Free | <0:4.18.0-372.129.1.el8_6 |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Improper Input Validation | <0:4.18.0-553.32.1.el8_10 |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Use of Uninitialized Resource | |
| Incomplete Cleanup | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Use After Free | <0:4.18.0-553.63.1.el8_10 |
| NULL Pointer Dereference | |
| CVE-2024-50162 | |
| Race Condition | |
| Use After Free | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Improper Locking | |
| Out-of-Bounds | |
| CVE-2024-50099 | <0:4.18.0-553.32.1.el8_10 |
| Use of Uninitialized Resource | <0:4.18.0-553.32.1.el8_10 |
| Use After Free | |
| Incomplete Cleanup | |
| Improper Locking | |
| Incomplete Cleanup | |
| NULL Pointer Dereference | |
| Race Condition | <0:4.18.0-553.32.1.el8_10 |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Handling of Length Parameter Inconsistency | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | <0:4.18.0-553.32.1.el8_10 |
| Use of Uninitialized Resource | <0:4.18.0-372.127.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.127.1.el8_6 |
| Use of Uninitialized Resource | <0:4.18.0-372.127.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.127.1.el8_6 |
| Use of Uninitialized Resource | <0:4.18.0-372.127.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.127.1.el8_6 |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Race Condition | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Race Condition | |
| Improper Authentication | |
| Race Condition | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Race Condition | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Race Condition | |
| Improper Authentication | |
| Race Condition | |
| Use After Free | |
| Race Condition | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Race Condition | |
| Improper Authentication | |
| Race Condition | |
| Use After Free | |
| Race Condition | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Race Condition | |
| Improper Authentication | |
| Race Condition | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Resource Shutdown or Release | |
| Buffer Overflow | |
| Improper Handling of Exceptional Conditions | |
| NULL Pointer Dereference | |
| Improper Control of a Resource Through its Lifetime | |
| NULL Pointer Dereference | |
| Improper Access Control | |
| Double Free | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Use of Uninitialized Resource | |
| Out-of-bounds Write | |
| Resource Injection | |
| Access of Uninitialized Pointer | |
| Use After Free | |
| Incorrect Conversion between Numeric Types | |
| Information Exposure | |
| Incomplete Cleanup | |
| Use After Free | |
| Improper Validation of Integrity Check Value | |
| Use After Free | |
| CVE-2024-50040 | |
| Use After Free | |
| Use After Free | |
| Resource Injection | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Resource Injection | |
| Use After Free | |
| Allocation of Resources Without Limits or Throttling | |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
| Improper Validation of Array Index | |
| Improper Control of a Resource Through its Lifetime | |
| Use After Free | |
| Always-Incorrect Control Flow Implementation | |
| Resource Injection | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Incomplete Cleanup | |
| NULL Pointer Dereference | |
| Double Free | |
| NULL Pointer Dereference | |
| Use of Uninitialized Resource | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Improper Validation of Array Index | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Race Condition | |
| NULL Pointer Dereference | |
| Operation on a Resource after Expiration or Release | |
| Improper Input Validation | |
| Resource Injection | |
| Buffer Overflow | |
| Release of Invalid Pointer or Reference | |
| NULL Pointer Dereference | |
| Improper Locking | |
| NULL Pointer Dereference | |
| CVE-2024-49944 | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Handling of Exceptional Conditions | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Operation on a Resource after Expiration or Release | |
| Improper Check or Handling of Exceptional Conditions | |
| Use After Free | |
| Incomplete Cleanup | |
| Resource Exhaustion | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Race Condition | |
| Use After Free | |
| Out-of-Bounds | |
| Memory Leak | |
| Use After Free | |
| Improper Check for Unusual or Exceptional Conditions | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Validation of Array Index | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Memory Leak | <0:4.18.0-553.52.1.el8_10 |
| Use After Free | |
| Out-of-bounds Write | |
| Memory Leak | |
| Incomplete Cleanup | |
| NULL Pointer Dereference | |
| Improper Validation of Array Index | |
| NULL Pointer Dereference | |
| Incorrect Check of Function Return Value | |
| NULL Pointer Dereference | |
| Use After Free | |
| Missing Release of Resource after Effective Lifetime | |
| Memory Leak | |
| Improper Input Validation | |
| Improper Validation of Array Index | |
| Incomplete Cleanup | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Memory Leak | |
| Improper Control of a Resource Through its Lifetime | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Race Condition | |
| Improper Input Validation | |
| Resource Exhaustion | |
| CVE-2024-35884 | <0:4.18.0-372.126.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.126.1.el8_6 |
| Use After Free | <0:4.18.0-372.126.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.126.1.el8_6 |
| CVE-2024-35884 | <0:4.18.0-372.126.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.126.1.el8_6 |
| Use After Free | <0:4.18.0-372.126.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.126.1.el8_6 |
| CVE-2024-35884 | <0:4.18.0-372.126.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.126.1.el8_6 |
| Use After Free | <0:4.18.0-372.126.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.126.1.el8_6 |
| Return of Wrong Status Code | |
| Use After Free | |
| Use of Uninitialized Resource | |
| Deadlock | |
| Improper Initialization | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| CVE-2024-35884 | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| Return of Wrong Status Code | |
| Use After Free | |
| Use of Uninitialized Resource | |
| Deadlock | |
| Improper Initialization | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| CVE-2024-35884 | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| Return of Wrong Status Code | |
| Use After Free | |
| Use of Uninitialized Resource | |
| Deadlock | |
| Improper Initialization | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| CVE-2024-35884 | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| Return of Wrong Status Code | |
| Use After Free | |
| Use of Uninitialized Resource | |
| Deadlock | |
| Improper Initialization | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| CVE-2024-35884 | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| Resource Injection | |
| Race Condition | |
| Improper Check for Unusual or Exceptional Conditions | |
| Improper Validation of Array Index | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Deadlock | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Deadlock | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Deadlock | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Deadlock | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Deadlock | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Deadlock | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Deadlock | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Deadlock | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Write | |
| Improper Preservation of Permissions | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Write | |
| Improper Preservation of Permissions | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Write | |
| Improper Preservation of Permissions | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Write | |
| Improper Preservation of Permissions | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| NULL Pointer Dereference | <0:4.18.0-372.125.1.el8_6 |
| Race Condition | <0:4.18.0-372.125.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.125.1.el8_6 |
| Race Condition | <0:4.18.0-372.125.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.125.1.el8_6 |
| Race Condition | <0:4.18.0-372.125.1.el8_6 |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Use After Free | <0:4.18.0-553.30.1.el8_10 |
| Use After Free | |
| NULL Pointer Dereference | |
| Race Condition | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Race Condition | |
| Improper Check or Handling of Exceptional Conditions | |
| Missing Release of Resource after Effective Lifetime | |
| NULL Pointer Dereference | |
| Improper Resource Shutdown or Release | |
| Out-of-bounds Read | |
| Double Free | |
| Improper Handling of Length Parameter Inconsistency | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Update of Reference Count | |
| Deadlock | |
| Incomplete Cleanup | |
| Improper Locking | |
| CVE-2024-38573 | |
| Out-of-bounds Write | |
| Untrusted Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| CVE-2024-36005 | |
| CVE-2024-35969 | |
| Race Condition | |
| CVE-2024-27399 | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Unchecked Return Value to NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Race Condition | |
| Out-of-bounds Read | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Attempt to Access Child of a Non-structure Pointer | |
| Trust Boundary Violation | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Input Validation | |
| Improper Handling of Length Parameter Inconsistency | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Update of Reference Count | |
| Deadlock | |
| Incomplete Cleanup | |
| Improper Locking | |
| CVE-2024-38573 | |
| Out-of-bounds Write | |
| Untrusted Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| CVE-2024-36005 | |
| CVE-2024-35969 | |
| Race Condition | |
| CVE-2024-27399 | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Unchecked Return Value to NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Race Condition | |
| Out-of-bounds Read | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Attempt to Access Child of a Non-structure Pointer | |
| Trust Boundary Violation | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Write | <0:4.18.0-372.124.1.el8_6 |
| Improper Initialization | <0:4.18.0-372.124.1.el8_6 |
| Improper Resource Locking | <0:4.18.0-372.124.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.124.1.el8_6 |
| Use After Free | <0:4.18.0-372.124.1.el8_6 |
| Attempt to Access Child of a Non-structure Pointer | <0:4.18.0-372.124.1.el8_6 |
| Improper Handling of Length Parameter Inconsistency | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Update of Reference Count | |
| Deadlock | |
| Incomplete Cleanup | |
| Improper Locking | |
| CVE-2024-38573 | |
| Out-of-bounds Write | |
| Untrusted Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| CVE-2024-36005 | |
| CVE-2024-35969 | |
| Race Condition | |
| CVE-2024-27399 | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Unchecked Return Value to NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Race Condition | |
| Out-of-bounds Read | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Attempt to Access Child of a Non-structure Pointer | |
| Trust Boundary Violation | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Write | <0:4.18.0-372.124.1.el8_6 |
| Improper Initialization | <0:4.18.0-372.124.1.el8_6 |
| Improper Resource Locking | <0:4.18.0-372.124.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.124.1.el8_6 |
| Use After Free | <0:4.18.0-372.124.1.el8_6 |
| Attempt to Access Child of a Non-structure Pointer | <0:4.18.0-372.124.1.el8_6 |
| Improper Handling of Length Parameter Inconsistency | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Update of Reference Count | |
| Deadlock | |
| Incomplete Cleanup | |
| Improper Locking | |
| CVE-2024-38573 | |
| Out-of-bounds Write | |
| Untrusted Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| CVE-2024-36005 | |
| CVE-2024-35969 | |
| Race Condition | |
| CVE-2024-27399 | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Unchecked Return Value to NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Race Condition | |
| Out-of-bounds Read | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Attempt to Access Child of a Non-structure Pointer | |
| Trust Boundary Violation | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Write | <0:4.18.0-372.124.1.el8_6 |
| Improper Initialization | <0:4.18.0-372.124.1.el8_6 |
| Improper Resource Locking | <0:4.18.0-372.124.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.124.1.el8_6 |
| Use After Free | <0:4.18.0-372.124.1.el8_6 |
| Attempt to Access Child of a Non-structure Pointer | <0:4.18.0-372.124.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-305.141.1.el8_4 |
| Use After Free | <0:4.18.0-305.141.1.el8_4 |
| CVE-2024-26993 | <0:4.18.0-305.141.1.el8_4 |
| Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-305.141.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.141.1.el8_4 |
| Use After Free | <0:4.18.0-305.141.1.el8_4 |
| CVE-2024-26993 | <0:4.18.0-305.141.1.el8_4 |
| Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-305.141.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.141.1.el8_4 |
| Use After Free | <0:4.18.0-305.141.1.el8_4 |
| CVE-2024-26993 | <0:4.18.0-305.141.1.el8_4 |
| Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-305.141.1.el8_4 |
| Improper Input Validation | <0:4.18.0-193.141.1.el8_2 |
| Improper Input Validation | <0:4.18.0-193.141.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.141.1.el8_2 |
| Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-193.141.1.el8_2 |
| Incorrect Check of Function Return Value | <0:4.18.0-193.141.1.el8_2 |
| Integer Underflow | <0:4.18.0-193.141.1.el8_2 |
| Resource Injection | <0:4.18.0-193.141.1.el8_2 |
| Stack-based Buffer Overflow | <0:4.18.0-372.123.1.el8_6 |
| Race Condition | <0:4.18.0-372.123.1.el8_6 |
| Race Condition | <0:4.18.0-372.123.1.el8_6 |
| Race Condition | <0:4.18.0-372.123.1.el8_6 |
| Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
| Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
| Double Free | <0:4.18.0-372.123.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.123.1.el8_6 |
| Incomplete Internal State Distinction | <0:4.18.0-372.123.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.123.1.el8_6 |
| Stack-based Buffer Overflow | <0:4.18.0-372.123.1.el8_6 |
| Race Condition | <0:4.18.0-372.123.1.el8_6 |
| Race Condition | <0:4.18.0-372.123.1.el8_6 |
| Race Condition | <0:4.18.0-372.123.1.el8_6 |
| Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
| Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
| Double Free | <0:4.18.0-372.123.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.123.1.el8_6 |
| Incomplete Internal State Distinction | <0:4.18.0-372.123.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.123.1.el8_6 |
| Stack-based Buffer Overflow | <0:4.18.0-372.123.1.el8_6 |
| Race Condition | <0:4.18.0-372.123.1.el8_6 |
| Race Condition | <0:4.18.0-372.123.1.el8_6 |
| Race Condition | <0:4.18.0-372.123.1.el8_6 |
| Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
| Improper Handling of Values | <0:4.18.0-372.123.1.el8_6 |
| Double Free | <0:4.18.0-372.123.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.123.1.el8_6 |
| Incomplete Internal State Distinction | <0:4.18.0-372.123.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.123.1.el8_6 |
| Race Condition | |
| Use After Free | |
| Link Following | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Use After Free | |
| Use After Free | |
| Stack-based Buffer Overflow | |
| Integer Overflow or Wraparound | |
| Race Condition | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Locking | |
| Use After Free | |
| NULL Pointer Dereference | |
| Integer Underflow | |
| Integer Underflow | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Unchecked Return Value | |
| NULL Pointer Dereference | |
| Improper Initialization | |
| Out-of-bounds Read | |
| Buffer Overflow | |
| Uncontrolled Recursion | |
| NULL Pointer Dereference | |
| Operation on Resource in Wrong Phase of Lifetime | |
| Use After Free | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Unchecked Return Value | |
| Double Free | |
| Race Condition | |
| Improper Authentication | <0:4.18.0-553.32.1.el8_10 |
| Improper Locking | |
| Improper Synchronization | |
| Time-of-check Time-of-use (TOCTOU) | |
| Improper Initialization | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Use of Uninitialized Variable | |
| NULL Pointer Dereference | |
| Insufficient Control Flow Management | |
| Improper Control of a Resource Through its Lifetime | |
| Improper Locking | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Deadlock | |
| Improper Initialization | |
| Improper Locking | |
| Improper Initialization | |
| Improper Locking | |
| Race Condition | |
| NULL Pointer Dereference | |
| Out-of-Bounds | <0:4.18.0-553.53.1.el8_10 |
| Use After Free | |
| Out-of-bounds Write | |
| Uncontrolled Memory Allocation | |
| Use After Free | |
| Use After Free | |
| Improper Check or Handling of Exceptional Conditions | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
| Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
| Deadlock | <0:4.18.0-305.139.1.el8_4 |
| Resource Injection | <0:4.18.0-305.139.1.el8_4 |
| Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
| Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
| Deadlock | <0:4.18.0-305.139.1.el8_4 |
| Resource Injection | <0:4.18.0-305.139.1.el8_4 |
| Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
| Improper Input Validation | <0:4.18.0-305.139.1.el8_4 |
| Deadlock | <0:4.18.0-305.139.1.el8_4 |
| Resource Injection | <0:4.18.0-305.139.1.el8_4 |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Reachable Assertion | |
| Integer Overflow or Wraparound | |
| Divide By Zero | |
| Use After Free | |
| Out-of-bounds Read | |
| Missing Release of Resource after Effective Lifetime | |
| Use After Free | |
| Memory Leak | |
| Excessive Iteration | |
| Resource Leak | |
| Improper Input Validation | |
| Double Free | <0:4.18.0-553.58.1.el8_10 |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Operation on a Resource after Expiration or Release | |
| NULL Pointer Dereference | |
| Use After Free | |
| Memory Leak | |
| Memory Leak | |
| Time-of-check Time-of-use (TOCTOU) | |
| Buffer Overflow | |
| Race Condition | |
| Double Free | |
| NULL Pointer Dereference | |
| Resource Leak | <0:4.18.0-553.22.1.el8_10 |
| Deadlock | |
| NULL Pointer Dereference | |
| Incorrect Privilege Assignment | |
| Resource Leak | |
| Time-of-check Time-of-use (TOCTOU) | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Resource Injection | |
| Use After Free | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Incorrect Calculation of Buffer Size | |
| NULL Pointer Dereference | |
| Resource Leak | |
| Use After Free | |
| Improper Validation of Array Index | <0:4.18.0-553.54.1.el8_10 |
| Improper Locking | |
| Improper Handling of Length Parameter Inconsistency | |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| Multiple Locks of a Critical Resource | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Resource Injection | |
| CVE-2024-42322 | <0:4.18.0-553.22.1.el8_10 |
| Information Exposure | |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| Race Condition | |
| NULL Pointer Dereference | |
| Reachable Assertion | |
| NULL Pointer Dereference | |
| CVE-2024-42304 | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Deadlock | |
| Use After Free | <0:4.18.0-193.138.1.el8_2 |
| Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
| Memory Leak | <0:4.18.0-372.118.1.el8_6 |
| CVE-2024-21823 | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| CVE-2023-52881 | <0:4.18.0-372.118.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Incorrect Check of Function Return Value | <0:4.18.0-372.118.1.el8_6 |
| Integer Underflow | <0:4.18.0-372.118.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Trust Boundary Violation | <0:4.18.0-372.118.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
| Memory Leak | <0:4.18.0-372.118.1.el8_6 |
| CVE-2024-21823 | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| CVE-2023-52881 | <0:4.18.0-372.118.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Incorrect Check of Function Return Value | <0:4.18.0-372.118.1.el8_6 |
| Integer Underflow | <0:4.18.0-372.118.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Trust Boundary Violation | <0:4.18.0-372.118.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
| Memory Leak | <0:4.18.0-372.118.1.el8_6 |
| CVE-2024-21823 | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| CVE-2023-52881 | <0:4.18.0-372.118.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Incorrect Check of Function Return Value | <0:4.18.0-372.118.1.el8_6 |
| Integer Underflow | <0:4.18.0-372.118.1.el8_6 |
| Out-of-bounds Read | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Trust Boundary Violation | <0:4.18.0-372.118.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-372.118.1.el8_6 |
| Use After Free | <0:4.18.0-305.138.1.el8_4 |
| Use After Free | <0:4.18.0-305.138.1.el8_4 |
| CVE-2024-36005 | <0:4.18.0-305.138.1.el8_4 |
| Incorrect Check of Function Return Value | <0:4.18.0-305.138.1.el8_4 |
| Integer Underflow | <0:4.18.0-305.138.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.138.1.el8_4 |
| Use After Free | <0:4.18.0-305.138.1.el8_4 |
| Use After Free | <0:4.18.0-305.138.1.el8_4 |
| CVE-2024-36005 | <0:4.18.0-305.138.1.el8_4 |
| Incorrect Check of Function Return Value | <0:4.18.0-305.138.1.el8_4 |
| Integer Underflow | <0:4.18.0-305.138.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.138.1.el8_4 |
| Use After Free | <0:4.18.0-305.138.1.el8_4 |
| Use After Free | <0:4.18.0-305.138.1.el8_4 |
| CVE-2024-36005 | <0:4.18.0-305.138.1.el8_4 |
| Incorrect Check of Function Return Value | <0:4.18.0-305.138.1.el8_4 |
| Integer Underflow | <0:4.18.0-305.138.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.138.1.el8_4 |
| Loop with Unreachable Exit Condition ('Infinite Loop') | <0:4.18.0-553.22.1.el8_10 |
| Race Condition | |
| Improper Clearing of Heap Memory Before Release ('Heap Inspection') | |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | <0:4.18.0-372.115.1.el8_6 |
| Resource Leak | <0:4.18.0-372.115.1.el8_6 |
| Reachable Assertion | <0:4.18.0-372.115.1.el8_6 |
| CVE-2024-35789 | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Incomplete Cleanup | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Race Condition | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Deadlock | <0:4.18.0-372.115.1.el8_6 |
| Improper Check for Unusual or Exceptional Conditions | <0:4.18.0-372.115.1.el8_6 |
| Use After Free | <0:4.18.0-372.115.1.el8_6 |
| Resource Leak | <0:4.18.0-372.115.1.el8_6 |
| Reachable Assertion | <0:4.18.0-372.115.1.el8_6 |
| CVE-2024-35789 | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Incomplete Cleanup | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Race Condition | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Deadlock | <0:4.18.0-372.115.1.el8_6 |
| Improper Check for Unusual or Exceptional Conditions | <0:4.18.0-372.115.1.el8_6 |
| Use After Free | <0:4.18.0-372.115.1.el8_6 |
| Resource Leak | <0:4.18.0-372.115.1.el8_6 |
| Reachable Assertion | <0:4.18.0-372.115.1.el8_6 |
| CVE-2024-35789 | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Incomplete Cleanup | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Race Condition | <0:4.18.0-372.115.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.115.1.el8_6 |
| Deadlock | <0:4.18.0-372.115.1.el8_6 |
| Improper Check for Unusual or Exceptional Conditions | <0:4.18.0-372.115.1.el8_6 |
| Use of Uninitialized Variable | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| Improper Handling of Length Parameter Inconsistency | <0:4.18.0-553.22.1.el8_10 |
| Unchecked Return Value | |
| Static Code Injection | <0:4.18.0-553.22.1.el8_10 |
| Buffer Overflow | |
| Deadlock | |
| Resource Injection | |
| Out-of-bounds Write | <0:4.18.0-553.22.1.el8_10 |
| Use of Uninitialized Resource | |
| Unchecked Return Value | |
| NULL Pointer Dereference | |
| Improper Validation of Array Index | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Improper Input Validation | |
| Improper Control of Document Type Definition | |
| Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
| Integer Overflow or Wraparound | |
| Buffer Overflow | |
| Heap-based Buffer Overflow | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | |
| Race Condition | |
| Incomplete Internal State Distinction | |
| Heap-based Buffer Overflow | <0:4.18.0-553.22.1.el8_10 |
| Deadlock | |
| Allocation of Resources Without Limits or Throttling | |
| Incomplete Internal State Distinction | |
| Use of Uninitialized Resource | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Out-of-bounds Write | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | |
| Out-of-bounds Write | <0:4.18.0-553.22.1.el8_10 |
| Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
| Double Free | |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| Allocation of Resources Without Limits or Throttling | |
| NULL Pointer Dereference | |
| Double Free | |
| NULL Pointer Dereference | |
| Use of Uninitialized Variable | |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| Memory Leak | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| Resource Exhaustion | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Improper Update of Reference Count | <0:4.18.0-553.22.1.el8_10 |
| Untrusted Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Use of Uninitialized Variable | <0:4.18.0-553.22.1.el8_10 |
| Improper Input Validation | |
| Memory Leak | <0:4.18.0-553.22.1.el8_10 |
| Improper Resource Locking | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Improper Resource Shutdown or Release | <0:4.18.0-553.22.1.el8_10 |
| Access of Uninitialized Pointer | |
| Integer Overflow or Wraparound | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| Incomplete Internal State Distinction | <0:4.18.0-553.22.1.el8_10 |
| Resource Leak | |
| NULL Pointer Dereference | |
| Deadlock | <0:4.18.0-553.22.1.el8_10 |
| Improper Resource Locking | |
| Unchecked Return Value | |
| Race Condition | <0:4.18.0-372.113.1.el8_6 |
| Untrusted Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
| Deadlock | <0:4.18.0-372.113.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.113.1.el8_6 |
| Race Condition | <0:4.18.0-372.113.1.el8_6 |
| CVE-2024-35960 | <0:4.18.0-372.113.1.el8_6 |
| Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
| Use After Free | <0:4.18.0-372.113.1.el8_6 |
| Heap-based Buffer Overflow | <0:4.18.0-372.113.1.el8_6 |
| Resource Injection | <0:4.18.0-372.113.1.el8_6 |
| Double Free | <0:4.18.0-372.113.1.el8_6 |
| Buffer Underflow | <0:4.18.0-372.113.1.el8_6 |
| Improper Validation of Array Index | <0:4.18.0-372.113.1.el8_6 |
| Race Condition | <0:4.18.0-372.113.1.el8_6 |
| Untrusted Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
| Deadlock | <0:4.18.0-372.113.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.113.1.el8_6 |
| Race Condition | <0:4.18.0-372.113.1.el8_6 |
| CVE-2024-35960 | <0:4.18.0-372.113.1.el8_6 |
| Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
| Use After Free | <0:4.18.0-372.113.1.el8_6 |
| Heap-based Buffer Overflow | <0:4.18.0-372.113.1.el8_6 |
| Resource Injection | <0:4.18.0-372.113.1.el8_6 |
| Double Free | <0:4.18.0-372.113.1.el8_6 |
| Buffer Underflow | <0:4.18.0-372.113.1.el8_6 |
| Improper Validation of Array Index | <0:4.18.0-372.113.1.el8_6 |
| Race Condition | <0:4.18.0-372.113.1.el8_6 |
| Untrusted Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
| Deadlock | <0:4.18.0-372.113.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.113.1.el8_6 |
| Race Condition | <0:4.18.0-372.113.1.el8_6 |
| CVE-2024-35960 | <0:4.18.0-372.113.1.el8_6 |
| Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-372.113.1.el8_6 |
| Use After Free | <0:4.18.0-372.113.1.el8_6 |
| Heap-based Buffer Overflow | <0:4.18.0-372.113.1.el8_6 |
| Resource Injection | <0:4.18.0-372.113.1.el8_6 |
| Double Free | <0:4.18.0-372.113.1.el8_6 |
| Buffer Underflow | <0:4.18.0-372.113.1.el8_6 |
| Improper Validation of Array Index | <0:4.18.0-372.113.1.el8_6 |
| Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
| Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| CVE-2024-21823 | <0:4.18.0-305.134.1.el8_4 |
| Race Condition | <0:4.18.0-305.134.1.el8_4 |
| CVE-2024-21823 | <0:4.18.0-305.134.1.el8_4 |
| Race Condition | <0:4.18.0-305.134.1.el8_4 |
| CVE-2024-21823 | <0:4.18.0-305.134.1.el8_4 |
| Race Condition | <0:4.18.0-305.134.1.el8_4 |
| Race Condition | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| Improper Synchronization | |
| Out-of-bounds Write | <0:4.18.0-553.22.1.el8_10 |
| Integer Overflow or Wraparound | |
| Race Condition | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Use of Uninitialized Resource | <0:4.18.0-553.22.1.el8_10 |
| Resource Exhaustion | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | |
| Untrusted Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | |
| Deadlock | <0:4.18.0-553.22.1.el8_10 |
| Expired Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Deadlock | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| Return of Wrong Status Code | |
| Deadlock | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Expired Pointer Dereference | |
| Use After Free | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | <0:4.18.0-553.53.1.el8_10 |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| Resource Injection | |
| Improper Locking | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Deadlock | <0:4.18.0-553.22.1.el8_10 |
| Out-of-bounds Read | |
| Integer Overflow or Wraparound | |
| Memory Leak | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Resource Injection | |
| Resource Leak | |
| Incorrect Check of Function Return Value | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Initialization | |
| Out-of-bounds Read | |
| CVE-2022-48834 | |
| NULL Pointer Dereference | |
| Use After Free | |
| Race Condition | |
| Use After Free | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| CVE-2022-48849 | |
| Race Condition | |
| Incorrect Check of Function Return Value | |
| Missing Lock Check | |
| Non-exit on Failed Initialization | |
| NULL Pointer Dereference | |
| Integer Underflow | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | |
| Resource Management Errors | |
| Race Condition | |
| Memory Leak | |
| Use After Free | |
| Release of Invalid Pointer or Reference | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Read | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| CVE-2022-48836 | <0:4.18.0-553.22.1.el8_10 |
| Deadlock | |
| CVE-2022-48802 | |
| Integer Underflow | |
| Improper Update of Reference Count | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Race Condition | <0:4.18.0-193.136.1.el8_2 |
| Out-of-Bounds | <0:4.18.0-553.22.1.el8_10 |
| Resource Leak | <0:4.18.0-553.22.1.el8_10 |
| Race Condition | <0:4.18.0-553.22.1.el8_10 |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| CVE-2024-40901 | <0:4.18.0-553.22.1.el8_10 |
| Reachable Assertion | |
| NULL Pointer Dereference | |
| CVE-2024-39488 | |
| Resource Leak | |
| Stack-based Buffer Overflow | |
| NULL Pointer Dereference | |
| Use After Free | |
| Covert Timing Channel | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Improper Initialization | |
| Resource Injection | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Double Free | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | |
| Use After Free | |
| NULL Pointer Dereference | |
| Incomplete Cleanup | |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| Deadlock | |
| Out-of-bounds Read | |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | |
| Improper Initialization | <0:4.18.0-553.22.1.el8_10 |
| CVE-2024-38580 | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Race Condition | |
| Improper Initialization | <0:4.18.0-553.30.1.el8_10 |
| Out-of-Bounds | |
| Improper Resource Locking | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Incomplete Cleanup | |
| Out-of-bounds Write | |
| Unchecked Return Value | |
| CVE-2022-48752 | |
| Sequence of Processor Instructions Leads to Unexpected Behavior | |
| NULL Pointer Dereference | |
| Incomplete Internal State Distinction | |
| NULL Pointer Dereference | |
| Improper Resource Shutdown or Release | |
| Use After Free | |
| Missing Synchronization | <0:4.18.0-553.22.1.el8_10 |
| Missing Initialization of Resource | |
| Resource Leak | |
| Resource Leak | |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| Improper Input Validation | |
| Race Condition | |
| Out-of-bounds Read | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Memory Leak | |
| Resource Leak | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Memory Leak | |
| Out-of-bounds Read | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Null Termination | |
| Out-of-bounds Write | |
| Use of Uninitialized Variable | <0:4.18.0-553.22.1.el8_10 |
| Out-of-bounds Read | |
| Stack-based Buffer Overflow | |
| Use After Free | |
| Divide By Zero | |
| Resource Leak | |
| Allocation of Resources Without Limits or Throttling | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Improper Input Validation | |
| CVE-2021-47607 | |
| Use After Free | |
| Out-of-bounds Write | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | |
| Deadlock | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Release of Invalid Pointer or Reference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Out-of-bounds Write | |
| Resource Exhaustion | |
| Deadlock | |
| Improper Locking | <0:4.18.0-553.22.1.el8_10 |
| Improper Update of Reference Count | |
| Integer Overflow or Wraparound | |
| Improper Locking | |
| Resource Injection | |
| Resource Injection | |
| CVE-2024-26602 | |
| Out-of-bounds Write | |
| CVE-2024-25743 | |
| CVE-2024-25742 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Race Condition | |
| Sensitive Information Uncleared Before Release | |
| Use After Free | |
| Use After Free | |
| Resource Injection | |
| CVE-2024-26602 | |
| Out-of-bounds Write | |
| CVE-2024-25743 | |
| CVE-2024-25742 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Race Condition | |
| Sensitive Information Uncleared Before Release | |
| Use After Free | |
| Use After Free | |
| Resource Injection | |
| CVE-2024-26602 | |
| Out-of-bounds Write | |
| CVE-2024-25743 | |
| CVE-2024-25742 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Race Condition | |
| Sensitive Information Uncleared Before Release | |
| Use After Free | |
| Use After Free | |
| Use After Free | <0:4.18.0-372.107.1.el8_6 |
| Race Condition | <0:4.18.0-372.107.1.el8_6 |
| Time-of-check Time-of-use (TOCTOU) | <0:4.18.0-372.107.1.el8_6 |
| Use After Free | <0:4.18.0-372.107.1.el8_6 |
| Race Condition | <0:4.18.0-372.107.1.el8_6 |
| Time-of-check Time-of-use (TOCTOU) | <0:4.18.0-372.107.1.el8_6 |
| Resource Injection | |
| CVE-2024-26602 | |
| Out-of-bounds Write | |
| CVE-2024-25743 | |
| CVE-2024-25742 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Race Condition | |
| Sensitive Information Uncleared Before Release | |
| Use After Free | |
| Use After Free | |
| Use After Free | <0:4.18.0-372.107.1.el8_6 |
| Race Condition | <0:4.18.0-372.107.1.el8_6 |
| Time-of-check Time-of-use (TOCTOU) | <0:4.18.0-372.107.1.el8_6 |
| Stack-based Buffer Overflow | |
| Use After Free | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Incomplete Cleanup | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Use After Free | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Out-of-Bounds | |
| Use After Free | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Race Condition | |
| Resource Leak | |
| Resource Leak | |
| Resource Leak | |
| Use After Free | |
| Resource Leak | |
| Resource Injection | |
| Improper Locking | |
| Improper Neutralization of Null Byte or NUL Character | <0:4.18.0-553.22.1.el8_10 |
| Resource Leak | |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| Race Condition | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Improper Locking | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Improper Resource Locking | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Resource Leak | |
| CVE-2024-36920 | <0:4.18.0-553.22.1.el8_10 |
| Out-of-Bounds | |
| Improper Initialization | |
| Out-of-bounds Write | <0:4.18.0-553.22.1.el8_10 |
| Use of Uninitialized Resource | |
| Deadlock | |
| Improper Preservation of Permissions | |
| Leftover Debug Code | |
| Deadlock | |
| Resource Injection | |
| Use After Free | <0:4.18.0-305.131.1.el8_4 |
| Race Condition | <0:4.18.0-305.131.1.el8_4 |
| Use After Free | <0:4.18.0-305.131.1.el8_4 |
| Race Condition | <0:4.18.0-305.131.1.el8_4 |
| Use After Free | <0:4.18.0-305.131.1.el8_4 |
| Race Condition | <0:4.18.0-305.131.1.el8_4 |
| Use After Free | <0:4.18.0-193.135.1.el8_2 |
| Race Condition | <0:4.18.0-193.135.1.el8_2 |
| Out-of-bounds Read | <0:4.18.0-193.135.1.el8_2 |
| NULL Pointer Dereference | <0:4.18.0-193.135.1.el8_2 |
| Stack-based Buffer Overflow | |
| CVE-2023-52881 | |
| Improper Validation of Array Index | |
| Race Condition | <0:4.18.0-372.105.1.el8_6 |
| Sensitive Information Uncleared Before Release | <0:4.18.0-372.105.1.el8_6 |
| Use After Free | <0:4.18.0-372.105.1.el8_6 |
| Race Condition | <0:4.18.0-372.105.1.el8_6 |
| Sensitive Information Uncleared Before Release | <0:4.18.0-372.105.1.el8_6 |
| Use After Free | <0:4.18.0-372.105.1.el8_6 |
| Race Condition | <0:4.18.0-372.105.1.el8_6 |
| Sensitive Information Uncleared Before Release | <0:4.18.0-372.105.1.el8_6 |
| Use After Free | <0:4.18.0-372.105.1.el8_6 |
| Race Condition | <0:4.18.0-372.105.1.el8_6 |
| Sensitive Information Uncleared Before Release | <0:4.18.0-372.105.1.el8_6 |
| Use After Free | <0:4.18.0-372.105.1.el8_6 |
| Deadlock | |
| Use After Free | |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Resource Injection | |
| Information Exposure | |
| Out-of-Bounds | |
| Deadlock | |
| Use of Uninitialized Variable | |
| Improper Update of Reference Count | |
| NULL Pointer Dereference | |
| Resource Management Errors | |
| Memory Leak | |
| Use After Free | |
| CVE-2021-47441 | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Race Condition | |
| Time-of-check Time-of-use (TOCTOU) | |
| Trust Boundary Violation | |
| Deadlock | |
| NULL Pointer Dereference | |
| Race Condition | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Resource Exhaustion | <0:4.18.0-553.22.1.el8_10 |
| Improper Resource Shutdown or Release | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Resource Leak | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| Resource Injection | |
| Resource Leak | |
| Memory Leak | |
| Resource Exhaustion | |
| Resource Injection | |
| Resource Leak | |
| Use After Free | |
| Improper Initialization | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Leak | |
| Race Condition | |
| Deadlock | |
| Improper Locking | |
| Use of Incorrectly-Resolved Name or Reference | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Resource Leak | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Time-of-check Time-of-use (TOCTOU) | |
| NULL Pointer Dereference | |
| Use After Free | |
| Resource Injection | |
| Use After Free | |
| Improper Input Validation | |
| Memory Leak | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| CVE-2021-47265 | |
| Range Error | |
| Resource Leak | |
| Resource Leak | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Divide By Zero | |
| Improper Input Validation | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Improper Input Validation | |
| Divide By Zero | |
| Divide By Zero | |
| Improper Input Validation | |
| Divide By Zero | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Improper Validation of Array Index | |
| Deadlock | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| Improper Input Validation | |
| Improper Resource Locking | <0:4.18.0-553.22.1.el8_10 |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Memory Leak | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Out-of-bounds Read | |
| External Control of System or Configuration Setting | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Double Free | |
| NULL Pointer Dereference | |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Validation of Array Index | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Integer Underflow | |
| Improper Resource Shutdown or Release | |
| NULL Pointer Dereference | |
| Stack-based Buffer Overflow | |
| Improper Initialization | |
| Double Free | |
| Improper Initialization | |
| Use After Free | |
| Improper Locking | |
| Improper Locking | |
| Incomplete Internal State Distinction | |
| Resource Management Errors | |
| Missing Initialization of a Variable | |
| Resource Injection | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Resource Leak | <0:4.18.0-553.22.1.el8_10 |
| Divide By Zero | |
| Improper Resource Shutdown or Release | |
| Memory Leak | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | |
| Resource Leak | |
| Improper Locking | |
| Improper Check for Unusual or Exceptional Conditions | <0:4.18.0-553.22.1.el8_10 |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Input Validation | |
| Memory Leak | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Memory Leak | |
| Release of Invalid Pointer or Reference | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Resource Injection | |
| NULL Pointer Dereference | |
| CVE-2021-47327 | |
| Stack-based Buffer Overflow | |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | |
| CVE-2021-47376 | |
| Resource Leak | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Resource Leak | |
| NULL Pointer Dereference | |
| Error Handling | <0:4.18.0-553.22.1.el8_10 |
| Resource Leak | |
| Memory Leak | |
| Access of Uninitialized Pointer | |
| Integer Overflow or Wraparound | <0:4.18.0-553.22.1.el8_10 |
| Resource Leak | |
| Improper Locking | |
| Use After Free | |
| Improper Initialization | |
| Use After Free | |
| Deadlock | |
| Resource Leak | |
| Resource Leak | |
| Incomplete Cleanup | |
| Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
| Logging of Excessive Data | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | |
| Improper Validation of Specified Quantity in Input | |
| CVE-2024-35944 | <0:4.18.0-553.22.1.el8_10 |
| CVE-2024-35884 | <0:4.18.0-553.22.1.el8_10 |
| CVE-2024-35860 | |
| Incomplete Cleanup | |
| CVE-2024-35976 | |
| Memory Leak | |
| CVE-2024-35989 | <0:4.18.0-553.22.1.el8_10 |
| CVE-2024-35934 | |
| NULL Pointer Dereference | |
| CVE-2024-36007 | |
| Improper Validation of Specified Quantity in Input | |
| CVE-2024-35995 | |
| CVE-2024-36004 | |
| CVE-2024-35983 | |
| Reachable Assertion | |
| CVE-2024-35961 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| CVE-2024-35877 | <0:4.18.0-553.22.1.el8_10 |
| CVE-2024-35958 | |
| CVE-2024-35969 | |
| Out-of-bounds Read | |
| CVE-2024-35960 | |
| CVE-2024-35967 | |
| CVE-2024-35950 | |
| Divide By Zero | |
| CVE-2024-35875 | |
| CVE-2024-35886 | |
| Improper Locking | |
| Use of Uninitialized Resource | |
| Memory Leak | |
| CVE-2024-35931 | |
| NULL Pointer Dereference | |
| CVE-2024-35927 | |
| CVE-2024-35890 | |
| CVE-2024-35928 | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Improper Locking | |
| CVE-2024-35803 | |
| CVE-2024-35789 | |
| CVE-2024-35843 | |
| Double Free | |
| Improper Input Validation | |
| Memory Leak | |
| Memory Leak | |
| Use After Free | |
| CVE-2024-35840 | |
| Memory Leak | |
| CVE-2024-35854 | |
| CVE-2024-35817 | |
| CVE-2024-35791 | |
| CVE-2024-35805 | |
| CVE-2024-35794 | |
| CVE-2024-35809 | <0:4.18.0-553.22.1.el8_10 |
| CVE-2024-35802 | |
| CVE-2024-27431 | |
| Race Condition | |
| CVE-2024-27436 | |
| Improper Locking | |
| CVE-2024-27413 | |
| CVE-2024-27410 | |
| CVE-2024-27403 | |
| CVE-2024-27417 | |
| CVE-2023-52669 | |
| Memory Leak | |
| CVE-2023-52697 | |
| Double Free | |
| CVE-2023-52686 | |
| Double Free | |
| CVE-2023-52675 | |
| Unchecked Return Value | |
| Integer Overflow or Wraparound | |
| CVE-2023-52683 | <0:4.18.0-553.22.1.el8_10 |
| Improper Locking | |
| CVE-2023-52674 | |
| Directory Traversal | |
| CVE-2024-27398 | |
| Use After Free | |
| CVE-2024-27399 | <0:4.18.0-553.30.1.el8_10 |
| Directory Traversal | |
| Use After Free | |
| Use After Free | <0:4.18.0-553.30.1.el8_10 |
| Memory Leak | |
| Use After Free | |
| CVE-2022-48694 | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2022-48705 | |
| NULL Pointer Dereference | |
| Off-by-one Error | |
| NULL Pointer Dereference | |
| CVE-2022-48704 | |
| CVE-2022-48702 | |
| Improper Handling of Exceptional Conditions | |
| CVE-2022-48696 | |
| Memory Leak | |
| Out-of-bounds Write | <0:4.18.0-372.102.1.el8_6 |
| Authentication Bypass | <0:4.18.0-372.102.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.102.1.el8_6 |
| Authentication Bypass | <0:4.18.0-372.102.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.102.1.el8_6 |
| Authentication Bypass | <0:4.18.0-372.102.1.el8_6 |
| Out-of-bounds Write | <0:4.18.0-372.102.1.el8_6 |
| Authentication Bypass | <0:4.18.0-372.102.1.el8_6 |
| Out-of-bounds Read | |
| CVE-2024-27052 | |
| Improper Locking | |
| NULL Pointer Dereference | |
| Time-of-check Time-of-use (TOCTOU) | |
| Improper Locking | |
| CVE-2024-26938 | |
| Divide By Zero | |
| CVE-2024-26999 | |
| CVE-2024-26935 | <0:4.18.0-553.37.1.el8_10 |
| CVE-2024-27023 | |
| CVE-2024-27075 | |
| Improper Validation of Array Index | <0:4.18.0-553.22.1.el8_10 |
| Double Free | |
| CVE-2024-27056 | |
| CVE-2024-27055 | |
| Double Free | <0:4.18.0-553.16.1.el8_10 |
| CVE-2024-27004 | |
| CVE-2024-26939 | <0:4.18.0-553.22.1.el8_10 |
| Improper Locking | |
| CVE-2024-27057 | |
| Allocation of Resources Without Limits or Throttling | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| CVE-2024-26993 | |
| Memory Leak | |
| CVE-2024-26973 | |
| Race Condition | |
| Improper Locking | |
| NULL Pointer Dereference | <0:4.18.0-553.16.1.el8_10 |
| Memory Leak | |
| Improper Neutralization of Null Byte or NUL Character | |
| Use After Free | |
| Stack-based Buffer Overflow | |
| CVE-2024-25744 | |
| Race Condition | |
| Access of Uninitialized Pointer | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| CVE-2024-25744 | |
| Race Condition | |
| Access of Uninitialized Pointer | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| CVE-2024-25744 | |
| Race Condition | |
| Access of Uninitialized Pointer | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| CVE-2024-25744 | |
| Race Condition | |
| Access of Uninitialized Pointer | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| CVE-2024-26602 | <0:4.18.0-305.130.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.130.1.el8_4 |
| Use After Free | <0:4.18.0-305.130.1.el8_4 |
| Divide By Zero | <0:4.18.0-305.130.1.el8_4 |
| CVE-2024-26602 | <0:4.18.0-305.130.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.130.1.el8_4 |
| Use After Free | <0:4.18.0-305.130.1.el8_4 |
| Divide By Zero | <0:4.18.0-305.130.1.el8_4 |
| CVE-2024-26602 | <0:4.18.0-305.130.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.130.1.el8_4 |
| Use After Free | <0:4.18.0-305.130.1.el8_4 |
| Divide By Zero | <0:4.18.0-305.130.1.el8_4 |
| Deadlock | |
| Integer Underflow | |
| NULL Pointer Dereference | |
| Reachable Assertion | |
| Use After Free | |
| Integer Underflow | |
| Incomplete Internal State Distinction | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| Reachable Assertion | |
| CVE-2022-48662 | |
| Improper Handling of Values | |
| Modules with Circular Dependencies | |
| Attempt to Access Child of a Non-structure Pointer | |
| Resource Exhaustion | |
| Improper Resource Shutdown or Release | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Validation of Specified Index, Position, or Offset in Input | |
| Race Condition | <0:4.18.0-553.22.1.el8_10 |
| Race Condition | |
| Improper Input Validation | |
| Use After Free | |
| NULL Pointer Dereference | |
| Race Condition | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Leak | |
| CVE-2024-26602 | <0:4.18.0-193.133.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.133.1.el8_2 |
| Memory Leak | <0:4.18.0-193.133.1.el8_2 |
| NULL Pointer Dereference | <0:4.18.0-193.133.1.el8_2 |
| Use After Free | <0:4.18.0-193.133.1.el8_2 |
| Use After Free | <0:4.18.0-193.133.1.el8_2 |
| Divide By Zero | <0:4.18.0-193.133.1.el8_2 |
| CVE-2024-26602 | <0:4.18.0-193.133.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.133.1.el8_2 |
| Memory Leak | <0:4.18.0-193.133.1.el8_2 |
| NULL Pointer Dereference | <0:4.18.0-193.133.1.el8_2 |
| Use After Free | <0:4.18.0-193.133.1.el8_2 |
| Use After Free | <0:4.18.0-193.133.1.el8_2 |
| Divide By Zero | <0:4.18.0-193.133.1.el8_2 |
| CVE-2024-26602 | <0:4.18.0-193.133.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.133.1.el8_2 |
| Memory Leak | <0:4.18.0-193.133.1.el8_2 |
| NULL Pointer Dereference | <0:4.18.0-193.133.1.el8_2 |
| Use After Free | <0:4.18.0-193.133.1.el8_2 |
| Use After Free | <0:4.18.0-193.133.1.el8_2 |
| Divide By Zero | <0:4.18.0-193.133.1.el8_2 |
| Use After Free | |
| Buffer Overflow | |
| Resource Leak | |
| Improper Locking | |
| Memory Leak | <0:4.18.0-553.22.1.el8_10 |
| Unchecked Return Value to NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Integer Underflow | |
| Improper Input Validation | |
| Improper Input Validation | |
| Resource Injection | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Stack-based Buffer Overflow | |
| Race Condition | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | <0:4.18.0-553.22.1.el8_10 |
| CVE-2024-26919 | |
| Resource Leak | |
| Race Condition | |
| Race Condition | |
| Improper Input Validation | |
| Divide By Zero | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| Access of Uninitialized Pointer | <0:4.18.0-372.100.1.el8_6 |
| Use After Free | <0:4.18.0-372.100.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.100.1.el8_6 |
| Use After Free | <0:4.18.0-372.100.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.100.1.el8_6 |
| Exposure of Resource to Wrong Sphere | <0:4.18.0-372.100.1.el8_6 |
| Improper Input Validation | |
| Stack-based Buffer Overflow | |
| Access of Uninitialized Pointer | <0:4.18.0-372.100.1.el8_6 |
| Use After Free | <0:4.18.0-372.100.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.100.1.el8_6 |
| Use After Free | <0:4.18.0-372.100.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.100.1.el8_6 |
| Exposure of Resource to Wrong Sphere | <0:4.18.0-372.100.1.el8_6 |
| Access of Uninitialized Pointer | <0:4.18.0-372.100.1.el8_6 |
| Use After Free | <0:4.18.0-372.100.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.100.1.el8_6 |
| Use After Free | <0:4.18.0-372.100.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.100.1.el8_6 |
| Exposure of Resource to Wrong Sphere | <0:4.18.0-372.100.1.el8_6 |
| Access of Uninitialized Pointer | <0:4.18.0-372.100.1.el8_6 |
| Use After Free | <0:4.18.0-372.100.1.el8_6 |
| NULL Pointer Dereference | <0:4.18.0-372.100.1.el8_6 |
| Use After Free | <0:4.18.0-372.100.1.el8_6 |
| Improper Input Validation | <0:4.18.0-372.100.1.el8_6 |
| Exposure of Resource to Wrong Sphere | <0:4.18.0-372.100.1.el8_6 |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Resource Leak | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Improper Neutralization of Null Byte or NUL Character | |
| Use After Free | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Excessive Platform Resource Consumption within a Loop | |
| Improper Input Validation | |
| Improper Input Validation | |
| Buffer Access with Incorrect Length Value | |
| Use After Free | |
| Unchecked Return Value to NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Use After Free | |
| Incomplete Cleanup | |
| Double Free | |
| CVE-2024-26804 | |
| Race Condition | |
| Deadlock | |
| Improper Handling of Undefined Parameters | |
| Resource Injection | |
| Race Condition | |
| Improper Input Validation | |
| Improper Null Termination | |
| Use After Free | |
| NULL Pointer Dereference | |
| Improper Null Termination | |
| Improper Input Validation | |
| Stack-based Buffer Overflow | |
| Write-what-where Condition | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Input Validation | |
| Unchecked Input for Loop Condition | |
| NULL Pointer Dereference | |
| Deadlock | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Deadlock | <0:4.18.0-553.22.1.el8_10 |
| Incomplete Cleanup | |
| Double Free | |
| Race Condition | |
| Improper Input Validation | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Improper Resource Locking | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Resource Injection | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Locking | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | |
| Resource Injection | |
| Improper Resource Locking | |
| Out-of-bounds Read | |
| Race Condition | <0:4.18.0-553.22.1.el8_10 |
| Resource Injection | |
| Resource Injection | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Use After Free | |
| Out-of-bounds Read | |
| Resource Injection | |
| Resource Injection | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Resource Injection | |
| Resource Leak | |
| Non-exit on Failed Initialization | |
| Improper Input Validation | |
| Resource Injection | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Resource Injection | |
| Improper Cleanup on Thrown Exception | |
| Improper Input Validation | |
| Race Condition | |
| Resource Injection | |
| Improper Input Validation | |
| Improper Input Validation | |
| Stack-based Buffer Overflow | |
| Resource Leak | |
| Missing Initialization of a Variable | <0:4.18.0-553.22.1.el8_10 |
| Resource Exhaustion | |
| Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
| Memory Leak | <0:4.18.0-305.125.1.el8_4 |
| Use After Free | <0:4.18.0-305.125.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.125.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
| Use After Free | <0:4.18.0-305.125.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
| Use After Free | <0:4.18.0-305.125.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
| Memory Leak | <0:4.18.0-305.125.1.el8_4 |
| Use After Free | <0:4.18.0-305.125.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.125.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
| Use After Free | <0:4.18.0-305.125.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
| Use After Free | <0:4.18.0-305.125.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
| Memory Leak | <0:4.18.0-305.125.1.el8_4 |
| Use After Free | <0:4.18.0-305.125.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.125.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.125.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
| Use After Free | <0:4.18.0-305.125.1.el8_4 |
| NULL Pointer Dereference | <0:4.18.0-305.125.1.el8_4 |
| Use After Free | <0:4.18.0-305.125.1.el8_4 |
| Use After Free | |
| NULL Pointer Dereference | |
| Resource Leak | |
| Memory Leak | |
| Use of NullPointerException Catch to Detect NULL Pointer Dereference | |
| Improper Input Validation | |
| Deadlock | |
| Stack-based Buffer Overflow | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Deadlock | |
| Improper Input Validation | |
| Improper Resource Locking | |
| Out-of-bounds Read | |
| Improper Resource Locking | |
| NULL Pointer Dereference | |
| Improper Protection Against Physical Side Channels | |
| Race Condition | <0:4.18.0-553.22.1.el8_10 |
| Integer Overflow to Buffer Overflow | |
| Return of Stack Variable Address | |
| Improper Resource Shutdown or Release | <0:4.18.0-553.22.1.el8_10 |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Double Free | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Buffer Overflow | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Improper Validation of Array Index | <0:4.18.0-193.128.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
| Out-of-bounds Read | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Information Exposure | <0:4.18.0-193.128.1.el8_2 |
| NULL Pointer Dereference | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Double Free | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Buffer Overflow | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Improper Validation of Array Index | <0:4.18.0-193.128.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
| Out-of-bounds Read | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Information Exposure | <0:4.18.0-193.128.1.el8_2 |
| NULL Pointer Dereference | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Double Free | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Buffer Overflow | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Improper Validation of Array Index | <0:4.18.0-193.128.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
| Out-of-bounds Read | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Out-of-bounds Write | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| Information Exposure | <0:4.18.0-193.128.1.el8_2 |
| NULL Pointer Dereference | <0:4.18.0-193.128.1.el8_2 |
| Use After Free | <0:4.18.0-193.128.1.el8_2 |
| NULL Pointer Dereference | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Improper Input Validation | |
| Use of Uninitialized Variable | <0:4.18.0-553.22.1.el8_10 |
| CVE-2023-52575 | |
| Race Condition | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Input Validation | <0:4.18.0-553.22.1.el8_10 |
| Stack-based Buffer Overflow | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Race Condition | |
| Memory Leak | |
| Use After Free | |
| Unchecked Return Value | |
| CVE-2023-52520 | |
| Use After Free | |
| Missing Encryption of Sensitive Data | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Handling of Overlap Between Protected Memory Ranges | |
| Race Condition | |
| Resource Injection | |
| NULL Pointer Dereference | |
| Resource Leak | |
| Resource Leak | |
| Resource Leak | |
| Divide By Zero | |
| Use After Free | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Improper Locking | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Out-of-bounds Read | <0:4.18.0-553.22.1.el8_10 |
| Deadlock | |
| Out-of-Bounds | |
| Deadlock | |
| Resource Leak | |
| Improper Input Validation | |
| Resource Leak | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| Use After Free | |
| Resource Leak | |
| NULL Pointer Dereference | |
| Return of Wrong Status Code | |
| Use After Free | |
| Resource Leak | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Memory Leak | |
| Use After Free | |
| Memory Leak | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | |
| Improper Check or Handling of Exceptional Conditions | |
| Resource Leak | |
| Resource Injection | |
| Missing Support for Integrity Check | |
| Use After Free | |
| Improper Input Validation | |
| Resource Leak | |
| Use After Free | |
| Race Condition | |
| Resource Leak | |
| Range Error | |
| Improper Input Validation | |
| Divide By Zero | |
| Information Exposure | |
| Unchecked Error Condition | |
| Use After Free | |
| Out-of-bounds Read | |
| Race Condition | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| CVE-2023-52474 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Use After Free | |
| NULL Pointer Dereference | <0:4.18.0-553.22.1.el8_10 |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Improper Initialization | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Untrusted Pointer Dereference | |
| Use After Free | |
| NULL Pointer Dereference | |
| Buffer Access with Incorrect Length Value | |
| Return of Wrong Status Code | |
| Race Condition | |
| Race Condition | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Authentication | |
| CVE-2024-25744 | |
| Memory Leak | |
| Stack-based Buffer Overflow | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Information Exposure | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Buffer Overflow | <0:4.18.0-305.120.1.el8_4 |
| Integer Underflow | <0:4.18.0-305.120.1.el8_4 |
| Improper Validation of Array Index | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Incorrect Calculation | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Information Exposure | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Buffer Overflow | <0:4.18.0-305.120.1.el8_4 |
| Integer Underflow | <0:4.18.0-305.120.1.el8_4 |
| Improper Validation of Array Index | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Incorrect Calculation | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Information Exposure | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Buffer Overflow | <0:4.18.0-305.120.1.el8_4 |
| Integer Underflow | <0:4.18.0-305.120.1.el8_4 |
| Improper Validation of Array Index | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Incorrect Calculation | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Use After Free | <0:4.18.0-305.120.1.el8_4 |
| Information Exposure | <0:4.18.0-305.120.1.el8_4 |
| NULL Pointer Dereference | |
| Use After Free | <0:4.18.0-553.22.1.el8_10 |
| Improper Handling of Values | |
| Use After Free | |
| Out-of-Bounds | <0:4.18.0-553.22.1.el8_10 |
| Resource Exhaustion | <0:4.18.0-553.22.1.el8_10 |
| Information Exposure | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Zeroization of Hardware Register | |
| Execution with Unnecessary Privileges | |
| Out-of-Bounds | |
| Sensitive Information Uncleared Before Release | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Zeroization of Hardware Register | |
| Execution with Unnecessary Privileges | |
| Out-of-Bounds | |
| Sensitive Information Uncleared Before Release | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Zeroization of Hardware Register | |
| Execution with Unnecessary Privileges | |
| Out-of-Bounds | |
| Sensitive Information Uncleared Before Release | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
| Use After Free | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
| Use After Free | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
| Execution with Unnecessary Privileges | <0:4.18.0-305.103.1.el8_4 |
| Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Zeroization of Hardware Register | |
| Execution with Unnecessary Privileges | |
| Out-of-Bounds | |
| Sensitive Information Uncleared Before Release | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
| Use After Free | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
| Use After Free | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
| Execution with Unnecessary Privileges | <0:4.18.0-305.103.1.el8_4 |
| Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
| Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
| Use After Free | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
| Use After Free | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Write | <0:4.18.0-305.103.1.el8_4 |
| Out-of-bounds Read | <0:4.18.0-305.103.1.el8_4 |
| Execution with Unnecessary Privileges | <0:4.18.0-305.103.1.el8_4 |
| Out-of-Bounds | <0:4.18.0-305.103.1.el8_4 |
| Use After Free | |
| Improper Handling of Exceptional Conditions | |
| Improper Update of Reference Count | |
| Double Free | |
| Integer Underflow | |
| Incorrect Calculation | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Zeroization of Hardware Register | |
| Improper Zeroization of Hardware Register | |
| Improper Zeroization of Hardware Register | |
| Improper Zeroization of Hardware Register | |
| Improper Zeroization of Hardware Register | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| Resource Leak | |
| Resource Leak | |
| Resource Leak | |
| Resource Leak | |
| Resource Leak | |
| Resource Leak | |
| Resource Leak | |
| Resource Leak | |
| Resource Leak | |
| Use After Free | |
| Divide By Zero | |
| Release of Invalid Pointer or Reference | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Sensitive Information Uncleared Before Release | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Use After Free | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Out-of-bounds Read | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Externally Controlled Reference to a Resource in Another Sphere | |
| Use After Free | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Race Condition | |
| Race Condition | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Expected Behavior Violation | |
| Integer Overflow or Wraparound | |
| Buffer Overflow | |
| Use After Free | |
| Race Condition | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Public Key Re-Use for Signing both Debug and Production Code | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Improper Cross-boundary Removal of Sensitive Data | |
| CVE-2022-0002 | |
| CVE-2022-0002 | |
| CVE-2022-0002 | |
| CVE-2022-0002 | |
| CVE-2022-0002 | |
| CVE-2022-0002 | |
| CVE-2022-0002 | |
| CVE-2022-0002 | |
| CVE-2022-0002 | |
| CVE-2022-0001 | |
| CVE-2022-0001 | |
| CVE-2022-0001 | |
| CVE-2022-0001 | |
| CVE-2022-0001 | |
| CVE-2022-0001 | |
| CVE-2022-0001 | |
| CVE-2022-0001 | |
| CVE-2022-0001 | |
| CVE-2021-26401 | |
| CVE-2021-26401 | |
| CVE-2021-26401 | |
| CVE-2021-26401 | |
| CVE-2021-26401 | |
| CVE-2021-26401 | |
| CVE-2021-26401 | |
| CVE-2021-26401 | |
| CVE-2021-26401 | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Preservation of Permissions | |
| Improper Preservation of Permissions | |
| Improper Preservation of Permissions | |
| Improper Preservation of Permissions | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Buffer Overflow | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Preservation of Permissions | |
| Improper Preservation of Permissions | |
| Improper Preservation of Permissions | |
| Improper Preservation of Permissions | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Incorrect Conversion between Numeric Types | |
| Integer Underflow | |
| Integer Underflow | |
| Integer Underflow | |
| Integer Underflow | |
| Improper Handling of Exceptional Conditions | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Memory Leak | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| CVE-2019-0136 | |
| CVE-2019-0136 | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Time-of-check Time-of-use (TOCTOU) | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Use After Free | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Information Exposure | |
| Cleartext Transmission of Sensitive Information | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Race Condition | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Improper Validation of Integrity Check Value | |
| Improper Validation of Integrity Check Value | |
| Improper Validation of Integrity Check Value | |
| Improper Validation of Integrity Check Value | |
| Improper Validation of Integrity Check Value | |
| Improper Validation of Integrity Check Value | |
| Improper Validation of Integrity Check Value | |
| Improper Validation of Integrity Check Value | |
| Improper Validation of Integrity Check Value | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Time-of-check Time-of-use (TOCTOU) | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Improper Initialization | |
| Integer Overflow or Wraparound | |
| Incorrect Permission Assignment for Critical Resource | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Resource Exhaustion | |
| Out-of-bounds Write | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| Missing Initialization of Resource | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Operation on a Resource after Expiration or Release | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| Mirrored Regions with Different Values | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Acceptance of Extraneous Untrusted Data With Trusted Data | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Incomplete Cleanup | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Resource Injection | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Improper Cleanup on Thrown Exception | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Insufficient Entropy | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Privilege Dropping / Lowering Errors | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Sensitive Information Uncleared Before Release | |
| Missing Initialization of Resource | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Initialization | |
| Incorrect Conversion between Numeric Types | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Directory Traversal | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Integer Overflow or Wraparound | |
| Untrusted Pointer Dereference | |
| Untrusted Pointer Dereference | |
| Untrusted Pointer Dereference | |
| Untrusted Pointer Dereference | |
| Untrusted Pointer Dereference | |
| Untrusted Pointer Dereference | |
| Untrusted Pointer Dereference | |
| Untrusted Pointer Dereference | |
| Untrusted Pointer Dereference | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Access Control | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2020-36311 | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Incorrect Authorization | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Integer Underflow | |
| Information Exposure | |
| Resource Exhaustion | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Improper Restriction of Excessive Authentication Attempts | |
| Authentication Bypass | |
| Authentication Bypass | |
| Authentication Bypass | |
| Authentication Bypass | |
| Authentication Bypass | |
| Authentication Bypass | |
| Authentication Bypass | |
| Authentication Bypass | |
| Authentication Bypass | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Origin Validation Error | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Cleartext Transmission of Sensitive Information | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Use After Free | |
| Information Exposure | |
| Improper Cleanup on Thrown Exception | |
| Race Condition | |
| Missing Release of Resource after Effective Lifetime | |
| Memory Leak | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Incorrect Permission Assignment for Critical Resource | |
| Authentication Bypass | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Resource Exhaustion | |
| Missing Release of Resource after Effective Lifetime | |
| Race Condition | |
| Use After Free | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Information Exposure | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| Incorrect Check of Function Return Value | |
| Operation on a Resource after Expiration or Release | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Information Exposure | |
| Resource Exhaustion | |
| Information Exposure | |
| Information Exposure | |