kernel-zfcpdump-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-zfcpdump-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Improper Initialization

*
  • M
Race Condition

*
  • M
CVE-2024-53073

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
CVE-2024-53060

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • L
Buffer Overflow

*
  • M
CVE-2024-50211

*
  • L
CVE-2024-50275

*
  • M
Out-of-bounds Read

*
  • M
CVE-2024-50199

*
  • M
CVE-2024-50192

*
  • M
CVE-2024-50201

*
  • M
CVE-2024-50272

*
  • M
CVE-2024-50189

*
  • M
Use of Uninitialized Resource

*
  • M
CVE-2024-53093

*
  • M
CVE-2024-53051

*
  • M
Use After Free

*
  • M
CVE-2024-50194

*
  • M
Use of Uninitialized Resource

*
  • M
Improper Locking

*
  • M
Improper Handling of Exceptional Conditions

*
  • M
Out-of-bounds Write

*
  • M
CVE-2024-50251

*
  • M
CVE-2024-50195

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-50290

*
  • M
CVE-2024-50304

*
  • M
CVE-2024-50256

*
  • L
Use After Free

*
  • M
CVE-2024-50183

*
  • M
CVE-2024-53079

*
  • M
CVE-2024-50191

*
  • M
CVE-2024-50209

*
  • L
Improper Locking

*
  • L
CVE-2024-50279

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-50185

*
  • M
CVE-2024-50186

*
  • L
CVE-2024-50274

*
  • M
Out-of-bounds Write

*
  • M
Integer Underflow

*
  • M
NULL Pointer Dereference

*
  • M
Divide By Zero

*
  • M
Improper Locking

*
  • M
CVE-2024-50179

*
  • M
CVE-2024-53094

*
  • M
CVE-2024-53095

*
  • M
CVE-2024-50277

*
  • M
CVE-2024-53042

*
  • M
Use of Uninitialized Resource

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-50219

*
  • M
Expired Pointer Dereference

*
  • M
Resource Injection

*
  • L
Use After Free

*
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
State Issues

<0:4.18.0-425.3.1.el8
  • M
State Issues

<0:4.18.0-425.3.1.el8
  • M
State Issues

<0:4.18.0-425.3.1.el8
  • M
State Issues

<0:4.18.0-425.3.1.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-372.129.1.el8_6
  • M
Use After Free

<0:4.18.0-372.129.1.el8_6
  • M
CVE-2022-48695

<0:4.18.0-372.129.1.el8_6
  • H
Improper Handling of Length Parameter Inconsistency

<0:4.18.0-477.10.1.el8_8
  • H
Improper Handling of Length Parameter Inconsistency

<0:4.18.0-477.10.1.el8_8
  • H
Improper Handling of Length Parameter Inconsistency

<0:4.18.0-477.10.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Improper Handling of Length Parameter Inconsistency

<0:4.18.0-477.10.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • M
CVE-2024-50142

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-50163

*
  • M
Use of Uninitialized Resource

*
  • M
CVE-2024-50148

*
  • M
Memory Leak

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-50162

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
CVE-2024-50138

*
  • M
CVE-2024-50134

*
  • M
CVE-2024-50099

*
  • M
Use of Uninitialized Resource

*
  • M
Use After Free

*
  • M
CVE-2024-50093

*
  • M
CVE-2024-50095

*
  • M
CVE-2024-50136

*
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • M
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • M
CVE-2024-50082

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
CVE-2024-50083

*
  • M
Out-of-bounds Write

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-40998

<0:4.18.0-372.127.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-372.127.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.57.1.el8_4
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.57.1.el8_4
  • H
NULL Pointer Dereference

<0:4.18.0-305.57.1.el8_4
  • H
NULL Pointer Dereference

<0:4.18.0-305.57.1.el8_4
  • H
NULL Pointer Dereference

<0:4.18.0-193.87.1.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.87.1.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.87.1.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.87.1.el8_2
  • M
CVE-2024-49971

*
  • M
CVE-2024-50063

*
  • M
CVE-2024-50024

*
  • M
CVE-2024-49995

*
  • M
Improper Handling of Exceptional Conditions

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Control of a Resource Through its Lifetime

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-50008

*
  • M
Double Free

*
  • M
Improper Access Control

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
CVE-2024-49948

*
  • M
Improper Locking

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Use of Uninitialized Resource

*
  • M
Out-of-bounds Write

*
  • M
Access of Uninitialized Pointer

*
  • M
CVE-2024-49967

*
  • M
Use After Free

*
  • M
CVE-2024-47703

*
  • M
Use After Free

*
  • M
Incomplete Cleanup

*
  • M
Information Exposure

*
  • M
Improper Validation of Integrity Check Value

*
  • M
CVE-2024-50040

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
CVE-2024-49861

*
  • M
CVE-2024-49886

*
  • M
NULL Pointer Dereference

*
  • M
Memory Leak

*
  • M
CVE-2024-50019

*
  • M
Use After Free

*
  • M
CVE-2024-47713

*
  • M
CVE-2024-50038

*
  • M
Improper Validation of Array Index

*
  • M
CVE-2024-49974

*
  • M
Use After Free

*
  • M
Always-Incorrect Control Flow Implementation

*
  • M
CVE-2024-49959

*
  • M
CVE-2024-49858

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Incomplete Cleanup

*
  • M
NULL Pointer Dereference

*
  • M
Double Free

*
  • M
CVE-2024-49937

*
  • M
Use of Uninitialized Resource

*
  • M
NULL Pointer Dereference

*
  • M
Improper Validation of Array Index

*
  • M
Memory Leak

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Integer Overflow or Wraparound

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Operation on a Resource after Expiration or Release

*
  • M
Improper Input Validation

*
  • M
Buffer Overflow

*
  • M
CVE-2024-50028

*
  • M
Release of Invalid Pointer or Reference

*
  • M
NULL Pointer Dereference

*
  • L
Improper Locking

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-49944

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-47738

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
CVE-2024-49927

*
  • M
CVE-2024-49940

*
  • M
Incomplete Cleanup

*
  • M
Improper Locking

*
  • M
CVE-2024-47710

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Use After Free

*
  • M
Race Condition

*
  • M
Out-of-bounds Write

*
  • M
CVE-2024-49934

*
  • M
Memory Leak

*
  • M
Use After Free

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
CVE-2022-48978

*
  • M
NULL Pointer Dereference

*
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • M
Use After Free

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-Bounds

*
  • L
Improper Validation of Array Index

*
  • M
Memory Leak

*
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • M
CVE-2022-48994

*
  • M
Memory Leak

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
NULL Pointer Dereference

*
  • M
Incomplete Cleanup

*
  • L
Improper Validation of Array Index

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.el8_10
  • M
CVE-2023-52917

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
CVE-2022-49027

*
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • M
CVE-2022-48961

*
  • M
CVE-2022-48986

*
  • M
Improper Validation of Array Index

*
  • M
Incomplete Cleanup

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Memory Leak

*
  • M
Improper Control of a Resource Through its Lifetime

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • L
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
CVE-2024-35884

<0:4.18.0-372.126.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.126.1.el8_6
  • M
Use After Free

<0:4.18.0-372.126.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-372.126.1.el8_6
  • M
Return of Wrong Status Code

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
CVE-2024-40998

<0:4.18.0-477.75.1.el8_8
  • M
Deadlock

<0:4.18.0-477.75.1.el8_8
  • M
Improper Initialization

<0:4.18.0-477.75.1.el8_8
  • M
Incomplete Cleanup

<0:4.18.0-477.75.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-477.75.1.el8_8
  • M
CVE-2024-35884

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
Return of Wrong Status Code

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
CVE-2024-40998

<0:4.18.0-477.75.1.el8_8
  • M
Deadlock

<0:4.18.0-477.75.1.el8_8
  • M
Improper Initialization

<0:4.18.0-477.75.1.el8_8
  • M
Incomplete Cleanup

<0:4.18.0-477.75.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-477.75.1.el8_8
  • M
CVE-2024-35884

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
Return of Wrong Status Code

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
CVE-2024-40998

<0:4.18.0-477.75.1.el8_8
  • M
Deadlock

<0:4.18.0-477.75.1.el8_8
  • M
Improper Initialization

<0:4.18.0-477.75.1.el8_8
  • M
Incomplete Cleanup

<0:4.18.0-477.75.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-477.75.1.el8_8
  • M
CVE-2024-35884

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
Return of Wrong Status Code

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
CVE-2024-40998

<0:4.18.0-477.75.1.el8_8
  • M
Deadlock

<0:4.18.0-477.75.1.el8_8
  • M
Improper Initialization

<0:4.18.0-477.75.1.el8_8
  • M
Incomplete Cleanup

<0:4.18.0-477.75.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-477.75.1.el8_8
  • M
CVE-2024-35884

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.75.1.el8_8
  • M
Use After Free

<0:4.18.0-477.75.1.el8_8
  • M
CVE-2024-47673

*
  • M
Race Condition

<0:4.18.0-553.27.1.el8_10
  • M
Race Condition

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • M
Improper Validation of Array Index

*
  • M
Information Exposure

*
  • H
CVE-2022-48695

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
CVE-2022-48695

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
CVE-2022-48695

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Resource Injection

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Read

<0:4.18.0-425.3.1.el8
  • M
Integer Overflow or Wraparound

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Resource Injection

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Read

<0:4.18.0-425.3.1.el8
  • M
Integer Overflow or Wraparound

<0:4.18.0-425.3.1.el8
  • H
CVE-2022-48695

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Deadlock

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Resource Injection

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Read

<0:4.18.0-425.3.1.el8
  • M
Integer Overflow or Wraparound

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Deadlock

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Resource Injection

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Read

<0:4.18.0-425.3.1.el8
  • M
Integer Overflow or Wraparound

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Deadlock

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Deadlock

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Deadlock

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Deadlock

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Deadlock

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Deadlock

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-305.40.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-305.40.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-305.40.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-305.40.1.el8_4
  • M
NULL Pointer Dereference

<0:4.18.0-372.125.1.el8_6
  • M
Race Condition

<0:4.18.0-372.125.1.el8_6
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
CVE-2024-46834

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-46830

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-46839

*
  • M
CVE-2024-46825

*
  • M
CVE-2024-46855

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-46861

*
  • M
Improper Input Validation

<0:4.18.0-553.27.1.el8_10
  • M
Double Free

*
  • H
Improper Handling of Length Parameter Inconsistency

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-477.74.1.el8_8
  • H
Deadlock

<0:4.18.0-477.74.1.el8_8
  • H
Incomplete Cleanup

<0:4.18.0-477.74.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-38573

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
Untrusted Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-36005

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-35969

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-35898

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-27399

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Unchecked Return Value to NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Handling of Values

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.74.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Use After Free

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.74.1.el8_8
  • H
Attempt to Access Child of a Non-structure Pointer

<0:4.18.0-477.74.1.el8_8
  • H
Trust Boundary Violation

<0:4.18.0-477.74.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2021-47384

<0:4.18.0-477.74.1.el8_8
  • H
Use After Free

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Handling of Length Parameter Inconsistency

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-477.74.1.el8_8
  • H
Deadlock

<0:4.18.0-477.74.1.el8_8
  • H
Incomplete Cleanup

<0:4.18.0-477.74.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-38573

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
Untrusted Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-36005

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-35969

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-35898

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-27399

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Unchecked Return Value to NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Handling of Values

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.74.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Use After Free

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.74.1.el8_8
  • H
Attempt to Access Child of a Non-structure Pointer

<0:4.18.0-477.74.1.el8_8
  • H
Trust Boundary Violation

<0:4.18.0-477.74.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2021-47384

<0:4.18.0-477.74.1.el8_8
  • H
Use After Free

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-372.124.1.el8_6
  • H
Improper Initialization

<0:4.18.0-372.124.1.el8_6
  • H
Improper Resource Locking

<0:4.18.0-372.124.1.el8_6
  • H
Improper Input Validation

<0:4.18.0-372.124.1.el8_6
  • H
Use After Free

<0:4.18.0-372.124.1.el8_6
  • H
Attempt to Access Child of a Non-structure Pointer

<0:4.18.0-372.124.1.el8_6
  • H
Improper Handling of Length Parameter Inconsistency

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-477.74.1.el8_8
  • H
Deadlock

<0:4.18.0-477.74.1.el8_8
  • H
Incomplete Cleanup

<0:4.18.0-477.74.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-38573

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
Untrusted Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-36005

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-35969

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-35898

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-27399

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Unchecked Return Value to NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Handling of Values

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.74.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Use After Free

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.74.1.el8_8
  • H
Attempt to Access Child of a Non-structure Pointer

<0:4.18.0-477.74.1.el8_8
  • H
Trust Boundary Violation

<0:4.18.0-477.74.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2021-47384

<0:4.18.0-477.74.1.el8_8
  • H
Use After Free

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Handling of Length Parameter Inconsistency

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-477.74.1.el8_8
  • H
Deadlock

<0:4.18.0-477.74.1.el8_8
  • H
Incomplete Cleanup

<0:4.18.0-477.74.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-38573

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
Untrusted Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-36005

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-35969

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-35898

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2024-27399

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Unchecked Return Value to NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Improper Handling of Values

<0:4.18.0-477.74.1.el8_8
  • H
Race Condition

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.74.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.74.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.74.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • H
Use After Free

<0:4.18.0-477.74.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.74.1.el8_8
  • H
Attempt to Access Child of a Non-structure Pointer

<0:4.18.0-477.74.1.el8_8
  • H
Trust Boundary Violation

<0:4.18.0-477.74.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.74.1.el8_8
  • H
CVE-2021-47384

<0:4.18.0-477.74.1.el8_8
  • H
Use After Free

<0:4.18.0-477.74.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.74.1.el8_8
  • M
Stack-based Buffer Overflow

<0:4.18.0-372.123.1.el8_6
  • M
CVE-2024-35898

<0:4.18.0-372.123.1.el8_6
  • M
Race Condition

<0:4.18.0-372.123.1.el8_6
  • M
Race Condition

<0:4.18.0-372.123.1.el8_6
  • M
Improper Handling of Values

<0:4.18.0-372.123.1.el8_6
  • M
Improper Handling of Values

<0:4.18.0-372.123.1.el8_6
  • M
Double Free

<0:4.18.0-372.123.1.el8_6
  • M
Out-of-bounds Read

<0:4.18.0-372.123.1.el8_6
  • M
Incomplete Internal State Distinction

<0:4.18.0-372.123.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.123.1.el8_6
  • M
CVE-2024-46787

*
  • M
CVE-2024-46771

*
  • M
Link Following

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Stack-based Buffer Overflow

*
  • M
CVE-2024-46783

*
  • L
Race Condition

*
  • M
Integer Underflow

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Locking

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Integer Underflow

*
  • M
NULL Pointer Dereference

*
  • M
Integer Underflow

*
  • M
CVE-2024-46745

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-46715

*
  • M
NULL Pointer Dereference

*
  • L
Improper Initialization

*
  • M
Out-of-bounds Read

*
  • M
CVE-2024-46777

*
  • L
Uncontrolled Recursion

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-46754

*
  • M
Use After Free

*
  • L
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • L
Unchecked Return Value

*
  • M
Double Free

*
  • L
Race Condition

*
  • M
Improper Authentication

*
  • L
Improper Locking

*
  • M
Improper Synchronization

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Improper Initialization

*
  • L
Use After Free

*
  • M
Resource Injection

*
  • L
Out-of-Bounds

*
  • M
Use After Free

*
  • M
Use of Uninitialized Variable

<0:4.18.0-553.27.1.el8_10
  • M
Use of Uninitialized Variable

*
  • L
NULL Pointer Dereference

*
  • M
Insufficient Control Flow Management

*
  • M
Improper Control of a Resource Through its Lifetime

*
  • L
Improper Locking

*
  • M
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • M
Improper Input Validation

*
  • M
Deadlock

*
  • M
Improper Initialization

*
  • M
Improper Locking

*
  • M
Improper Initialization

*
  • M
Improper Locking

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Uncontrolled Memory Allocation

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
Use After Free

*
  • M
Improper Check or Handling of Exceptional Conditions

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • H
Use of Uninitialized Variable

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.70.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-35845

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-35789

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-26993

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-26974

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • H
Divide By Zero

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-21823

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2023-52881

<0:4.18.0-477.70.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.70.1.el8_8
  • H
Deadlock

<0:4.18.0-477.70.1.el8_8
  • H
Incorrect Default Permissions

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Buffer Underflow

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • H
Use of Uninitialized Variable

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.70.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-35845

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-35789

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-26993

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-26974

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • H
Divide By Zero

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-21823

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2023-52881

<0:4.18.0-477.70.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.70.1.el8_8
  • H
Deadlock

<0:4.18.0-477.70.1.el8_8
  • H
Incorrect Default Permissions

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Buffer Underflow

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • H
Use of Uninitialized Variable

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.70.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-35845

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-35789

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-26993

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-26974

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • H
Divide By Zero

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-21823

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2023-52881

<0:4.18.0-477.70.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.70.1.el8_8
  • H
Deadlock

<0:4.18.0-477.70.1.el8_8
  • H
Incorrect Default Permissions

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Buffer Underflow

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • H
Use of Uninitialized Variable

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.70.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.70.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-35845

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-35789

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-26993

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-26974

<0:4.18.0-477.70.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • H
Divide By Zero

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2024-21823

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
CVE-2023-52881

<0:4.18.0-477.70.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.70.1.el8_8
  • H
Deadlock

<0:4.18.0-477.70.1.el8_8
  • H
Incorrect Default Permissions

<0:4.18.0-477.70.1.el8_8
  • H
Use After Free

<0:4.18.0-477.70.1.el8_8
  • H
Buffer Underflow

<0:4.18.0-477.70.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.70.1.el8_8
  • H
Race Condition

<0:4.18.0-477.70.1.el8_8
  • M
Out-of-bounds Read

<0:4.18.0-372.121.1.el8_6
  • M
Use of Uninitialized Variable

<0:4.18.0-372.121.1.el8_6
  • M
Improper Initialization

<0:4.18.0-372.121.1.el8_6
  • M
Out-of-bounds Read

<0:4.18.0-372.121.1.el8_6
  • M
CVE-2024-35823

<0:4.18.0-372.121.1.el8_6
  • M
Out-of-bounds Read

<0:4.18.0-372.121.1.el8_6
  • M
Race Condition

<0:4.18.0-372.121.1.el8_6
  • M
Use After Free

<0:4.18.0-372.121.1.el8_6
  • M
Reachable Assertion

<0:4.18.0-372.121.1.el8_6
  • M
Race Condition

<0:4.18.0-372.121.1.el8_6
  • M
Use After Free

<0:4.18.0-372.121.1.el8_6
  • M
Out-of-bounds Read

<0:4.18.0-372.121.1.el8_6
  • M
Use After Free

*
  • L
Resource Leak

*
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
Memory Leak

*
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Divide By Zero

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

*
  • M
Race Condition

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
Out-of-bounds Write

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Reachable Assertion

*
  • M
NULL Pointer Dereference

*
  • L
Integer Overflow or Wraparound

*
  • L
Divide By Zero

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Use After Free

*
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • L
Excessive Iteration

*
  • M
Resource Leak

*
  • M
Improper Input Validation

*
  • M
Double Free

*
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Out-of-Bounds

*
  • M
Operation on a Resource after Expiration or Release

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Memory Leak

*
  • L
Memory Leak

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Buffer Overflow

*
  • M
CVE-2022-48936

<0:4.18.0-553.27.1.el8_10
  • M
Race Condition

*
  • M
Double Free

*
  • M
NULL Pointer Dereference

*
  • M
Improper Access Control

<0:4.18.0-553.27.1.el8_10
  • H
Resource Leak

<0:4.18.0-553.22.1.el8_10
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Incorrect Privilege Assignment

*
  • M
Resource Leak

*
  • M
CVE-2024-42107

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Injection

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Improper Handling of Length Parameter Inconsistency

<0:4.18.0-477.10.1.el8_8
  • M
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Incorrect Calculation of Buffer Size

*
  • M
Use After Free

<0:4.18.0-477.10.1.el8_8
  • M
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
Use After Free

*
  • M
Improper Validation of Array Index

*
  • L
Improper Handling of Length Parameter Inconsistency

*
  • M
Improper Locking

*
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • M
Multiple Locks of a Critical Resource

*
  • M
NULL Pointer Dereference

*
  • M
Improper Validation of Array Index

<0:4.18.0-553.27.1.el8_10
  • M
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Return of Wrong Status Code

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Out-of-Bounds

*
  • H
CVE-2024-42322

<0:4.18.0-553.22.1.el8_10
  • L
Resource Injection

*
  • M
Out-of-bounds Read

<0:4.18.0-553.27.1.el8_10
  • M
Information Exposure

*
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • M
Race Condition

*
  • M
Reachable Assertion

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-42304

*
  • M
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Deadlock

*
  • M
Use After Free

<0:4.18.0-372.119.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-372.119.1.el8_6
  • M
Use After Free

<0:4.18.0-372.119.1.el8_6
  • M
Out-of-bounds Write

<0:4.18.0-372.119.1.el8_6
  • M
CVE-2024-35845

<0:4.18.0-372.119.1.el8_6
  • M
Resource Leak

<0:4.18.0-372.119.1.el8_6
  • M
Resource Leak

<0:4.18.0-372.119.1.el8_6
  • M
Out-of-Bounds

<0:4.18.0-372.119.1.el8_6
  • M
Resource Injection

<0:4.18.0-372.119.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-372.119.1.el8_6
  • M
Resource Injection

<0:4.18.0-372.119.1.el8_6
  • M
Use After Free

<0:4.18.0-372.119.1.el8_6
  • M
Race Condition

<0:4.18.0-372.119.1.el8_6
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.67.1.el8_8
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-36000

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-35910

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-35852

<0:4.18.0-477.67.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.67.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.67.1.el8_8
  • H
Improper Handling of Values

<0:4.18.0-477.67.1.el8_8
  • H
Heap-based Buffer Overflow

<0:4.18.0-477.67.1.el8_8
  • H
Double Free

<0:4.18.0-477.67.1.el8_8
  • H
Improper Resource Locking

<0:4.18.0-477.67.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
Return of Wrong Status Code

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.67.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.67.1.el8_8
  • H
Information Exposure

<0:4.18.0-477.67.1.el8_8
  • H
Improper Handling of Overlap Between Protected Memory Ranges

<0:4.18.0-477.67.1.el8_8
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.67.1.el8_8
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-36000

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-35910

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-35852

<0:4.18.0-477.67.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.67.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.67.1.el8_8
  • H
Improper Handling of Values

<0:4.18.0-477.67.1.el8_8
  • H
Heap-based Buffer Overflow

<0:4.18.0-477.67.1.el8_8
  • H
Double Free

<0:4.18.0-477.67.1.el8_8
  • H
Improper Resource Locking

<0:4.18.0-477.67.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
Return of Wrong Status Code

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.67.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.67.1.el8_8
  • H
Information Exposure

<0:4.18.0-477.67.1.el8_8
  • H
Improper Handling of Overlap Between Protected Memory Ranges

<0:4.18.0-477.67.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-372.118.1.el8_6
  • H
Improper Input Validation

<0:4.18.0-372.118.1.el8_6
  • H
Use After Free

<0:4.18.0-372.118.1.el8_6
  • H
Use After Free

<0:4.18.0-372.118.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.118.1.el8_6
  • H
CVE-2024-35852

<0:4.18.0-372.118.1.el8_6
  • H
CVE-2024-21823

<0:4.18.0-372.118.1.el8_6
  • H
Use After Free

<0:4.18.0-372.118.1.el8_6
  • H
CVE-2023-52881

<0:4.18.0-372.118.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.118.1.el8_6
  • H
Use After Free

<0:4.18.0-372.118.1.el8_6
  • H
Incorrect Check of Function Return Value

<0:4.18.0-372.118.1.el8_6
  • H
CVE-2022-48828

<0:4.18.0-372.118.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.118.1.el8_6
  • H
Use After Free

<0:4.18.0-372.118.1.el8_6
  • H
Trust Boundary Violation

<0:4.18.0-372.118.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.118.1.el8_6
  • H
Use After Free

<0:4.18.0-372.118.1.el8_6
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.67.1.el8_8
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-36000

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-35910

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-35852

<0:4.18.0-477.67.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.67.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.67.1.el8_8
  • H
Improper Handling of Values

<0:4.18.0-477.67.1.el8_8
  • H
Heap-based Buffer Overflow

<0:4.18.0-477.67.1.el8_8
  • H
Double Free

<0:4.18.0-477.67.1.el8_8
  • H
Improper Resource Locking

<0:4.18.0-477.67.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
Return of Wrong Status Code

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.67.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.67.1.el8_8
  • H
Information Exposure

<0:4.18.0-477.67.1.el8_8
  • H
Improper Handling of Overlap Between Protected Memory Ranges

<0:4.18.0-477.67.1.el8_8
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Resource Injection

<0:4.18.0-477.67.1.el8_8
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Use After Free

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-36000

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-35910

<0:4.18.0-477.67.1.el8_8
  • H
CVE-2024-35852

<0:4.18.0-477.67.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.67.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.67.1.el8_8
  • H
Improper Handling of Values

<0:4.18.0-477.67.1.el8_8
  • H
Heap-based Buffer Overflow

<0:4.18.0-477.67.1.el8_8
  • H
Double Free

<0:4.18.0-477.67.1.el8_8
  • H
Improper Resource Locking

<0:4.18.0-477.67.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
Return of Wrong Status Code

<0:4.18.0-477.67.1.el8_8
  • H
Race Condition

<0:4.18.0-477.67.1.el8_8
  • H
Resource Leak

<0:4.18.0-477.67.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.67.1.el8_8
  • H
Information Exposure

<0:4.18.0-477.67.1.el8_8
  • H
Improper Handling of Overlap Between Protected Memory Ranges

<0:4.18.0-477.67.1.el8_8
  • H
Missing Synchronization

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-2201

<0:4.18.0-553.16.1.el8_10
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.22.1.el8_10
  • M
Race Condition

*
  • M
Resource Injection

<0:4.18.0-553.27.1.el8_10
  • M
Improper Clearing of Heap Memory Before Release ('Heap Inspection')

*
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • M
Resource Injection

*
  • M
Use After Free

<0:4.18.0-553.27.1.el8_10
  • M
Use After Free

<0:4.18.0-372.115.1.el8_6
  • M
Resource Leak

<0:4.18.0-372.115.1.el8_6
  • M
CVE-2024-36000

<0:4.18.0-372.115.1.el8_6
  • M
CVE-2024-35789

<0:4.18.0-372.115.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.115.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.115.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.115.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.115.1.el8_6
  • M
Race Condition

<0:4.18.0-372.115.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.115.1.el8_6
  • M
Deadlock

<0:4.18.0-372.115.1.el8_6
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-372.115.1.el8_6
  • H
Use of Uninitialized Variable

<0:4.18.0-553.22.1.el8_10
  • M
NULL Pointer Dereference

*
  • H
Improper Handling of Length Parameter Inconsistency

<0:4.18.0-553.22.1.el8_10
  • M
Unchecked Return Value

*
  • H
Static Code Injection

<0:4.18.0-553.22.1.el8_10
  • M
Deadlock

*
  • L
Buffer Overflow

*
  • M
Resource Injection

*
  • M
Use of Uninitialized Resource

*
  • H
Out-of-bounds Write

<0:4.18.0-553.22.1.el8_10
  • M
Unchecked Return Value

*
  • L
NULL Pointer Dereference

*
  • M
Improper Validation of Array Index

*
  • M
Information Exposure

<0:4.18.0-553.27.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • L
Improper Input Validation

*
  • L
Improper Control of Document Type Definition

*
  • L
Integer Overflow or Wraparound

*
  • H
Improper Input Validation

<0:4.18.0-553.22.1.el8_10
  • L
Buffer Overflow

*
  • M
Information Exposure

<0:4.18.0-553.27.1.el8_10
  • H
Heap-based Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • M
Race Condition

*
  • L
Resource Injection

*
  • L
Incomplete Internal State Distinction

*
  • H
Heap-based Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • L
Deadlock

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Incomplete Internal State Distinction

*
  • L
CVE-2024-42129

*
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
Stack-based Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • M
Use After Free

*
  • H
Improper Input Validation

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.22.1.el8_10
  • M
Double Free

*
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Double Free

*
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • M
Use of Uninitialized Variable

*
  • L
NULL Pointer Dereference

*
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Resource Exhaustion

<0:4.18.0-553.22.1.el8_10
  • H
Improper Update of Reference Count

<0:4.18.0-553.22.1.el8_10
  • H
Untrusted Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Write

*
  • M
NULL Pointer Dereference

*
  • H
Use of Uninitialized Variable

<0:4.18.0-553.22.1.el8_10
  • L
Improper Input Validation

*
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • L
NULL Pointer Dereference

*
  • H
Improper Resource Locking

<0:4.18.0-553.22.1.el8_10
  • L
NULL Pointer Dereference

*
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • M
Access of Uninitialized Pointer

*
  • H
Improper Resource Shutdown or Release

<0:4.18.0-553.22.1.el8_10
  • H
Integer Overflow or Wraparound

<0:4.18.0-553.22.1.el8_10
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • H
Incomplete Internal State Distinction

<0:4.18.0-553.22.1.el8_10
  • M
Stack-based Buffer Overflow

<0:4.18.0-553.27.1.el8_10
  • H
Deadlock

<0:4.18.0-553.22.1.el8_10
  • L
Resource Leak

*
  • M
NULL Pointer Dereference

*
  • M
Improper Resource Locking

*
  • L
Unchecked Return Value

*
  • M
Race Condition

<0:4.18.0-372.113.1.el8_6
  • M
Untrusted Pointer Dereference

<0:4.18.0-372.113.1.el8_6
  • M
Deadlock

<0:4.18.0-372.113.1.el8_6
  • M
Out-of-bounds Write

<0:4.18.0-372.113.1.el8_6
  • M
Race Condition

<0:4.18.0-372.113.1.el8_6
  • M
CVE-2024-35960

<0:4.18.0-372.113.1.el8_6
  • M
Unchecked Return Value to NULL Pointer Dereference

<0:4.18.0-372.113.1.el8_6
  • M
Use After Free

<0:4.18.0-372.113.1.el8_6
  • M
Heap-based Buffer Overflow

<0:4.18.0-372.113.1.el8_6
  • M
Resource Injection

<0:4.18.0-372.113.1.el8_6
  • M
Double Free

<0:4.18.0-372.113.1.el8_6
  • M
Buffer Underflow

<0:4.18.0-372.113.1.el8_6
  • M
Improper Validation of Array Index

<0:4.18.0-372.113.1.el8_6
  • H
Improper Input Validation

<0:4.18.0-553.22.1.el8_10
  • H
Improper Input Validation

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • M
CVE-2024-35960

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-35958

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-35937

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-27397

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-26804

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-26801

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Double Free

<0:4.18.0-477.64.1.el8_8
  • M
Race Condition

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Improper Validation of Array Index

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-35960

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-35958

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-35937

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-27397

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-26804

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-26801

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Double Free

<0:4.18.0-477.64.1.el8_8
  • M
Race Condition

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Improper Validation of Array Index

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-35960

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-35958

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-35937

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-27397

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-26804

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-26801

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Double Free

<0:4.18.0-477.64.1.el8_8
  • M
Race Condition

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Improper Validation of Array Index

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-35960

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-35958

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-35937

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-27397

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-26804

<0:4.18.0-477.64.1.el8_8
  • M
CVE-2024-26801

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Double Free

<0:4.18.0-477.64.1.el8_8
  • M
Race Condition

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Improper Validation of Array Index

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Use After Free

<0:4.18.0-477.64.1.el8_8
  • M
Race Condition

*
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • M
Stack-based Buffer Overflow

<0:4.18.0-553.27.1.el8_10
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • M
Improper Synchronization

*
  • H
Out-of-bounds Write

<0:4.18.0-553.22.1.el8_10
  • L
Integer Overflow or Wraparound

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • H
Race Condition

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40998

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
Resource Exhaustion

<0:4.18.0-553.22.1.el8_10
  • H
Untrusted Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • L
Resource Injection

*
  • M
Improper Update of Reference Count

<0:4.18.0-553.27.1.el8_10
  • M
Resource Injection

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-Bounds

<0:4.18.0-553.16.1.el8_10
  • H
Expired Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Deadlock

<0:4.18.0-553.22.1.el8_10
  • H
Deadlock

<0:4.18.0-553.22.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
Resource Injection

<0:4.18.0-553.27.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • L
Resource Injection

*
  • L
Return of Wrong Status Code

*
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
Deadlock

<0:4.18.0-553.22.1.el8_10
  • L
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • M
Use After Free

*
  • M
Expired Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • M
Resource Injection

*
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • L
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • H
Deadlock

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • L
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Memory Leak

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • M
Resource Injection

*
  • L
Incorrect Check of Function Return Value

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • L
Improper Initialization

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2022-48834

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2022-48849

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Use After Free

*
  • M
Missing Lock Check

*
  • M
Non-exit on Failed Initialization

*
  • M
Incorrect Check of Function Return Value

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • H
Integer Underflow

<0:4.18.0-553.22.1.el8_10
  • M
Use After Free

*
  • M
Resource Management Errors

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Memory Leak

*
  • L
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2022-48811

*
  • M
Out-of-bounds Read

*
  • L
Integer Overflow or Wraparound

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Deadlock

*
  • H
CVE-2022-48836

<0:4.18.0-553.22.1.el8_10
  • M
CVE-2022-48828

*
  • M
Improper Update of Reference Count

*
  • M
CVE-2022-48802

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
State Issues

<0:4.18.0-425.3.1.el8
  • L
Resource Injection

*
  • H
Resource Leak

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-Bounds

<0:4.18.0-553.22.1.el8_10
  • H
Resource Leak

<0:4.18.0-553.22.1.el8_10
  • H
Race Condition

<0:4.18.0-553.22.1.el8_10
  • M
Race Condition

*
  • M
Use After Free

<0:4.18.0-553.27.1.el8_10
  • M
Use After Free

*
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • M
Use After Free

*
  • L
CVE-2024-39509

*
  • H
CVE-2024-40901

<0:4.18.0-553.22.1.el8_10
  • L
NULL Pointer Dereference

*
  • H
Out-of-bounds Read

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-39488

*
  • H
Incomplete Cleanup

<0:4.18.0-372.111.1.el8_6
  • H
Use After Free

<0:4.18.0-372.111.1.el8_6
  • H
CVE-2024-36005

<0:4.18.0-372.111.1.el8_6
  • H
CVE-2024-35969

<0:4.18.0-372.111.1.el8_6
  • H
CVE-2024-35958

<0:4.18.0-372.111.1.el8_6
  • H
CVE-2024-27397

<0:4.18.0-372.111.1.el8_6
  • H
CVE-2024-26804

<0:4.18.0-372.111.1.el8_6
  • H
CVE-2024-26801

<0:4.18.0-372.111.1.el8_6
  • H
Use After Free

<0:4.18.0-372.111.1.el8_6
  • H
Race Condition

<0:4.18.0-372.111.1.el8_6
  • H
Return of Wrong Status Code

<0:4.18.0-372.111.1.el8_6
  • H
Race Condition

<0:4.18.0-372.111.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.111.1.el8_6
  • H
Use After Free

<0:4.18.0-372.111.1.el8_6
  • H
Improper Input Validation

<0:4.18.0-372.111.1.el8_6
  • L
Resource Leak

*
  • L
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • H
Out-of-Bounds

<0:4.18.0-553.16.1.el8_10
  • L
Use After Free

*
  • H
Deadlock

<0:4.18.0-553.16.1.el8_10
  • M
Covert Timing Channel

*
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • L
Improper Initialization

*
  • M
Resource Injection

*
  • H
Resource Leak

<0:4.18.0-553.16.1.el8_10
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • L
Double Free

*
  • L
Resource Injection

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • L
NULL Pointer Dereference

*
  • H
Resource Leak

<0:4.18.0-553.16.1.el8_10
  • H
Resource Leak

<0:4.18.0-553.16.1.el8_10
  • M
Out-of-bounds Read

*
  • H
Double Free

<0:4.18.0-553.16.1.el8_10
  • H
Improper Input Validation

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • L
Resource Injection

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Incomplete Cleanup

*
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • H
Resource Injection

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38573

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • L
Deadlock

*
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • M
Use of Uninitialized Variable

<0:4.18.0-553.27.1.el8_10
  • H
Resource Exhaustion

<0:4.18.0-553.16.1.el8_10
  • H
Incomplete Cleanup

<0:4.18.0-553.16.1.el8_10
  • L
Out-of-bounds Read

*
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • L
Use After Free

*
  • H
Improper Initialization

<0:4.18.0-553.22.1.el8_10
  • M
Stack-based Buffer Overflow

<0:4.18.0-553.27.1.el8_10
  • L
CVE-2024-38580

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • L
Race Condition

*
  • M
Out-of-Bounds

*
  • M
Improper Initialization

<0:4.18.0-553.30.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.27.1.el8_10
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • L
Incomplete Cleanup

*
  • M
Out-of-bounds Write

*
  • L
CVE-2022-48752

*
  • L
Unchecked Return Value

*
  • L
Sequence of Processor Instructions Leads to Unexpected Behavior

*
  • L
Incomplete Internal State Distinction

*
  • L
NULL Pointer Dereference

*
  • L
Improper Resource Shutdown or Release

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Resource Injection

<0:4.18.0-553.16.1.el8_10
  • H
Missing Synchronization

<0:4.18.0-553.22.1.el8_10
  • L
Missing Initialization of Resource

*
  • L
Resource Leak

*
  • M
Resource Injection

<0:4.18.0-425.3.1.el8
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • L
Race Condition

*
  • M
Out-of-bounds Read

*
  • L
Resource Leak

*
  • M
Out-of-bounds Read

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-48751

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • L
CVE-2022-48764

*
  • H
Incorrect Default Permissions

<0:4.18.0-553.16.1.el8_10
  • H
Buffer Underflow

<0:4.18.0-553.16.1.el8_10
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Resource Leak

*
  • L
Memory Leak

*
  • M
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Improper Null Termination

*
  • L
Out-of-bounds Write

*
  • H
Use of Uninitialized Variable

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • L
Out-of-bounds Read

*
  • M
Stack-based Buffer Overflow

*
  • L
Divide By Zero

*
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Resource Injection

*
  • L
Resource Exhaustion

*
  • L
CVE-2021-47607

*
  • L
Use After Free

*
  • H
Out-of-bounds Write

<0:4.18.0-553.22.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
Deadlock

*
  • L
Use After Free

*
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • L
Information Exposure

*
  • H
Use of Uninitialized Variable

<0:4.18.0-553.16.1.el8_10
  • L
Release of Invalid Pointer or Reference

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Write

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • H
Deadlock

<0:4.18.0-372.9.1.el8
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • L
Improper Update of Reference Count

*
  • M
Integer Overflow or Wraparound

*
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-36970

*
  • L
Resource Injection

*
  • M
Resource Injection

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-26602

<0:4.18.0-477.58.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-25743

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-25742

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
Race Condition

<0:4.18.0-477.58.1.el8_8
  • M
Sensitive Information Uncleared Before Release

<0:4.18.0-477.58.1.el8_8
  • M
Use After Free

<0:4.18.0-477.58.1.el8_8
  • M
Use After Free

<0:4.18.0-477.58.1.el8_8
  • M
Resource Injection

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-26602

<0:4.18.0-477.58.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-25743

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-25742

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
Race Condition

<0:4.18.0-477.58.1.el8_8
  • M
Sensitive Information Uncleared Before Release

<0:4.18.0-477.58.1.el8_8
  • M
Use After Free

<0:4.18.0-477.58.1.el8_8
  • M
Use After Free

<0:4.18.0-477.58.1.el8_8
  • M
Resource Injection

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-26602

<0:4.18.0-477.58.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-25743

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-25742

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
Race Condition

<0:4.18.0-477.58.1.el8_8
  • M
Sensitive Information Uncleared Before Release

<0:4.18.0-477.58.1.el8_8
  • M
Use After Free

<0:4.18.0-477.58.1.el8_8
  • M
Use After Free

<0:4.18.0-477.58.1.el8_8
  • M
Resource Injection

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-26602

<0:4.18.0-477.58.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-25743

<0:4.18.0-477.58.1.el8_8
  • M
CVE-2024-25742

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.58.1.el8_8
  • M
Race Condition

<0:4.18.0-477.58.1.el8_8
  • M
Sensitive Information Uncleared Before Release

<0:4.18.0-477.58.1.el8_8
  • M
Use After Free

<0:4.18.0-477.58.1.el8_8
  • M
Use After Free

<0:4.18.0-477.58.1.el8_8
  • L
Stack-based Buffer Overflow

*
  • M
Use After Free

*
  • H
Buffer Overflow

<0:4.18.0-553.16.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Incomplete Cleanup

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • H
Stack-based Buffer Overflow

<0:4.18.0-553.16.1.el8_10
  • H
Resource Leak

<0:4.18.0-553.16.1.el8_10
  • L
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • H
Out-of-bounds Read

<0:4.18.0-553.16.1.el8_10
  • L
Resource Injection

*
  • L
Out-of-Bounds

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Race Condition

*
  • L
Out-of-bounds Read

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • H
Resource Leak

<0:4.18.0-553.16.1.el8_10
  • L
Resource Leak

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
Resource Injection

*
  • L
Improper Locking

*
  • H
Out-of-bounds Read

<0:4.18.0-553.16.1.el8_10
  • H
Divide By Zero

<0:4.18.0-553.16.1.el8_10
  • H
Improper Neutralization of Null Byte or NUL Character

<0:4.18.0-553.22.1.el8_10
  • L
Resource Leak

*
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • M
Race Condition

*
  • H
Incomplete Cleanup

<0:4.18.0-553.16.1.el8_10
  • H
Improper Initialization

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Resource Leak

<0:4.18.0-553.16.1.el8_10
  • H
Resource Injection

<0:4.18.0-553.16.1.el8_10
  • H
Improper Null Termination

<0:4.18.0-553.16.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
Improper Resource Locking

<0:4.18.0-553.22.1.el8_10
  • H
Deadlock

<0:4.18.0-553.16.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.16.1.el8_10
  • L
NULL Pointer Dereference

*
  • H
Resource Injection

<0:4.18.0-553.16.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
NULL Pointer Dereference

*
  • H
Integer Overflow or Wraparound

<0:4.18.0-553.16.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Resource Injection

*
  • H
CVE-2024-36920

<0:4.18.0-553.22.1.el8_10
  • H
Double Free

<0:4.18.0-553.16.1.el8_10
  • L
Out-of-Bounds

*
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • M
Improper Initialization

*
  • H
Out-of-bounds Read

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.22.1.el8_10
  • H
Untrusted Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • L
Use of Uninitialized Resource

*
  • H
Out-of-bounds Read

<0:4.18.0-553.16.1.el8_10
  • M
Deadlock

*
  • M
Improper Preservation of Permissions

*
  • H
Use of Uninitialized Variable

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • L
Leftover Debug Code

*
  • L
Deadlock

*
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • L
Resource Injection

*
  • L
Stack-based Buffer Overflow

*
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52881

<0:4.18.0-553.8.1.el8_10
  • L
CVE-2024-36015

*
  • M
Race Condition

<0:4.18.0-372.105.1.el8_6
  • M
Sensitive Information Uncleared Before Release

<0:4.18.0-372.105.1.el8_6
  • M
Use After Free

<0:4.18.0-372.105.1.el8_6
  • M
Race Condition

<0:4.18.0-372.105.1.el8_6
  • M
Sensitive Information Uncleared Before Release

<0:4.18.0-372.105.1.el8_6
  • M
Use After Free

<0:4.18.0-372.105.1.el8_6
  • M
Race Condition

<0:4.18.0-372.105.1.el8_6
  • M
Sensitive Information Uncleared Before Release

<0:4.18.0-372.105.1.el8_6
  • M
Use After Free

<0:4.18.0-372.105.1.el8_6
  • M
Race Condition

<0:4.18.0-372.105.1.el8_6
  • M
Sensitive Information Uncleared Before Release

<0:4.18.0-372.105.1.el8_6
  • M
Use After Free

<0:4.18.0-372.105.1.el8_6
  • L
Deadlock

*
  • H
Use After Free

<0:4.18.0-553.8.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • M
Use After Free

*
  • H
Use After Free

<0:4.18.0-553.8.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • L
Improper Input Validation

*
  • L
Resource Injection

*
  • L
Information Exposure

*
  • L
Out-of-Bounds

*
  • L
Deadlock

*
  • L
Use of Uninitialized Variable

*
  • L
Improper Update of Reference Count

*
  • M
NULL Pointer Dereference

*
  • L
Memory Leak

*
  • M
Resource Management Errors

*
  • M
Use After Free

*
  • H
CVE-2021-47441

<0:4.18.0-553.22.1.el8_10
  • M
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • L
Race Condition

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Trust Boundary Violation

*
  • L
Deadlock

*
  • M
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • M
Race Condition

*
  • H
Improper Validation of Array Index

<0:4.18.0-553.16.1.el8_10
  • M
NULL Pointer Dereference

*
  • H
Resource Exhaustion

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • L
Improper Resource Shutdown or Release

*
  • L
Deadlock

*
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
Resource Leak

<0:4.18.0-553.22.1.el8_10
  • M
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • L
Resource Leak

*
  • L
CVE-2021-47246

*
  • M
Use After Free

*
  • M
Resource Exhaustion

*
  • L
Resource Injection

*
  • L
Resource Leak

*
  • L
CVE-2021-47222

*
  • L
Improper Initialization

*
  • L
CVE-2021-47290

*
  • M
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Race Condition

*
  • M
Deadlock

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • L
Improper Locking

*
  • L
CVE-2021-47276

*
  • M
Resource Injection

*
  • M
Improper Input Validation

*
  • L
Use After Free

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Resource Injection

*
  • L
Use After Free

*
  • M
Improper Input Validation

*
  • L
Memory Leak

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • L
CVE-2021-47265

*
  • M
Out-of-bounds Read

*
  • M
Range Error

*
  • L
Resource Leak

*
  • H
Resource Leak

<0:4.18.0-553.8.1.el8_10
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • M
Divide By Zero

<0:4.18.0-348.el8
  • M
Divide By Zero

<0:4.18.0-348.el8
  • M
Divide By Zero

<0:4.18.0-348.el8
  • M
Divide By Zero

<0:4.18.0-348.el8
  • M
Divide By Zero

<0:4.18.0-348.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • M
Divide By Zero

<0:4.18.0-348.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • M
Divide By Zero

<0:4.18.0-348.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • M
Divide By Zero

<0:4.18.0-348.el8
  • M
CVE-2024-25743

<0:4.18.0-553.el8_10
  • M
CVE-2024-25742

<0:4.18.0-553.el8_10
  • M
Use After Free

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • L
Use After Free

*
  • M
Race Condition

*
  • L
Improper Validation of Array Index

*
  • H
Deadlock

<0:4.18.0-553.8.1.el8_10
  • L
NULL Pointer Dereference

*
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
Improper Input Validation

<0:4.18.0-553.8.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.16.1.el8_10
  • H
Integer Overflow or Wraparound

<0:4.18.0-553.16.1.el8_10
  • H
Improper Resource Locking

<0:4.18.0-553.22.1.el8_10
  • H
Incomplete Cleanup

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.8.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.8.1.el8_10
  • H
Improper Input Validation

<0:4.18.0-553.16.1.el8_10
  • H
Resource Leak

<0:4.18.0-553.16.1.el8_10
  • M
Memory Leak

*
  • H
Out-of-bounds Read

<0:4.18.0-553.8.1.el8_10
  • H
External Control of System or Configuration Setting

<0:4.18.0-553.8.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • M
Use After Free

*
  • M
Resource Injection

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • L
Double Free

*
  • L
Out-of-Bounds

*
  • H
Improper Input Validation

<0:4.18.0-553.8.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
Resource Injection

<0:4.18.0-553.16.1.el8_10
  • H
Stack-based Buffer Overflow

<0:4.18.0-553.16.1.el8_10
  • L
Improper Validation of Array Index

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • M
Double Free

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • H
Resource Injection

<0:4.18.0-553.16.1.el8_10
  • H
Free of Memory not on the Heap

<0:4.18.0-553.16.1.el8_10
  • L
Integer Underflow

*
  • L
Improper Resource Shutdown or Release

*
  • L
NULL Pointer Dereference

*
  • M
Stack-based Buffer Overflow

*
  • L
Improper Initialization

*
  • L
Double Free

*
  • L
Improper Initialization

*
  • M
Improper Locking

*
  • H
Use After Free

<0:4.18.0-553.8.1.el8_10
  • M
Improper Locking

*
  • H
Improper Control of a Resource Through its Lifetime

<0:4.18.0-553.16.1.el8_10
  • M
Incomplete Internal State Distinction

*
  • L
Missing Initialization of a Variable

*
  • L
Resource Injection

*
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
Resource Leak

<0:4.18.0-553.22.1.el8_10
  • H
Divide By Zero

<0:4.18.0-553.8.1.el8_10
  • L
Improper Resource Shutdown or Release

*
  • H
CVE-2021-47455

<0:4.18.0-553.22.1.el8_10
  • L
Use After Free

*
  • L
Resource Leak

*
  • M
Improper Locking

*
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.22.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Write

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.8.1.el8_10
  • M
Use After Free

*
  • L
Use After Free

*
  • L
Memory Leak

*
  • H
Resource Leak

<0:4.18.0-553.16.1.el8_10
  • M
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
Memory Leak

*
  • H
CVE-2021-47384

<0:4.18.0-553.22.1.el8_10
  • M
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
CVE-2021-47387

*
  • L
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • L
CVE-2021-47327

*
  • M
Stack-based Buffer Overflow

*
  • M
Use After Free

*
  • L
CVE-2021-47376

*
  • L
Resource Leak

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • L
Memory Leak

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Memory Leak

*
  • H
Error Handling

<0:4.18.0-553.22.1.el8_10
  • L
Resource Leak

*
  • M
Reachable Assertion

*
  • H
CVE-2021-47432

<0:4.18.0-553.22.1.el8_10
  • L
Resource Leak

*
  • M
CVE-2021-47359

*
  • M
Access of Uninitialized Pointer

*
  • M
Use After Free

*
  • L
Deadlock

*
  • L
Improper Initialization

*
  • H
Use After Free

<0:4.18.0-553.8.1.el8_10
  • L
Resource Leak

*
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • L
Resource Leak

*
  • L
Incomplete Cleanup

*
  • H
Improper Input Validation

<0:4.18.0-553.22.1.el8_10
  • L
Logging of Excessive Data

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • L
CVE-2024-35979

*
  • H
CVE-2024-35938

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35944

<0:4.18.0-553.22.1.el8_10
  • M
CVE-2024-35965

*
  • H
CVE-2024-35884

<0:4.18.0-553.22.1.el8_10
  • L
CVE-2024-35860

*
  • H
CVE-2024-35959

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35876

<0:4.18.0-553.16.1.el8_10
  • L
CVE-2024-35976

*
  • M
Memory Leak

*
  • H
CVE-2024-35989

<0:4.18.0-553.22.1.el8_10
  • M
CVE-2024-35939

<0:4.18.0-553.27.1.el8_10
  • L
CVE-2024-35934

*
  • H
CVE-2024-35952

<0:4.18.0-553.16.1.el8_10
  • L
CVE-2024-35945

*
  • H
CVE-2024-35925

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36007

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2024-35963

*
  • L
CVE-2024-35995

*
  • H
CVE-2024-36006

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36004

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2024-35983

*
  • L
CVE-2024-35961

*
  • M
CVE-2024-35957

*
  • M
CVE-2024-35885

*
  • M
CVE-2024-35933

*
  • H
CVE-2024-35877

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36005

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35958

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2024-35969

*
  • M
CVE-2024-35966

*
  • H
CVE-2024-35960

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-36000

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35924

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35937

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-35967

*
  • M
CVE-2024-35950

*
  • H
CVE-2024-35962

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35946

<0:4.18.0-553.16.1.el8_10
  • L
CVE-2024-35922

*
  • M
CVE-2024-35875

*
  • H
CVE-2024-35912

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35910

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35947

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35899

<0:4.18.0-553.16.1.el8_10
  • L
CVE-2024-35886

*
  • M
CVE-2024-35898

<0:4.18.0-553.27.1.el8_10
  • H
CVE-2024-35893

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-35895

*
  • H
CVE-2024-35888

<0:4.18.0-553.8.1.el8_10
  • L
CVE-2024-35901

*
  • H
CVE-2024-35896

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-35929

*
  • L
CVE-2024-35931

*
  • M
CVE-2024-35907

*
  • H
CVE-2024-35897

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35900

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-35905

*
  • H
CVE-2024-35890

<0:4.18.0-553.8.1.el8_10
  • L
CVE-2024-35927

*
  • L
CVE-2024-35928

*
  • L
CVE-2024-35904

*
  • H
CVE-2024-35930

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-35911

*
  • L
CVE-2023-52663

*
  • H
CVE-2023-52662

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35824

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-35808

*
  • M
CVE-2024-35803

*
  • L
CVE-2024-35843

*
  • H
CVE-2024-35789

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35835

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35845

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35814

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35852

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35853

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35855

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2024-35839

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35840

*
  • H
CVE-2024-35823

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35790

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35838

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35847

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35854

<0:4.18.0-553.8.1.el8_10
  • L
CVE-2024-35817

*
  • H
CVE-2024-35807

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35810

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-35791

*
  • L
CVE-2024-35805

*
  • L
CVE-2024-35794

*
  • M
CVE-2024-35802

*
  • H
CVE-2024-35809

<0:4.18.0-553.22.1.el8_10
  • L
CVE-2024-27431

*
  • H
CVE-2024-35801

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-27415

*
  • L
CVE-2024-27436

*
  • M
CVE-2024-27435

*
  • H
CVE-2024-27434

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-27413

*
  • L
CVE-2024-27403

*
  • H
CVE-2024-27410

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2024-27417

*
  • H
CVE-2023-52669

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2023-52698

*
  • L
CVE-2023-52697

*
  • H
CVE-2023-52686

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2023-52664

*
  • H
Double Free

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52679

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52675

<0:4.18.0-553.8.1.el8_10
  • L
CVE-2023-52680

*
  • H
CVE-2023-52658

<0:4.18.0-553.16.1.el8_10
  • L
CVE-2023-52676

*
  • H
CVE-2023-52683

<0:4.18.0-553.22.1.el8_10
  • L
CVE-2023-52689

*
  • L
CVE-2023-52674

*
  • M
Directory Traversal

<0:4.18.0-372.43.1.el8_6
  • L
CVE-2024-27398

*
  • H
CVE-2024-27397

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-27395

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-27399

<0:4.18.0-553.30.1.el8_10
  • H
CVE-2024-21823

<0:4.18.0-553.16.1.el8_10
  • M
Directory Traversal

<0:4.18.0-372.43.1.el8_6
  • L
Use After Free

*
  • M
CVE-2024-27043

<0:4.18.0-553.30.1.el8_10
  • L
CVE-2022-48700

*
  • L
CVE-2022-48690

*
  • M
Use After Free

*
  • L
CVE-2022-48694

*
  • L
CVE-2022-48697

*
  • M
Out-of-bounds Read

*
  • L
CVE-2022-48705

*
  • H
CVE-2022-48695

<0:4.18.0-477.10.1.el8_8
  • M
NULL Pointer Dereference

*
  • L
Off-by-one Error

*
  • M
CVE-2022-48703

*
  • L
CVE-2022-48704

*
  • L
CVE-2022-48702

*
  • L
CVE-2022-48701

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
CVE-2022-48696

*
  • L
Memory Leak

*
  • M
Out-of-bounds Write

<0:4.18.0-372.102.1.el8_6
  • M
Authentication Bypass

<0:4.18.0-372.102.1.el8_6
  • M
Out-of-bounds Write

<0:4.18.0-372.102.1.el8_6
  • M
Authentication Bypass

<0:4.18.0-372.102.1.el8_6
  • M
Out-of-bounds Write

<0:4.18.0-372.102.1.el8_6
  • M
Authentication Bypass

<0:4.18.0-372.102.1.el8_6
  • M
Out-of-bounds Write

<0:4.18.0-372.102.1.el8_6
  • M
Authentication Bypass

<0:4.18.0-372.102.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-425.3.1.el8
  • M
Improper Input Validation

<0:4.18.0-425.3.1.el8
  • M
Improper Input Validation

<0:4.18.0-425.3.1.el8
  • M
Improper Input Validation

<0:4.18.0-425.3.1.el8
  • H
Memory Leak

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27010

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2024-27052

<0:4.18.0-553.5.1.el8_10
  • H
CVE-2024-26960

<0:4.18.0-553.16.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-27048

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • L
CVE-2024-26938

*
  • H
CVE-2024-26974

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2024-27059

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26999

*
  • M
CVE-2024-27017

<0:4.18.0-553.27.1.el8_10
  • L
CVE-2024-26935

*
  • H
Improper Input Validation

<0:4.18.0-553.16.1.el8_10
  • H
Incomplete Cleanup

<0:4.18.0-553.16.1.el8_10
  • L
CVE-2024-27023

*
  • L
CVE-2024-27075

*
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27042

<0:4.18.0-553.22.1.el8_10
  • M
Double Free

*
  • M
CVE-2024-27056

<0:4.18.0-553.5.1.el8_10
  • M
Double Free

*
  • H
CVE-2024-27065

<0:4.18.0-553.16.1.el8_10
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27025

<0:4.18.0-553.16.1.el8_10
  • L
CVE-2024-27004

*
  • H
CVE-2024-26939

<0:4.18.0-553.22.1.el8_10
  • L
CVE-2024-26962

*
  • M
Improper Resource Locking

<0:4.18.0-553.27.1.el8_10
  • L
CVE-2024-27057

*
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-553.22.1.el8_10
  • M
CVE-2024-26976

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26964

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26993

<0:4.18.0-553.5.1.el8_10
  • H
CVE-2024-26958

<0:4.18.0-553.16.1.el8_10
  • L
CVE-2024-27073

*
  • H
CVE-2024-27011

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2024-26973

<0:4.18.0-553.5.1.el8_10
  • M
Race Condition

*
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • H
CVE-2023-52653

<0:4.18.0-553.16.1.el8_10
  • M
NULL Pointer Dereference

*
  • H
CVE-2023-52648

<0:4.18.0-553.16.1.el8_10
  • M
CVE-2022-48669

<0:4.18.0-553.5.1.el8_10
  • L
Improper Neutralization of Null Byte or NUL Character

*
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • L
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

<0:4.18.0-553.27.1.el8_10
  • H
CVE-2024-25744

<0:4.18.0-477.55.1.el8_8
  • H
Race Condition

<0:4.18.0-477.55.1.el8_8
  • H
Access of Uninitialized Pointer

<0:4.18.0-477.55.1.el8_8
  • H
Use After Free

<0:4.18.0-477.55.1.el8_8
  • H
Integer Overflow or Wraparound

<0:4.18.0-477.55.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.36.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.36.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.36.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.36.1.el8_8
  • H
CVE-2024-25744

<0:4.18.0-477.55.1.el8_8
  • H
Race Condition

<0:4.18.0-477.55.1.el8_8
  • H
Access of Uninitialized Pointer

<0:4.18.0-477.55.1.el8_8
  • H
Use After Free

<0:4.18.0-477.55.1.el8_8
  • H
Integer Overflow or Wraparound

<0:4.18.0-477.55.1.el8_8
  • H
CVE-2024-25744

<0:4.18.0-477.55.1.el8_8
  • H
Race Condition

<0:4.18.0-477.55.1.el8_8
  • H
Access of Uninitialized Pointer

<0:4.18.0-477.55.1.el8_8
  • H
Use After Free

<0:4.18.0-477.55.1.el8_8
  • H
Integer Overflow or Wraparound

<0:4.18.0-477.55.1.el8_8
  • H
CVE-2024-25744

<0:4.18.0-477.55.1.el8_8
  • H
Race Condition

<0:4.18.0-477.55.1.el8_8
  • H
Access of Uninitialized Pointer

<0:4.18.0-477.55.1.el8_8
  • H
Use After Free

<0:4.18.0-477.55.1.el8_8
  • H
Integer Overflow or Wraparound

<0:4.18.0-477.55.1.el8_8
  • M
Deadlock

*
  • L
Integer Underflow

*
  • M
NULL Pointer Dereference

*
  • L
Reachable Assertion

*
  • M
Use After Free

*
  • L
Integer Underflow

*
  • M
Incomplete Internal State Distinction

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Reachable Assertion

*
  • L
CVE-2022-48662

*
  • M
Improper Handling of Values

*
  • H
Heap-based Buffer Overflow

<0:4.18.0-553.16.1.el8_10
  • M
Attempt to Access Child of a Non-structure Pointer

*
  • L
Modules with Circular Dependencies

*
  • L
Resource Exhaustion

*
  • L
Improper Resource Shutdown or Release

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

*
  • H
Race Condition

<0:4.18.0-553.22.1.el8_10
  • M
Race Condition

<0:4.18.0-553.5.1.el8_10
  • L
Improper Input Validation

*
  • L
Use After Free

*
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Resource Leak

<0:4.18.0-553.27.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • H
Buffer Underflow

<0:4.18.0-553.16.1.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • L
Buffer Overflow

*
  • H
Stack-based Buffer Overflow

<0:4.18.0-553.16.1.el8_10
  • H
Unchecked Return Value to NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • L
Resource Leak

*
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • L
CVE-2024-26916

*
  • H
Unchecked Return Value to NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Improper Input Validation

<0:4.18.0-553.16.1.el8_10
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • L
Integer Underflow

*
  • L
Improper Input Validation

*
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
Improper Input Validation

<0:4.18.0-553.8.1.el8_10
  • H
Resource Injection

<0:4.18.0-553.8.1.el8_10
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Stack-based Buffer Overflow

*
  • H
Race Condition

<0:4.18.0-553.22.1.el8_10
  • H
Improper Input Validation

<0:4.18.0-553.16.1.el8_10
  • H
Resource Injection

<0:4.18.0-553.22.1.el8_10
  • M
Improper Input Validation

*
  • M
CVE-2024-26919

<0:4.18.0-553.5.1.el8_10
  • M
Resource Leak

<0:4.18.0-553.5.1.el8_10
  • H
Race Condition

<0:4.18.0-553.8.1.el8_10
  • L
Race Condition

*
  • H
Resource Leak

<0:4.18.0-553.16.1.el8_10
  • H
Improper Input Validation

<0:4.18.0-553.8.1.el8_10
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
Divide By Zero

<0:4.18.0-553.22.1.el8_10
  • L
NULL Pointer Dereference

*
  • M
Access of Uninitialized Pointer

<0:4.18.0-372.100.1.el8_6
  • M
Use After Free

<0:4.18.0-372.100.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-372.100.1.el8_6
  • M
Use After Free

<0:4.18.0-372.100.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.100.1.el8_6
  • M
Exposure of Resource to Wrong Sphere

<0:4.18.0-372.100.1.el8_6
  • L
Improper Input Validation

*
  • L
Stack-based Buffer Overflow

*
  • M
Access of Uninitialized Pointer

<0:4.18.0-372.100.1.el8_6
  • M
Use After Free

<0:4.18.0-372.100.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-372.100.1.el8_6
  • M
Use After Free

<0:4.18.0-372.100.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.100.1.el8_6
  • M
Exposure of Resource to Wrong Sphere

<0:4.18.0-372.100.1.el8_6
  • M
Access of Uninitialized Pointer

<0:4.18.0-372.100.1.el8_6
  • M
Use After Free

<0:4.18.0-372.100.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-372.100.1.el8_6
  • M
Use After Free

<0:4.18.0-372.100.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.100.1.el8_6
  • M
Exposure of Resource to Wrong Sphere

<0:4.18.0-372.100.1.el8_6
  • M
Access of Uninitialized Pointer

<0:4.18.0-372.100.1.el8_6
  • M
Use After Free

<0:4.18.0-372.100.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-372.100.1.el8_6
  • M
Use After Free

<0:4.18.0-372.100.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.100.1.el8_6
  • M
Exposure of Resource to Wrong Sphere

<0:4.18.0-372.100.1.el8_6
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • L
Out-of-bounds Read

*
  • M
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • L
Improper Neutralization of Null Byte or NUL Character

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-553.5.1.el8_10
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Buffer Access with Incorrect Length Value

*
  • L
Use After Free

*
  • M
Resource Leak

*
  • L
Unchecked Return Value to NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • H
CVE-2024-26801

<0:4.18.0-553.8.1.el8_10
  • L
CVE-2024-26782

*
  • L
CVE-2024-26803

*
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26804

<0:4.18.0-553.8.1.el8_10
  • M
Race Condition

<0:4.18.0-553.5.1.el8_10
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Deadlock

*
  • L
Improper Handling of Undefined Parameters

*
  • M
Resource Injection

<0:4.18.0-553.5.1.el8_10
  • H
Race Condition

<0:4.18.0-553.8.1.el8_10
  • L
Improper Input Validation

*
  • M
Improper Null Termination

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Improper Null Termination

*
  • H
Double Free

<0:4.18.0-553.16.1.el8_10
  • L
Improper Null Termination

*
  • L
Improper Input Validation

*
  • L
Stack-based Buffer Overflow

*
  • L
Write-what-where Condition

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • H
Use After Free

<0:4.18.0-553.8.1.el8_10
  • L
Improper Input Validation

*
  • H
Out-of-bounds Read

<0:4.18.0-553.16.1.el8_10
  • H
Heap-based Buffer Overflow

<0:4.18.0-553.16.1.el8_10
  • L
Unchecked Input for Loop Condition

*
  • H
Improper Handling of Values

<0:4.18.0-553.16.1.el8_10
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • H
Improper Handling of Values

<0:4.18.0-553.16.1.el8_10
  • L
Deadlock

*
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • H
Improper Resource Locking

<0:4.18.0-553.16.1.el8_10
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Deadlock

<0:4.18.0-553.22.1.el8_10
  • M
Incomplete Cleanup

<0:4.18.0-553.5.1.el8_10
  • M
Double Free

<0:4.18.0-553.5.1.el8_10
  • H
Deadlock

<0:4.18.0-553.16.1.el8_10
  • L
Race Condition

*
  • L
Improper Input Validation

*
  • H
Use After Free

<0:4.18.0-553.8.1.el8_10
  • L
Integer Overflow or Wraparound

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
Resource Leak

<0:4.18.0-553.16.1.el8_10
  • L
Resource Injection

*
  • M
Out-of-Bounds

<0:4.18.0-553.5.1.el8_10
  • M
Race Condition

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.5.1.el8_10
  • L
Resource Injection

*
  • L
Unchecked Input for Loop Condition

*
  • L
Improper Input Validation

*
  • H
Improper Input Validation

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2024-26602

<0:4.18.0-372.98.1.el8_6
  • M
Use After Free

<0:4.18.0-372.98.1.el8_6
  • M
Integer Overflow or Wraparound

<0:4.18.0-372.98.1.el8_6
  • M
CVE-2024-26602

<0:4.18.0-372.98.1.el8_6
  • M
Use After Free

<0:4.18.0-372.98.1.el8_6
  • M
Integer Overflow or Wraparound

<0:4.18.0-372.98.1.el8_6
  • M
CVE-2024-26602

<0:4.18.0-372.98.1.el8_6
  • M
Use After Free

<0:4.18.0-372.98.1.el8_6
  • M
Integer Overflow or Wraparound

<0:4.18.0-372.98.1.el8_6
  • L
Improper Locking

*
  • M
CVE-2024-26602

<0:4.18.0-372.98.1.el8_6
  • M
Use After Free

<0:4.18.0-372.98.1.el8_6
  • M
Integer Overflow or Wraparound

<0:4.18.0-372.98.1.el8_6
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • L
Resource Injection

*
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-553.16.1.el8_10
  • L
Resource Injection

*
  • L
Improper Resource Locking

*
  • H
Out-of-bounds Read

<0:4.18.0-553.8.1.el8_10
  • H
Race Condition

<0:4.18.0-553.22.1.el8_10
  • L
Resource Injection

*
  • L
Resource Injection

*
  • M
Resource Leak

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Resource Injection

*
  • L
Improper Input Validation

*
  • L
Non-exit on Failed Initialization

*
  • L
Resource Injection

*
  • M
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

<0:4.18.0-553.5.1.el8_10
  • L
Improper Cleanup on Thrown Exception

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Race Condition

<0:4.18.0-553.5.1.el8_10
  • M
Resource Injection

<0:4.18.0-553.5.1.el8_10
  • M
Resource Injection

<0:4.18.0-553.el8_10
  • H
CVE-2023-28746

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • H
Integer Underflow

<0:4.18.0-477.51.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Race Condition

<0:4.18.0-477.51.1.el8_8
  • H
CVE-2023-31084

<0:4.18.0-477.51.1.el8_8
  • H
Improperly Implemented Security Check for Standard

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.51.1.el8_8
  • H
Race Condition

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
Integer Overflow or Wraparound

<0:4.18.0-477.51.1.el8_8
  • H
Logging of Excessive Data

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • H
Integer Underflow

<0:4.18.0-477.51.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Race Condition

<0:4.18.0-477.51.1.el8_8
  • H
CVE-2023-31084

<0:4.18.0-477.51.1.el8_8
  • H
Improperly Implemented Security Check for Standard

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.51.1.el8_8
  • H
Race Condition

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
Integer Overflow or Wraparound

<0:4.18.0-477.51.1.el8_8
  • H
Logging of Excessive Data

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • H
Integer Underflow

<0:4.18.0-477.51.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Race Condition

<0:4.18.0-477.51.1.el8_8
  • H
CVE-2023-31084

<0:4.18.0-477.51.1.el8_8
  • H
Improperly Implemented Security Check for Standard

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.51.1.el8_8
  • H
Race Condition

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
Integer Overflow or Wraparound

<0:4.18.0-477.51.1.el8_8
  • H
Logging of Excessive Data

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • H
Integer Underflow

<0:4.18.0-477.51.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Race Condition

<0:4.18.0-477.51.1.el8_8
  • H
CVE-2023-31084

<0:4.18.0-477.51.1.el8_8
  • H
Improperly Implemented Security Check for Standard

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.51.1.el8_8
  • H
Race Condition

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.51.1.el8_8
  • H
Integer Overflow or Wraparound

<0:4.18.0-477.51.1.el8_8
  • H
Logging of Excessive Data

<0:4.18.0-477.51.1.el8_8
  • H
Use After Free

<0:4.18.0-477.51.1.el8_8
  • H
Double Free

<0:4.18.0-477.51.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.51.1.el8_8
  • L
Improper Input Validation

*
  • H
Improper Input Validation

<0:4.18.0-553.16.1.el8_10
  • L
Improper Input Validation

*
  • H
Resource Injection

<0:4.18.0-553.16.1.el8_10
  • M
Stack-based Buffer Overflow

*
  • M
Resource Leak

<0:4.18.0-553.5.1.el8_10
  • H
Missing Initialization of a Variable

<0:4.18.0-553.22.1.el8_10
  • H
Resource Exhaustion

<0:4.18.0-553.8.1.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Use After Free

*
  • H
Memory Leak

<0:4.18.0-553.8.1.el8_10
  • M
Use of NullPointerException Catch to Detect NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • M
Improper Input Validation

<0:4.18.0-553.5.1.el8_10
  • L
Deadlock

*
  • M
Stack-based Buffer Overflow

<0:4.18.0-553.5.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • M
Deadlock

*
  • H
Deadlock

<0:4.18.0-553.16.1.el8_10
  • M
Improper Input Validation

<0:4.18.0-553.5.1.el8_10
  • M
Improper Resource Locking

*
  • M
Out-of-bounds Read

<0:4.18.0-553.5.1.el8_10
  • M
Improper Input Validation

<0:4.18.0-553.el8_10
  • L
Improper Resource Locking

*
  • M
Use After Free

<0:4.18.0-553.el8_10
  • H
Improper Resource Locking

<0:4.18.0-553.16.1.el8_10
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Improper Protection Against Physical Side Channels

*
  • H
Race Condition

<0:4.18.0-553.22.1.el8_10
  • M
Integer Overflow to Buffer Overflow

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
Race Condition

<0:4.18.0-553.el8_10
  • M
Return of Stack Variable Address

*
  • H
Improper Resource Shutdown or Release

<0:4.18.0-553.22.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Integer Underflow

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Out-of-bounds Read

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Race Condition

<0:4.18.0-372.95.1.el8_6
  • M
Incorrect Control Flow Scoping

<0:4.18.0-372.95.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Buffer Overflow

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Out-of-bounds Write

<0:4.18.0-372.95.1.el8_6
  • M
Integer Underflow

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Out-of-bounds Read

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Race Condition

<0:4.18.0-372.95.1.el8_6
  • M
Incorrect Control Flow Scoping

<0:4.18.0-372.95.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Buffer Overflow

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Out-of-bounds Write

<0:4.18.0-372.95.1.el8_6
  • M
Integer Underflow

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Out-of-bounds Read

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Race Condition

<0:4.18.0-372.95.1.el8_6
  • M
Incorrect Control Flow Scoping

<0:4.18.0-372.95.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Buffer Overflow

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Out-of-bounds Write

<0:4.18.0-372.95.1.el8_6
  • M
Integer Underflow

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Out-of-bounds Read

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Race Condition

<0:4.18.0-372.95.1.el8_6
  • M
Incorrect Control Flow Scoping

<0:4.18.0-372.95.1.el8_6
  • M
Improper Input Validation

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Buffer Overflow

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Memory Leak

<0:4.18.0-372.95.1.el8_6
  • M
Use After Free

<0:4.18.0-372.95.1.el8_6
  • M
Out-of-bounds Write

<0:4.18.0-372.95.1.el8_6
  • L
Use After Free

*
  • M
Improper Input Validation

<0:4.18.0-425.3.1.el8
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • M
Improper Input Validation

*
  • H
Use of Uninitialized Variable

<0:4.18.0-553.22.1.el8_10
  • L
CVE-2023-52575

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • H
Improper Input Validation

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • L
Stack-based Buffer Overflow

*
  • M
Memory Leak

<0:4.18.0-553.el8_10
  • L
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.5.1.el8_10
  • L
NULL Pointer Dereference

*
  • M
Incorrect Calculation of Buffer Size

<0:4.18.0-553.el8_10
  • L
Improper Input Validation

*
  • M
CVE-2024-26602

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.5.1.el8_10
  • M
Race Condition

<0:4.18.0-553.5.1.el8_10
  • H
Memory Leak

<0:4.18.0-513.9.1.el8_9
  • L
Use After Free

*
  • M
Unchecked Return Value

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52520

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

*
  • L
Resource Injection

*
  • L
Missing Encryption of Sensitive Data

*
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • L
NULL Pointer Dereference

*
  • M
Improper Handling of Overlap Between Protected Memory Ranges

<0:4.18.0-553.5.1.el8_10
  • H
Race Condition

<0:4.18.0-553.8.1.el8_10
  • H
Resource Injection

<0:4.18.0-553.8.1.el8_10
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • M
Divide By Zero

<0:4.18.0-348.el8
  • M
Use After Free

*
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • L
Memory Leak

*
  • M
CVE-2021-47055

<0:4.18.0-553.5.1.el8_10
  • L
Memory Leak

*
  • M
NULL Pointer Dereference

*
  • H
Improper Input Validation

<0:4.18.0-553.16.1.el8_10
  • L
Improper Input Validation

*
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • M
Deadlock

*
  • L
Out-of-Bounds

*
  • M
Deadlock

*
  • M
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • M
Improper Input Validation

*
  • L
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
Use After Free

*
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • H
Resource Leak

<0:4.18.0-553.8.1.el8_10
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • M
Memory Leak

<0:4.18.0-553.5.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • L
Use After Free

*
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • M
Improper Check or Handling of Exceptional Conditions

<0:4.18.0-553.5.1.el8_10
  • H
Deadlock

<0:4.18.0-553.16.1.el8_10
  • L
Resource Leak

*
  • L
Resource Injection

*
  • L
Missing Support for Integrity Check

*
  • L
Use After Free

*
  • L
Improper Input Validation

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • M
Race Condition

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • L
Range Error

*
  • M
Improper Input Validation

*
  • L
Divide By Zero

*
  • L
Information Exposure

*
  • H
Unchecked Error Condition

<0:4.18.0-553.8.1.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.27.1.el8_10
  • M
Out-of-bounds Read

*
  • L
CVE-2023-52474

*
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • L
NULL Pointer Dereference

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.5.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • M
Use After Free

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.16.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • L
Improper Initialization

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • L
Untrusted Pointer Dereference

*
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • L
Use After Free

*
  • M
NULL Pointer Dereference

*
  • H
Buffer Access with Incorrect Length Value

<0:4.18.0-553.8.1.el8_10
  • H
Return of Wrong Status Code

<0:4.18.0-553.8.1.el8_10
  • H
Race Condition

<0:4.18.0-553.8.1.el8_10
  • H
Race Condition

<0:4.18.0-553.8.1.el8_10
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • H
Race Condition

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
CVE-2023-31084

<0:4.18.0-372.93.1.el8_6
  • H
Improperly Implemented Security Check for Standard

<0:4.18.0-372.93.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.93.1.el8_6
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
CVE-2022-23960

<0:4.18.0-372.93.1.el8_6
  • H
Insecure Default Initialization of Resource

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • L
Out-of-Bounds

*
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-Bounds

<0:4.18.0-553.el8_10
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • H
Race Condition

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
CVE-2023-31084

<0:4.18.0-372.93.1.el8_6
  • H
Improperly Implemented Security Check for Standard

<0:4.18.0-372.93.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.93.1.el8_6
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
CVE-2022-23960

<0:4.18.0-372.93.1.el8_6
  • H
Insecure Default Initialization of Resource

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • H
Race Condition

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
CVE-2023-31084

<0:4.18.0-372.93.1.el8_6
  • H
Improperly Implemented Security Check for Standard

<0:4.18.0-372.93.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.93.1.el8_6
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
CVE-2022-23960

<0:4.18.0-372.93.1.el8_6
  • H
Insecure Default Initialization of Resource

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • H
Race Condition

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
CVE-2023-31084

<0:4.18.0-372.93.1.el8_6
  • H
Improperly Implemented Security Check for Standard

<0:4.18.0-372.93.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.93.1.el8_6
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
Use After Free

<0:4.18.0-372.93.1.el8_6
  • H
CVE-2022-23960

<0:4.18.0-372.93.1.el8_6
  • H
Insecure Default Initialization of Resource

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.93.1.el8_6
  • M
Improper Authentication

*
  • M
CVE-2024-25744

<0:4.18.0-553.5.1.el8_10
  • L
Memory Leak

*
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.16.1.el8_10
  • M
Stack-based Buffer Overflow

*
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Privilege Management

<0:4.18.0-372.91.1.el8_6
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Expected Behavior Violation

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
CVE-2022-36946

<0:4.18.0-372.91.1.el8_6
  • H
Write-what-where Condition

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Logging of Excessive Data

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Preservation of Permissions

<0:4.18.0-372.91.1.el8_6
  • H
Use of Uninitialized Resource

<0:4.18.0-372.91.1.el8_6
  • H
Release of Invalid Pointer or Reference

<0:4.18.0-372.91.1.el8_6
  • H
Privilege Defined With Unsafe Actions

<0:4.18.0-372.91.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Insufficient Comparison

<0:4.18.0-372.91.1.el8_6
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Privilege Management

<0:4.18.0-372.91.1.el8_6
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Expected Behavior Violation

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
CVE-2022-36946

<0:4.18.0-372.91.1.el8_6
  • H
Write-what-where Condition

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Logging of Excessive Data

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Preservation of Permissions

<0:4.18.0-372.91.1.el8_6
  • H
Use of Uninitialized Resource

<0:4.18.0-372.91.1.el8_6
  • H
Release of Invalid Pointer or Reference

<0:4.18.0-372.91.1.el8_6
  • H
Privilege Defined With Unsafe Actions

<0:4.18.0-372.91.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Insufficient Comparison

<0:4.18.0-372.91.1.el8_6
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Privilege Management

<0:4.18.0-372.91.1.el8_6
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Expected Behavior Violation

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
CVE-2022-36946

<0:4.18.0-372.91.1.el8_6
  • H
Write-what-where Condition

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Logging of Excessive Data

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Preservation of Permissions

<0:4.18.0-372.91.1.el8_6
  • H
Use of Uninitialized Resource

<0:4.18.0-372.91.1.el8_6
  • H
Release of Invalid Pointer or Reference

<0:4.18.0-372.91.1.el8_6
  • H
Privilege Defined With Unsafe Actions

<0:4.18.0-372.91.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Insufficient Comparison

<0:4.18.0-372.91.1.el8_6
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Privilege Management

<0:4.18.0-372.91.1.el8_6
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Expected Behavior Violation

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
CVE-2022-36946

<0:4.18.0-372.91.1.el8_6
  • H
Write-what-where Condition

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Logging of Excessive Data

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
Double Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-372.91.1.el8_6
  • H
Use After Free

<0:4.18.0-372.91.1.el8_6
  • H
Improper Preservation of Permissions

<0:4.18.0-372.91.1.el8_6
  • H
Use of Uninitialized Resource

<0:4.18.0-372.91.1.el8_6
  • H
Release of Invalid Pointer or Reference

<0:4.18.0-372.91.1.el8_6
  • H
Privilege Defined With Unsafe Actions

<0:4.18.0-372.91.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.91.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.91.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.91.1.el8_6
  • H
Race Condition

<0:4.18.0-372.91.1.el8_6
  • H
Insufficient Comparison

<0:4.18.0-372.91.1.el8_6
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-372.91.1.el8_6
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • M
Information Exposure

<0:4.18.0-553.5.1.el8_10
  • H
Use After Free

<0:4.18.0-513.24.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • L
Information Exposure

*
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-513.24.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Double Free

<0:4.18.0-477.43.1.el8_8
  • H
Improper Privilege Management

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Buffer Overflow

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • H
Double Free

<0:4.18.0-477.43.1.el8_8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-477.43.1.el8_8
  • H
Incorrect Calculation

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Double Free

<0:4.18.0-477.43.1.el8_8
  • H
Improper Privilege Management

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Buffer Overflow

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • H
Double Free

<0:4.18.0-477.43.1.el8_8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-477.43.1.el8_8
  • H
Incorrect Calculation

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Double Free

<0:4.18.0-477.43.1.el8_8
  • H
Improper Privilege Management

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Buffer Overflow

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • H
Double Free

<0:4.18.0-477.43.1.el8_8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-477.43.1.el8_8
  • H
Incorrect Calculation

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Double Free

<0:4.18.0-477.43.1.el8_8
  • H
Improper Privilege Management

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Buffer Overflow

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Race Condition

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • H
Double Free

<0:4.18.0-477.43.1.el8_8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-477.43.1.el8_8
  • H
Incorrect Calculation

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Use After Free

<0:4.18.0-477.43.1.el8_8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-477.43.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.43.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.43.1.el8_8
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • M
Resource Exhaustion

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Double Free

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Integer Underflow

<0:4.18.0-372.87.1.el8_6
  • H
Improper Validation of Array Index

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Bitwise Shift of Integer

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Double Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Calculation

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition During Access to Alternate Channel

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Default Permissions

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Missing Initialization of Resource

<0:4.18.0-372.87.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Double Free

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Integer Underflow

<0:4.18.0-372.87.1.el8_6
  • H
Improper Validation of Array Index

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Bitwise Shift of Integer

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Double Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Calculation

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition During Access to Alternate Channel

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Default Permissions

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Missing Initialization of Resource

<0:4.18.0-372.87.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Double Free

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Integer Underflow

<0:4.18.0-372.87.1.el8_6
  • H
Improper Validation of Array Index

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Bitwise Shift of Integer

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Double Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Calculation

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition During Access to Alternate Channel

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Default Permissions

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Missing Initialization of Resource

<0:4.18.0-372.87.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Double Free

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Integer Underflow

<0:4.18.0-372.87.1.el8_6
  • H
Improper Validation of Array Index

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Bitwise Shift of Integer

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Double Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Calculation

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.87.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition During Access to Alternate Channel

<0:4.18.0-372.87.1.el8_6
  • H
Race Condition

<0:4.18.0-372.87.1.el8_6
  • H
Incorrect Default Permissions

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Improper Locking

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-372.87.1.el8_6
  • H
Missing Initialization of Resource

<0:4.18.0-372.87.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.87.1.el8_6
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.24.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.18.1.el8_9
  • M
Deadlock

*
  • M
Deadlock

*
  • M
Improper Handling of Values

*
  • H
Integer Underflow

<0:4.18.0-513.24.1.el8_9
  • M
Use After Free

*
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • H
Out-of-Bounds

<0:4.18.0-553.22.1.el8_10
  • H
Resource Leak

<0:4.18.0-513.5.1.el8_9
  • H
Resource Exhaustion

<0:4.18.0-553.22.1.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Information Exposure

<0:4.18.0-553.5.1.el8_10
  • M
Race Condition

<0:4.18.0-553.el8_10
  • H
Race Condition

<0:4.18.0-513.24.1.el8_9
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • H
Out-of-bounds Write

<0:4.18.0-513.24.1.el8_9
  • M
Use After Free

<0:4.18.0-553.el8_10
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • M
Man-in-the-Middle (MitM)

<0:4.18.0-553.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Integer Underflow

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Improper Validation of Array Index

<0:4.18.0-477.36.1.el8_8
  • H
Double Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Information Exposure

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Integer Underflow

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Improper Validation of Array Index

<0:4.18.0-477.36.1.el8_8
  • H
Double Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Information Exposure

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Integer Underflow

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Improper Validation of Array Index

<0:4.18.0-477.36.1.el8_8
  • H
Double Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Information Exposure

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Integer Underflow

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Improper Validation of Array Index

<0:4.18.0-477.36.1.el8_8
  • H
Double Free

<0:4.18.0-477.36.1.el8_8
  • H
Use After Free

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Race Condition

<0:4.18.0-477.36.1.el8_8
  • H
Information Exposure

<0:4.18.0-477.36.1.el8_8
  • H
Double Free

<0:4.18.0-305.114.1.el8_4
  • H
Improper Zeroization of Hardware Register

<0:4.18.0-305.114.1.el8_4
  • H
Use After Free

<0:4.18.0-372.80.1.el8_6
  • H
Double Free

<0:4.18.0-372.80.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • H
Use After Free

<0:4.18.0-372.80.1.el8_6
  • H
Double Free

<0:4.18.0-372.80.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • H
Use After Free

<0:4.18.0-372.80.1.el8_6
  • H
Double Free

<0:4.18.0-372.80.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • H
Use After Free

<0:4.18.0-372.80.1.el8_6
  • H
Double Free

<0:4.18.0-372.80.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • H
Race Condition

<0:4.18.0-372.80.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • H
Out-of-Bounds

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-305.103.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-372.70.1.el8_6
  • H
Use After Free

<0:4.18.0-305.108.1.el8_4
  • H
Use After Free

<0:4.18.0-305.108.1.el8_4
  • H
Double Free

<0:4.18.0-305.108.1.el8_4
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-305.108.1.el8_4
  • H
NULL Pointer Dereference

<0:4.18.0-305.108.1.el8_4
  • M
Race Condition

<0:4.18.0-553.el8_10
  • L
Use After Free

*
  • H
Improper Handling of Exceptional Conditions

<0:4.18.0-553.8.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-513.18.1.el8_9
  • H
Improper Privilege Management

<0:4.18.0-513.18.1.el8_9
  • H
Improper Update of Reference Count

<0:4.18.0-513.11.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • M
Out-of-bounds Write

<0:4.18.0-553.el8_10
  • H
Buffer Overflow

<0:4.18.0-513.18.1.el8_9
  • H
Double Free

<0:4.18.0-513.9.1.el8_9
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • H
Integer Underflow

<0:4.18.0-513.11.1.el8_9
  • H
Incorrect Calculation

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.11.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • M
Use After Free

<0:4.18.0-553.el8_10
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • M
Improper Access Control

<0:4.18.0-553.el8_10
  • M
Use After Free

*
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • M
Improper Validation of Array Index

<0:4.18.0-553.el8_10
  • H
Information Exposure

<0:4.18.0-513.11.1.el8_9
  • H
Information Exposure

<0:4.18.0-513.5.1.el8_9
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • L
Use After Free

*
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-513.5.1.el8_9
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • M
Use After Free

<0:4.18.0-553.el8_10
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-305.103.1.el8_4
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Improper Zeroization of Hardware Register

<0:4.18.0-477.27.1.el8_8
  • H
Improper Zeroization of Hardware Register

<0:4.18.0-372.70.1.el8_6
  • H
Improper Zeroization of Hardware Register

<0:4.18.0-477.27.1.el8_8
  • H
Improper Zeroization of Hardware Register

<0:4.18.0-372.70.1.el8_6
  • H
Improper Zeroization of Hardware Register

<0:4.18.0-477.27.1.el8_8
  • H
Improper Zeroization of Hardware Register

<0:4.18.0-372.70.1.el8_6
  • H
Improper Zeroization of Hardware Register

<0:4.18.0-372.70.1.el8_6
  • H
Improper Zeroization of Hardware Register

<0:4.18.0-477.27.1.el8_8
  • H
Improper Zeroization of Hardware Register

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • M
Information Exposure

*
  • H
Out-of-bounds Read

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-372.75.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-372.75.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-305.103.1.el8_4
  • H
Out-of-bounds Read

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-372.75.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.75.1.el8_6
  • M
Use After Free

<0:4.18.0-553.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-372.75.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-372.75.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-305.103.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-372.75.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-305.103.1.el8_4
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-513.5.1.el8_9
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.75.1.el8_6
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.75.1.el8_6
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.75.1.el8_6
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.75.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-305.103.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-372.70.1.el8_6
  • L
NULL Pointer Dereference

*
  • H
Resource Leak

<0:4.18.0-372.9.1.el8
  • H
Resource Leak

<0:4.18.0-372.9.1.el8
  • H
Resource Leak

<0:4.18.0-372.9.1.el8
  • H
Resource Leak

<0:4.18.0-372.9.1.el8
  • H
Resource Leak

<0:4.18.0-372.9.1.el8
  • H
Resource Leak

<0:4.18.0-372.9.1.el8
  • H
Resource Leak

<0:4.18.0-372.9.1.el8
  • H
Resource Leak

<0:4.18.0-372.9.1.el8
  • H
Resource Leak

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.5.1.el8_9
  • L
Use After Free

*
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Incorrect Bitwise Shift of Integer

<0:4.18.0-513.5.1.el8_9
  • H
CVE-2023-31084

<0:4.18.0-513.5.1.el8_9
  • M
Divide By Zero

*
  • M
Race Condition

<0:4.18.0-553.el8_10
  • M
Release of Invalid Pointer or Reference

*
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.46.1.el8_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.46.1.el8_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.46.1.el8_6
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-372.46.1.el8_6
  • M
Sensitive Information Uncleared Before Release

*
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-372.64.1.el8_6
  • H
Use After Free

<0:4.18.0-477.13.1.el8_8
  • H
Use After Free

<0:4.18.0-477.13.1.el8_8
  • H
Use After Free

<0:4.18.0-477.13.1.el8_8
  • H
Use After Free

<0:4.18.0-372.64.1.el8_6
  • H
Use After Free

<0:4.18.0-372.64.1.el8_6
  • H
Use After Free

<0:4.18.0-477.13.1.el8_8
  • H
Use After Free

<0:4.18.0-477.13.1.el8_8
  • H
Use After Free

<0:4.18.0-305.97.1.el8_4
  • H
Use After Free

<0:4.18.0-372.64.1.el8_6
  • H
Execution with Unnecessary Privileges

<0:4.18.0-372.70.1.el8_6
  • H
Execution with Unnecessary Privileges

<0:4.18.0-372.70.1.el8_6
  • H
Execution with Unnecessary Privileges

<0:4.18.0-372.70.1.el8_6
  • H
Execution with Unnecessary Privileges

<0:4.18.0-477.27.1.el8_8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-477.27.1.el8_8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-305.103.1.el8_4
  • H
Execution with Unnecessary Privileges

<0:4.18.0-372.70.1.el8_6
  • H
Execution with Unnecessary Privileges

<0:4.18.0-477.27.1.el8_8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-477.27.1.el8_8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-477.27.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Improper Resource Locking

<0:4.18.0-513.5.1.el8_9
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-477.10.1.el8_8
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-477.10.1.el8_8
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-477.10.1.el8_8
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-477.10.1.el8_8
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-477.10.1.el8_8
  • H
Improperly Implemented Security Check for Standard

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-305.103.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-477.21.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-305.103.1.el8_4
  • H
Out-of-bounds Read

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.70.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.11.1.el8_9
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-513.5.1.el8_9
  • M
Incorrect Authorization

<0:4.18.0-425.3.1.el8
  • M
Incorrect Authorization

<0:4.18.0-425.3.1.el8
  • M
Incorrect Authorization

<0:4.18.0-425.3.1.el8
  • M
Incorrect Authorization

<0:4.18.0-425.3.1.el8
  • M
Incorrect Authorization

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • M
Double Free

<0:4.18.0-553.el8_10
  • H
Interpretation Conflict

<0:4.18.0-477.10.1.el8_8
  • H
Interpretation Conflict

<0:4.18.0-477.10.1.el8_8
  • H
Interpretation Conflict

<0:4.18.0-477.10.1.el8_8
  • H
Interpretation Conflict

<0:4.18.0-477.10.1.el8_8
  • H
Interpretation Conflict

<0:4.18.0-477.10.1.el8_8
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-372.70.1.el8_6
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-477.27.1.el8_8
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-477.27.1.el8_8
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-477.27.1.el8_8
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-372.70.1.el8_6
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-372.70.1.el8_6
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-372.70.1.el8_6
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-477.27.1.el8_8
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-477.27.1.el8_8
  • M
Out-of-bounds Read

*
  • H
Use After Free

<0:4.18.0-305.97.1.el8_4
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-372.64.1.el8_6
  • H
Use After Free

<0:4.18.0-372.64.1.el8_6
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-372.64.1.el8_6
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-372.64.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Improper Ownership Management

<0:4.18.0-372.51.1.el8_6
  • H
Improper Ownership Management

<0:4.18.0-425.19.2.el8_7
  • H
Improper Ownership Management

<0:4.18.0-372.51.1.el8_6
  • H
Improper Ownership Management

<0:4.18.0-425.19.2.el8_7
  • H
Improper Ownership Management

<0:4.18.0-425.19.2.el8_7
  • H
Improper Ownership Management

<0:4.18.0-425.19.2.el8_7
  • H
Improper Ownership Management

<0:4.18.0-425.19.2.el8_7
  • H
Improper Ownership Management

<0:4.18.0-372.51.1.el8_6
  • H
Improper Ownership Management

<0:4.18.0-372.51.1.el8_6
  • M
Improper Initialization

<0:4.18.0-553.el8_10
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • M
Use After Free

<0:4.18.0-477.15.1.el8_8
  • M
Use After Free

<0:4.18.0-477.15.1.el8_8
  • M
Use After Free

<0:4.18.0-477.15.1.el8_8
  • M
Use After Free

<0:4.18.0-477.15.1.el8_8
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • M
Use After Free

<0:4.18.0-477.15.1.el8_8
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Authentication Bypass

<0:4.18.0-372.75.1.el8_6
  • H
Authentication Bypass

<0:4.18.0-372.75.1.el8_6
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • H
Authentication Bypass

<0:4.18.0-372.75.1.el8_6
  • H
Authentication Bypass

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-372.52.1.el8_6
  • H
Use After Free

<0:4.18.0-305.86.2.el8_4
  • H
Use After Free

<0:4.18.0-305.86.2.el8_4
  • H
Use After Free

<0:4.18.0-372.52.1.el8_6
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-305.86.2.el8_4
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-372.52.1.el8_6
  • H
Use After Free

<0:4.18.0-372.52.1.el8_6
  • H
Use After Free

<0:4.18.0-305.86.2.el8_4
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-372.75.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-372.75.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-372.75.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-372.75.1.el8_6
  • M
Use After Free

*
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-513.5.1.el8_9
  • H
Memory Leak

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.18.1.el8_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • L
Externally Controlled Reference to a Resource in Another Sphere

*
  • H
Memory Leak

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Write-what-where Condition

<0:4.18.0-477.10.1.el8_8
  • H
Write-what-where Condition

<0:4.18.0-477.10.1.el8_8
  • H
Write-what-where Condition

<0:4.18.0-477.10.1.el8_8
  • H
Write-what-where Condition

<0:4.18.0-477.10.1.el8_8
  • H
Write-what-where Condition

<0:4.18.0-477.10.1.el8_8
  • L
Use After Free

*
  • H
Use After Free

<0:4.18.0-305.86.2.el8_4
  • H
Use After Free

<0:4.18.0-372.51.1.el8_6
  • H
Use After Free

<0:4.18.0-425.19.2.el8_7
  • H
Use After Free

<0:4.18.0-425.19.2.el8_7
  • H
Use After Free

<0:4.18.0-425.19.2.el8_7
  • H
Use After Free

<0:4.18.0-425.19.2.el8_7
  • H
Use After Free

<0:4.18.0-372.51.1.el8_6
  • H
Use After Free

<0:4.18.0-305.86.2.el8_4
  • H
Use After Free

<0:4.18.0-425.19.2.el8_7
  • H
Use After Free

<0:4.18.0-372.51.1.el8_6
  • H
Use After Free

<0:4.18.0-305.86.2.el8_4
  • H
Use After Free

<0:4.18.0-305.86.2.el8_4
  • H
Use After Free

<0:4.18.0-372.51.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
Insecure Default Initialization of Resource

<0:4.18.0-477.10.1.el8_8
  • H
Insecure Default Initialization of Resource

<0:4.18.0-477.10.1.el8_8
  • H
Insecure Default Initialization of Resource

<0:4.18.0-477.10.1.el8_8
  • H
Insecure Default Initialization of Resource

<0:4.18.0-477.10.1.el8_8
  • H
Insecure Default Initialization of Resource

<0:4.18.0-477.10.1.el8_8
  • L
Memory Leak

*
  • H
Non-exit on Failed Initialization

<0:4.18.0-477.10.1.el8_8
  • H
Non-exit on Failed Initialization

<0:4.18.0-477.10.1.el8_8
  • H
Non-exit on Failed Initialization

<0:4.18.0-477.10.1.el8_8
  • H
Non-exit on Failed Initialization

<0:4.18.0-477.10.1.el8_8
  • H
Non-exit on Failed Initialization

<0:4.18.0-477.10.1.el8_8
  • L
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Logging of Excessive Data

<0:4.18.0-513.5.1.el8_9
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
Buffer Overflow

<0:4.18.0-305.82.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-425.19.2.el8_7
  • H
Buffer Overflow

<0:4.18.0-305.82.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-305.82.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-372.57.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-372.57.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-372.57.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-425.19.2.el8_7
  • H
Buffer Overflow

<0:4.18.0-372.57.1.el8_6
  • H
Buffer Overflow

<0:4.18.0-425.19.2.el8_7
  • H
Buffer Overflow

<0:4.18.0-305.82.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-425.19.2.el8_7
  • H
Buffer Overflow

<0:4.18.0-425.19.2.el8_7
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.el8_10
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.10.1.el8_8
  • M
Use After Free

<0:4.18.0-553.el8_10
  • H
Use After Free

<0:4.18.0-305.82.1.el8_4
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-305.82.1.el8_4
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Use After Free

<0:4.18.0-305.82.1.el8_4
  • H
Use After Free

<0:4.18.0-305.82.1.el8_4
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • M
Race Condition

*
  • H
Deadlock

<0:4.18.0-425.19.2.el8_7
  • H
Deadlock

<0:4.18.0-305.82.1.el8_4
  • H
Deadlock

<0:4.18.0-425.19.2.el8_7
  • H
Deadlock

<0:4.18.0-305.82.1.el8_4
  • H
Deadlock

<0:4.18.0-305.82.1.el8_4
  • H
Deadlock

<0:4.18.0-305.82.1.el8_4
  • H
Deadlock

<0:4.18.0-372.46.1.el8_6
  • H
Deadlock

<0:4.18.0-425.19.2.el8_7
  • H
Deadlock

<0:4.18.0-425.19.2.el8_7
  • H
Deadlock

<0:4.18.0-372.46.1.el8_6
  • H
Deadlock

<0:4.18.0-425.19.2.el8_7
  • H
Deadlock

<0:4.18.0-372.46.1.el8_6
  • H
Deadlock

<0:4.18.0-372.46.1.el8_6
  • H
Improper Preservation of Permissions

<0:4.18.0-305.76.1.el8_4
  • H
Improper Preservation of Permissions

<0:4.18.0-372.41.1.el8_6
  • H
Improper Preservation of Permissions

<0:4.18.0-425.10.1.el8_7
  • H
Improper Preservation of Permissions

<0:4.18.0-372.41.1.el8_6
  • H
Improper Preservation of Permissions

<0:4.18.0-425.10.1.el8_7
  • H
Improper Preservation of Permissions

<0:4.18.0-425.10.1.el8_7
  • H
Improper Preservation of Permissions

<0:4.18.0-305.76.1.el8_4
  • H
Improper Preservation of Permissions

<0:4.18.0-372.41.1.el8_6
  • H
Improper Preservation of Permissions

<0:4.18.0-425.10.1.el8_7
  • H
Improper Preservation of Permissions

<0:4.18.0-305.76.1.el8_4
  • H
Improper Preservation of Permissions

<0:4.18.0-425.10.1.el8_7
  • H
Improper Preservation of Permissions

<0:4.18.0-372.41.1.el8_6
  • H
Improper Preservation of Permissions

<0:4.18.0-305.76.1.el8_4
  • H
Memory Leak

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • M
Race Condition

*
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-305.91.1.el8_4
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-372.70.1.el8_6
  • H
Access of Uninitialized Pointer

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition During Access to Alternate Channel

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition During Access to Alternate Channel

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition During Access to Alternate Channel

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition During Access to Alternate Channel

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition During Access to Alternate Channel

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-425.13.1.el8_7
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-425.13.1.el8_7
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-425.13.1.el8_7
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-425.13.1.el8_7
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-425.13.1.el8_7
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
CVE-2022-23960

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-23960

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-23960

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-23960

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-23960

<0:4.18.0-425.3.1.el8
  • M
Information Exposure

<0:4.18.0-425.3.1.el8
  • M
Information Exposure

<0:4.18.0-425.3.1.el8
  • H
Information Exposure

<0:4.18.0-372.41.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.41.1.el8_6
  • M
Information Exposure

<0:4.18.0-425.3.1.el8
  • M
Information Exposure

<0:4.18.0-425.3.1.el8
  • H
Information Exposure

<0:4.18.0-372.41.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.41.1.el8_6
  • M
Information Exposure

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-425.13.1.el8_7
  • H
Use After Free

<0:4.18.0-372.46.1.el8_6
  • H
Use After Free

<0:4.18.0-425.13.1.el8_7
  • H
Use After Free

<0:4.18.0-372.46.1.el8_6
  • H
Use After Free

<0:4.18.0-425.13.1.el8_7
  • H
Use After Free

<0:4.18.0-372.46.1.el8_6
  • H
Use After Free

<0:4.18.0-425.13.1.el8_7
  • H
Use After Free

<0:4.18.0-425.13.1.el8_7
  • H
Use After Free

<0:4.18.0-372.46.1.el8_6
  • H
Double Free

<0:4.18.0-477.10.1.el8_8
  • H
Double Free

<0:4.18.0-477.10.1.el8_8
  • H
Double Free

<0:4.18.0-477.10.1.el8_8
  • H
Double Free

<0:4.18.0-477.10.1.el8_8
  • H
Double Free

<0:4.18.0-477.10.1.el8_8
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • L
Expected Behavior Violation

*
  • H
Incorrect Control Flow Scoping

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Control Flow Scoping

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Control Flow Scoping

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Control Flow Scoping

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Control Flow Scoping

<0:4.18.0-477.10.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.10.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.10.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.10.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.10.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Buffer Overflow

<0:4.18.0-477.10.1.el8_8
  • H
Buffer Overflow

<0:4.18.0-477.10.1.el8_8
  • H
Buffer Overflow

<0:4.18.0-477.10.1.el8_8
  • H
Buffer Overflow

<0:4.18.0-477.10.1.el8_8
  • H
Buffer Overflow

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.24.1.el8_9
  • H
Integer Overflow or Wraparound

<0:4.18.0-513.11.1.el8_9
  • M
Buffer Overflow

*
  • M
Use After Free

*
  • L
Race Condition

*
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Use After Free

<0:4.18.0-372.57.1.el8_6
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Expected Behavior Violation

<0:4.18.0-477.10.1.el8_8
  • H
Expected Behavior Violation

<0:4.18.0-477.10.1.el8_8
  • H
Expected Behavior Violation

<0:4.18.0-477.10.1.el8_8
  • H
Expected Behavior Violation

<0:4.18.0-477.10.1.el8_8
  • H
Expected Behavior Violation

<0:4.18.0-477.10.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Write

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Write

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Write

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Write

<0:4.18.0-425.3.1.el8
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-477.10.1.el8_8
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-477.10.1.el8_8
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-477.10.1.el8_8
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-477.10.1.el8_8
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • L
Out-of-bounds Read

*
  • H
Out-of-Bounds

<0:4.18.0-425.10.1.el8_7
  • H
Out-of-Bounds

<0:4.18.0-305.76.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-372.46.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-305.76.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-372.46.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-372.46.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-305.76.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-305.76.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-425.10.1.el8_7
  • H
Out-of-Bounds

<0:4.18.0-425.10.1.el8_7
  • H
Out-of-Bounds

<0:4.18.0-372.46.1.el8_6
  • H
Out-of-Bounds

<0:4.18.0-425.10.1.el8_7
  • H
Out-of-Bounds

<0:4.18.0-425.10.1.el8_7
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Improper Update of Reference Count

<0:4.18.0-477.10.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-477.10.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-477.10.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-477.10.1.el8_8
  • H
Improper Update of Reference Count

<0:4.18.0-372.75.1.el8_6
  • H
Improper Update of Reference Count

<0:4.18.0-372.75.1.el8_6
  • H
Improper Update of Reference Count

<0:4.18.0-372.75.1.el8_6
  • H
Improper Update of Reference Count

<0:4.18.0-372.75.1.el8_6
  • H
Improper Update of Reference Count

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-372.75.1.el8_6
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-425.13.1.el8_7
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-425.13.1.el8_7
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-372.75.1.el8_6
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-372.75.1.el8_6
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-425.13.1.el8_7
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-425.13.1.el8_7
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-372.75.1.el8_6
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-425.13.1.el8_7
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Incomplete Cleanup

<0:4.18.0-305.65.1.el8_4
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Use After Free

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-305.65.1.el8_4
  • H
Use After Free

<0:4.18.0-305.65.1.el8_4
  • H
Use After Free

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-305.65.1.el8_4
  • H
Use After Free

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-305.65.1.el8_4
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-36946

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-36946

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-36946

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-36946

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-36946

<0:4.18.0-425.3.1.el8
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-305.72.1.el8_4
  • M
Incorrect Conversion between Numeric Types

<0:4.18.0-425.3.1.el8
  • M
Incorrect Conversion between Numeric Types

<0:4.18.0-425.3.1.el8
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-305.72.1.el8_4
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.36.1.el8_6
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.36.1.el8_6
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-305.72.1.el8_4
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.36.1.el8_6
  • M
Incorrect Conversion between Numeric Types

<0:4.18.0-425.3.1.el8
  • M
Incorrect Conversion between Numeric Types

<0:4.18.0-425.3.1.el8
  • M
Incorrect Conversion between Numeric Types

<0:4.18.0-425.3.1.el8
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.36.1.el8_6
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-305.72.1.el8_4
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-372.75.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-372.75.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.75.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.75.1.el8_6
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Out-of-bounds Write

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-372.70.1.el8_6
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • H
Use After Free

<0:4.18.0-305.57.1.el8_4
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • H
Use After Free

<0:4.18.0-305.57.1.el8_4
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • H
Use After Free

<0:4.18.0-305.57.1.el8_4
  • H
Use After Free

<0:4.18.0-193.87.1.el8_2
  • H
Use After Free

<0:4.18.0-305.57.1.el8_4
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • H
Use After Free

<0:4.18.0-193.87.1.el8_2
  • H
Use After Free

<0:4.18.0-193.87.1.el8_2
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • H
Use After Free

<0:4.18.0-193.87.1.el8_2
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Public Key Re-Use for Signing both Debug and Production Code

*
  • M
Privilege Defined With Unsafe Actions

<0:4.18.0-425.3.1.el8
  • M
Privilege Defined With Unsafe Actions

<0:4.18.0-425.3.1.el8
  • M
Privilege Defined With Unsafe Actions

<0:4.18.0-425.3.1.el8
  • M
Privilege Defined With Unsafe Actions

<0:4.18.0-425.3.1.el8
  • M
Privilege Defined With Unsafe Actions

<0:4.18.0-425.3.1.el8
  • M
Buffer Overflow

<0:4.18.0-425.3.1.el8
  • M
Buffer Overflow

<0:4.18.0-425.3.1.el8
  • M
Buffer Overflow

<0:4.18.0-425.3.1.el8
  • M
Buffer Overflow

<0:4.18.0-425.3.1.el8
  • M
Buffer Overflow

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Write

*
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-305.71.1.el8_4
  • H
Use After Free

<0:4.18.0-372.36.1.el8_6
  • H
Use After Free

<0:4.18.0-372.36.1.el8_6
  • H
Use After Free

<0:4.18.0-305.71.1.el8_4
  • H
Use After Free

<0:4.18.0-305.71.1.el8_4
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-372.36.1.el8_6
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-305.71.1.el8_4
  • H
Use After Free

<0:4.18.0-372.36.1.el8_6
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-193.87.1.el8_2
  • H
Use After Free

<0:4.18.0-193.87.1.el8_2
  • H
Use After Free

<0:4.18.0-193.87.1.el8_2
  • H
Use After Free

<0:4.18.0-193.87.1.el8_2
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • H
Race Condition

<0:4.18.0-193.87.1.el8_2
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Race Condition

<0:4.18.0-193.87.1.el8_2
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Race Condition

<0:4.18.0-193.87.1.el8_2
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • H
Race Condition

<0:4.18.0-193.87.1.el8_2
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Incorrect Default Permissions

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Default Permissions

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Default Permissions

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Default Permissions

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Default Permissions

<0:4.18.0-477.10.1.el8_8
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.19.1.el8_6
  • H
Information Exposure

<0:4.18.0-193.87.1.el8_2
  • H
Information Exposure

<0:4.18.0-372.19.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.19.1.el8_6
  • H
Information Exposure

<0:4.18.0-305.57.1.el8_4
  • H
Information Exposure

<0:4.18.0-193.87.1.el8_2
  • H
Information Exposure

<0:4.18.0-305.57.1.el8_4
  • H
Information Exposure

<0:4.18.0-193.87.1.el8_2
  • H
Information Exposure

<0:4.18.0-372.19.1.el8_6
  • H
Information Exposure

<0:4.18.0-305.57.1.el8_4
  • H
Information Exposure

<0:4.18.0-372.19.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.19.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.19.1.el8_6
  • H
Information Exposure

<0:4.18.0-305.57.1.el8_4
  • H
Information Exposure

<0:4.18.0-372.19.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.19.1.el8_6
  • H
Information Exposure

<0:4.18.0-193.87.1.el8_2
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-193.90.1.el8_2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-193.90.1.el8_2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-193.90.1.el8_2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-305.62.1.el8_4
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-305.62.1.el8_4
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-305.62.1.el8_4
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-193.90.1.el8_2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-305.62.1.el8_4
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Double Free

<0:4.18.0-425.3.1.el8
  • M
Double Free

<0:4.18.0-425.3.1.el8
  • M
Double Free

<0:4.18.0-425.3.1.el8
  • M
Double Free

<0:4.18.0-425.3.1.el8
  • M
Double Free

<0:4.18.0-425.3.1.el8
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Information Exposure

*
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Missing Initialization of Resource

<0:4.18.0-425.3.1.el8
  • M
Missing Initialization of Resource

<0:4.18.0-425.3.1.el8
  • M
Missing Initialization of Resource

<0:4.18.0-425.3.1.el8
  • M
Missing Initialization of Resource

<0:4.18.0-425.3.1.el8
  • M
Missing Initialization of Resource

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-372.13.1.el8_6
  • H
Heap-based Buffer Overflow

<0:4.18.0-305.49.1.el8_4
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.87.1.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.87.1.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-305.49.1.el8_4
  • H
Heap-based Buffer Overflow

<0:4.18.0-305.49.1.el8_4
  • H
Heap-based Buffer Overflow

<0:4.18.0-372.13.1.el8_6
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.87.1.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-372.13.1.el8_6
  • H
Heap-based Buffer Overflow

<0:4.18.0-305.49.1.el8_4
  • H
Heap-based Buffer Overflow

<0:4.18.0-372.13.1.el8_6
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.87.1.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-372.13.1.el8_6
  • H
Heap-based Buffer Overflow

<0:4.18.0-372.13.1.el8_6
  • H
Heap-based Buffer Overflow

<0:4.18.0-372.13.1.el8_6
  • H
Heap-based Buffer Overflow

<0:4.18.0-372.13.1.el8_6
  • H
Heap-based Buffer Overflow

<0:4.18.0-372.13.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6
  • M
Use of Uninitialized Resource

<0:4.18.0-305.62.1.el8_4
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6
  • M
Use of Uninitialized Resource

<0:4.18.0-305.62.1.el8_4
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6
  • M
Use of Uninitialized Resource

<0:4.18.0-305.62.1.el8_4
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6
  • M
Use of Uninitialized Resource

<0:4.18.0-305.62.1.el8_4
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-193.79.1.el8_2
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-193.79.1.el8_2
  • H
Improper Preservation of Permissions

<0:4.18.0-305.40.2.el8_4
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-193.79.1.el8_2
  • H
Improper Preservation of Permissions

<0:4.18.0-305.40.2.el8_4
  • H
Improper Preservation of Permissions

<0:4.18.0-305.40.2.el8_4
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-305.40.2.el8_4
  • H
Improper Preservation of Permissions

<0:4.18.0-193.79.1.el8_2
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-348.23.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.23.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-305.45.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.45.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.45.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-348.23.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.23.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-305.45.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-348.23.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.23.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.23.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.23.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.23.1.el8_5
  • M
Out-of-bounds Write

<0:4.18.0-553.el8_10
  • H
Improper Preservation of Permissions

<0:4.18.0-477.10.1.el8_8
  • H
Improper Preservation of Permissions

<0:4.18.0-477.10.1.el8_8
  • H
Improper Preservation of Permissions

<0:4.18.0-477.10.1.el8_8
  • H
Improper Preservation of Permissions

<0:4.18.0-477.10.1.el8_8
  • H
Improper Preservation of Permissions

<0:4.18.0-477.10.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • L
Buffer Overflow

*
  • H
Information Exposure

<0:4.18.0-348.20.1.el8_5
  • H
Information Exposure

<0:4.18.0-305.40.1.el8_4
  • H
Information Exposure

<0:4.18.0-305.40.1.el8_4
  • H
Information Exposure

<0:4.18.0-348.20.1.el8_5
  • H
Information Exposure

<0:4.18.0-348.20.1.el8_5
  • H
Information Exposure

<0:4.18.0-348.20.1.el8_5
  • H
Information Exposure

<0:4.18.0-305.40.1.el8_4
  • H
Information Exposure

<0:4.18.0-348.20.1.el8_5
  • H
Information Exposure

<0:4.18.0-305.40.1.el8_4
  • H
Information Exposure

<0:4.18.0-348.20.1.el8_5
  • H
Information Exposure

<0:4.18.0-348.20.1.el8_5
  • H
Information Exposure

<0:4.18.0-348.20.1.el8_5
  • H
Information Exposure

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-193.80.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-193.80.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-305.40.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-193.80.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-305.40.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-193.80.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-305.40.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-305.40.1.el8_4
  • M
Use of Uninitialized Resource

<0:4.18.0-425.3.1.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-425.3.1.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-425.3.1.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-425.3.1.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-425.3.1.el8
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
Missing Authorization

<0:4.18.0-193.79.1.el8_2
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
Missing Authorization

<0:4.18.0-305.45.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.45.1.el8_4
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
Missing Authorization

<0:4.18.0-193.79.1.el8_2
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
Missing Authorization

<0:4.18.0-193.79.1.el8_2
  • H
Missing Authorization

<0:4.18.0-305.45.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.45.1.el8_4
  • H
Missing Authorization

<0:4.18.0-193.79.1.el8_2
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • M
Information Exposure

*
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-193.79.1.el8_2
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-193.79.1.el8_2
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Use After Free

<0:4.18.0-193.79.1.el8_2
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Use After Free

<0:4.18.0-193.79.1.el8_2
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-305.40.1.el8_4
  • H
Improper Preservation of Permissions

<0:4.18.0-193.79.1.el8_2
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-193.79.1.el8_2
  • H
Improper Preservation of Permissions

<0:4.18.0-305.40.1.el8_4
  • H
Improper Preservation of Permissions

<0:4.18.0-305.40.1.el8_4
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-193.79.1.el8_2
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-305.40.1.el8_4
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-193.79.1.el8_2
  • M
Release of Invalid Pointer or Reference

<0:4.18.0-553.el8_10
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.9.1.el8
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.9.1.el8
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.9.1.el8
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.9.1.el8
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.9.1.el8
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.9.1.el8
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.9.1.el8
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.9.1.el8
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.9.1.el8
  • H
Integer Underflow

<0:4.18.0-305.34.2.el8_4
  • H
Integer Underflow

<0:4.18.0-305.34.2.el8_4
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • H
Integer Underflow

<0:4.18.0-305.34.2.el8_4
  • H
Integer Underflow

<0:4.18.0-305.34.2.el8_4
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • L
Improper Handling of Exceptional Conditions

*
  • H
Use of Insufficiently Random Values

<0:4.18.0-305.65.1.el8_4
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-305.65.1.el8_4
  • H
Use of Insufficiently Random Values

<0:4.18.0-305.65.1.el8_4
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-305.65.1.el8_4
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-305.65.1.el8_4
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-305.65.1.el8_4
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-305.65.1.el8_4
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-305.65.1.el8_4
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • M
Out-of-Bounds

<0:4.18.0-553.el8_10
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-305.34.2.el8_4
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.75.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.75.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-305.34.2.el8_4
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.75.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-305.34.2.el8_4
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.75.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-305.34.2.el8_4
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
Improper Authentication

<0:4.18.0-305.57.1.el8_4
  • H
Improper Authentication

<0:4.18.0-305.57.1.el8_4
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • H
Improper Authentication

<0:4.18.0-305.57.1.el8_4
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • H
Improper Authentication

<0:4.18.0-305.57.1.el8_4
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-305.34.2.el8_4
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-305.34.2.el8_4
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-305.34.2.el8_4
  • H
Use After Free

<0:4.18.0-305.34.2.el8_4
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • M
Memory Leak

*
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-305.45.1.el8_4
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-305.45.1.el8_4
  • H
Race Condition

<0:4.18.0-193.79.1.el8_2
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-193.79.1.el8_2
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-305.45.1.el8_4
  • H
Race Condition

<0:4.18.0-305.45.1.el8_4
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-193.79.1.el8_2
  • H
Race Condition

<0:4.18.0-193.79.1.el8_2
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-193.75.1.el8_2
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-193.75.1.el8_2
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-193.75.1.el8_2
  • H
Use After Free

<0:4.18.0-193.75.1.el8_2
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
CVE-2019-0136

<0:4.18.0-147.57.1.el8_1
  • H
CVE-2019-0136

<0:4.18.0-147.57.1.el8_1
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-305.49.1.el8_4
  • H
Improper Access Control

<0:4.18.0-305.49.1.el8_4
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-305.49.1.el8_4
  • H
Improper Access Control

<0:4.18.0-305.49.1.el8_4
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Use After Free

<0:4.18.0-193.75.1.el8_2
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Use After Free

<0:4.18.0-193.75.1.el8_2
  • H
Use After Free

<0:4.18.0-193.75.1.el8_2
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Use After Free

<0:4.18.0-193.75.1.el8_2
  • H
Use After Free

<0:4.18.0-305.40.1.el8_4
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Improper Validation of Array Index

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Array Index

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Array Index

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Array Index

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Array Index

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Array Index

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Array Index

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Array Index

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Array Index

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-348.2.1.el8_5
  • H
Improper Input Validation

<0:4.18.0-348.2.1.el8_5
  • H
Improper Input Validation

<0:4.18.0-348.2.1.el8_5
  • H
Improper Input Validation

<0:4.18.0-348.2.1.el8_5
  • H
Improper Input Validation

<0:4.18.0-348.2.1.el8_5
  • H
Improper Input Validation

<0:4.18.0-305.28.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-348.2.1.el8_5
  • H
Improper Input Validation

<0:4.18.0-305.28.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.28.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-348.2.1.el8_5
  • H
Improper Input Validation

<0:4.18.0-305.28.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-348.2.1.el8_5
  • H
Improper Input Validation

<0:4.18.0-348.2.1.el8_5
  • M
Use After Free

*
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-305.49.1.el8_4
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-305.49.1.el8_4
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-305.49.1.el8_4
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-305.49.1.el8_4
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • L
Information Exposure

*
  • M
Cleartext Transmission of Sensitive Information

*
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • H
Improper Initialization

<0:4.18.0-305.28.1.el8_4
  • H
Improper Initialization

<0:4.18.0-305.28.1.el8_4
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • H
Improper Initialization

<0:4.18.0-193.70.1.el8_2
  • H
Improper Initialization

<0:4.18.0-193.70.1.el8_2
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • H
Improper Initialization

<0:4.18.0-193.70.1.el8_2
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • H
Improper Initialization

<0:4.18.0-305.28.1.el8_4
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • H
Improper Initialization

<0:4.18.0-305.28.1.el8_4
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • H
Improper Initialization

<0:4.18.0-193.70.1.el8_2
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • M
Race Condition

*
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-147.54.2.el8_1
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-193.65.2.el8_2
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-147.54.2.el8_1
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-193.65.2.el8_2
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-193.65.2.el8_2
  • H
Use After Free

<0:4.18.0-193.65.2.el8_2
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

*
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • L
Improper Initialization

*
  • M
Integer Overflow or Wraparound

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • M
Missing Authorization

<0:4.18.0-193.68.1.el8_2
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • M
Missing Authorization

<0:4.18.0-147.56.1.el8_1
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • M
Missing Authorization

<0:4.18.0-193.68.1.el8_2
  • M
Missing Authorization

<0:4.18.0-193.68.1.el8_2
  • M
Missing Authorization

<0:4.18.0-147.56.1.el8_1
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • M
Missing Authorization

<0:4.18.0-193.68.1.el8_2
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-147.56.1.el8_1
  • M
Missing Authorization

<0:4.18.0-193.68.1.el8_2
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-147.56.1.el8_1
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-193.68.1.el8_2
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-193.68.1.el8_2
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Missing Authorization

<0:4.18.0-193.68.1.el8_2
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-147.54.2.el8_1
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-147.54.2.el8_1
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-193.65.2.el8_2
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • H
Improper Input Validation

<0:4.18.0-193.65.2.el8_2
  • H
Improper Input Validation

<0:4.18.0-193.65.2.el8_2
  • H
Improper Input Validation

<0:4.18.0-193.65.2.el8_2
  • M
Unchecked Return Value

<0:4.18.0-348.el8
  • M
Unchecked Return Value

<0:4.18.0-348.el8
  • M
Unchecked Return Value

<0:4.18.0-348.el8
  • M
Unchecked Return Value

<0:4.18.0-348.el8
  • M
Unchecked Return Value

<0:4.18.0-348.el8
  • M
Unchecked Return Value

<0:4.18.0-348.el8
  • M
Unchecked Return Value

<0:4.18.0-348.el8
  • M
Unchecked Return Value

<0:4.18.0-348.el8
  • M
Unchecked Return Value

<0:4.18.0-348.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Resource Exhaustion

<0:4.18.0-240.23.2.el8_3
  • H
Out-of-bounds Write

<0:4.18.0-147.51.2.el8_1
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-193.60.2.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.60.2.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-147.51.2.el8_1
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-193.60.2.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.60.2.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-240.23.2.el8_3
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-193.60.2.el8_2
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-193.60.2.el8_2
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-147.51.1.el8_1
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-147.51.1.el8_1
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-193.60.2.el8_2
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-193.60.2.el8_2
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-193.60.2.el8_2
  • H
Use After Free

<0:4.18.0-147.51.1.el8_1
  • H
Use After Free

<0:4.18.0-147.51.1.el8_1
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-193.60.2.el8_2
  • H
Use After Free

<0:4.18.0-193.60.2.el8_2
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-193.60.2.el8_2
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-193.60.2.el8_2
  • H
Improper Initialization

<0:4.18.0-193.60.2.el8_2
  • H
Improper Initialization

<0:4.18.0-193.60.2.el8_2
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-193.60.2.el8_2
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-147.48.1.el8_1
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-147.48.1.el8_1
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-193.56.1.el8_2
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-193.56.1.el8_2
  • H
Use After Free

<0:4.18.0-193.56.1.el8_2
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-193.56.1.el8_2
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-193.56.1.el8_2
  • H
Improper Input Validation

<0:4.18.0-193.56.1.el8_2
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-147.48.1.el8_1
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-193.56.1.el8_2
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-193.56.1.el8_2
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-147.48.1.el8_1
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-147.32.1.el8_1
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-147.32.1.el8_1
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-147.32.1.el8_1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-147.32.1.el8_1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-147.32.1.el8_1
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-147.32.1.el8_1
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-147.32.1.el8_1
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-147.32.1.el8_1
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • H
Improper Access Control

<0:4.18.0-147.24.2.el8_1
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • H
Improper Access Control

<0:4.18.0-147.24.2.el8_1
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • H
Improper Access Control

<0:4.18.0-147.24.2.el8_1
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • H
Improper Access Control

<0:4.18.0-147.24.2.el8_1
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-147.24.2.el8_1
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-147.24.2.el8_1
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-147.24.2.el8_1
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-147.24.2.el8_1
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-147.24.2.el8_1
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-147.24.2.el8_1
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-147.24.2.el8_1
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-147.24.2.el8_1
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-147.24.2.el8_1
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-147.24.2.el8_1
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-147.24.2.el8_1
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-147.24.2.el8_1
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.24.2.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.24.2.el8_1
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-147.24.2.el8_1
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-147.24.2.el8_1
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-147.20.1.el8_1
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-147.20.1.el8_1
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-147.13.2.el8_1
  • H
Mirrored Regions with Different Values

<0:4.18.0-147.13.2.el8_1
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-147.13.2.el8_1
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-147.13.2.el8_1
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-193.51.1.el8_2
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-193.51.1.el8_2
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-147.44.1.el8_1
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-193.51.1.el8_2
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-147.44.1.el8_1
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-193.51.1.el8_2
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-147.48.1.el8_1
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-193.51.1.el8_2
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-147.48.1.el8_1
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-193.51.1.el8_2
  • H
Use After Free

<0:4.18.0-193.51.1.el8_2
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-193.51.1.el8_2
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-193.51.1.el8_2
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-193.51.1.el8_2
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-147.44.1.el8_1
  • H
Information Exposure

<0:4.18.0-147.44.1.el8_1
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-193.51.1.el8_2
  • H
Information Exposure

<0:4.18.0-193.51.1.el8_2
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-147.44.1.el8_1
  • H
Execution with Unnecessary Privileges

<0:4.18.0-147.44.1.el8_1
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.51.1.el8_2
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.51.1.el8_2
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.51.1.el8_2
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.51.1.el8_2
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-193.80.1.el8_2
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-193.80.1.el8_2
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-193.80.1.el8_2
  • H
Use After Free

<0:4.18.0-193.80.1.el8_2
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Information Exposure

<0:4.18.0-193.80.1.el8_2
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • H
Information Exposure

<0:4.18.0-193.80.1.el8_2
  • M
Information Exposure

<0:4.18.0-240.el8
  • H
Information Exposure

<0:4.18.0-193.80.1.el8_2
  • H
Information Exposure

<0:4.18.0-193.80.1.el8_2
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-147.43.1.el8_1
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-193.46.1.el8_2
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-193.46.1.el8_2
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-193.46.1.el8_2
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Locking

<0:4.18.0-147.43.1.el8_1
  • H
Improper Locking

<0:4.18.0-193.46.1.el8_2
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-193.46.1.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.46.1.el8_2
  • H
Out-of-Bounds

<0:4.18.0-147.38.1.el8_1
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-147.38.1.el8_1
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Out-of-Bounds

<0:4.18.0-193.46.1.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.46.1.el8_2
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-147.43.1.el8_1
  • H
Use of Insufficiently Random Values

<0:4.18.0-193.46.1.el8_2
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-147.43.1.el8_1
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-193.46.1.el8_2
  • H
Use of Insufficiently Random Values

<0:4.18.0-193.46.1.el8_2
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-193.46.1.el8_2
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.34.1.el8_1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-193.40.1.el8_2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.34.1.el8_1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-193.40.1.el8_2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-193.40.1.el8_2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-193.40.1.el8_2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • H
Information Exposure

<0:4.18.0-147.38.1.el8_1
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • M
Information Exposure

<0:4.18.0-193.37.1.el8_2
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • M
Information Exposure

<0:4.18.0-193.37.1.el8_2
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • M
Information Exposure

<0:4.18.0-193.37.1.el8_2
  • M
Information Exposure

<0:4.18.0-193.37.1.el8_2
  • H
Information Exposure

<0:4.18.0-147.38.1.el8_1
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • H
Race Condition

<0:4.18.0-193.64.1.el8_2
  • H
Race Condition

<0:4.18.0-193.64.1.el8_2
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-147.52.1.el8_1
  • H
Race Condition

<0:4.18.0-147.52.1.el8_1
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-193.64.1.el8_2
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-193.64.1.el8_2
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-147.43.1.el8_1
  • H
Use After Free

<0:4.18.0-193.46.1.el8_2
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-193.46.1.el8_2
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-193.46.1.el8_2
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-193.46.1.el8_2
  • H
Use After Free

<0:4.18.0-147.43.1.el8_1
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.56.1.el8_2
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.56.1.el8_2
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.56.1.el8_2
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.56.1.el8_2
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.48.1.el8_1
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.48.1.el8_1
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • M
Incomplete Cleanup

<0:4.18.0-193.71.1.el8_2
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • M
Incomplete Cleanup

<0:4.18.0-193.71.1.el8_2
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • M
Incomplete Cleanup

<0:4.18.0-193.71.1.el8_2
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • M
Incomplete Cleanup

<0:4.18.0-193.71.1.el8_2
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-193.60.2.el8_2
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-193.60.2.el8_2
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-193.60.2.el8_2
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-193.60.2.el8_2
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-147.13.2.el8_1
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-147.13.2.el8_1
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-193.56.1.el8_2
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-193.56.1.el8_2
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-193.56.1.el8_2
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-193.56.1.el8_2
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Resource Injection

<0:4.18.0-240.el8
  • H
Resource Injection

<0:4.18.0-193.46.1.el8_2
  • M
Resource Injection

<0:4.18.0-240.el8
  • M
Resource Injection

<0:4.18.0-240.el8
  • H
Resource Injection

<0:4.18.0-147.43.1.el8_1
  • M
Resource Injection

<0:4.18.0-240.el8
  • M
Resource Injection

<0:4.18.0-240.el8
  • M
Resource Injection

<0:4.18.0-240.el8
  • H
Resource Injection

<0:4.18.0-193.46.1.el8_2
  • M
Resource Injection

<0:4.18.0-240.el8
  • M
Resource Injection

<0:4.18.0-240.el8
  • M
Resource Injection

<0:4.18.0-240.el8
  • M
Resource Injection

<0:4.18.0-240.el8
  • H
Resource Injection

<0:4.18.0-147.43.1.el8_1
  • H
Resource Injection

<0:4.18.0-193.46.1.el8_2
  • M
Resource Injection

<0:4.18.0-240.el8
  • M
Resource Injection

<0:4.18.0-240.el8
  • M
Resource Injection

<0:4.18.0-240.el8
  • H
Resource Injection

<0:4.18.0-193.46.1.el8_2
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • M
Missing Initialization of Resource

*
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-193.64.1.el8_2
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-147.54.2.el8_1
  • H
Race Condition

<0:4.18.0-147.54.2.el8_1
  • H
Race Condition

<0:4.18.0-193.64.1.el8_2
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-193.64.1.el8_2
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-193.64.1.el8_2
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Double Free

<0:4.18.0-348.el8
  • M
Double Free

<0:4.18.0-348.el8
  • M
Double Free

<0:4.18.0-348.el8
  • M
Double Free

<0:4.18.0-348.el8
  • M
Double Free

<0:4.18.0-348.el8
  • M
Double Free

<0:4.18.0-348.el8
  • M
Double Free

<0:4.18.0-348.el8
  • M
Double Free

<0:4.18.0-348.el8
  • M
Double Free

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Improper Initialization

*
  • M
Incorrect Conversion between Numeric Types

*
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • M
Arbitrary Code Injection

*
  • M
Out-of-Bounds

*
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Directory Traversal

*
  • M
Incorrect Calculation

<0:4.18.0-348.el8
  • M
Incorrect Calculation

<0:4.18.0-348.el8
  • M
Incorrect Calculation

<0:4.18.0-348.el8
  • M
Incorrect Calculation

<0:4.18.0-348.el8
  • M
Incorrect Calculation

<0:4.18.0-348.el8
  • M
Incorrect Calculation

<0:4.18.0-348.el8
  • M
Incorrect Calculation

<0:4.18.0-348.el8
  • M
Incorrect Calculation

<0:4.18.0-348.el8
  • M
Incorrect Calculation

<0:4.18.0-348.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-425.3.1.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-425.3.1.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-425.3.1.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-425.3.1.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-425.3.1.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-348.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-305.28.1.el8_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-305.28.1.el8_4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-348.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-348.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-348.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-305.28.1.el8_4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-348.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-305.28.1.el8_4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-348.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-348.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-348.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.52.1.el8_1
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-147.52.1.el8_1
  • H
Out-of-bounds Write

<0:4.18.0-193.64.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-193.64.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-193.64.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.64.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-147.52.1.el8_1
  • H
Incorrect Authorization

<0:4.18.0-193.64.1.el8_2
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-193.64.1.el8_2
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-147.52.1.el8_1
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-193.64.1.el8_2
  • H
Incorrect Authorization

<0:4.18.0-193.64.1.el8_2
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • M
Integer Overflow or Wraparound

*
  • M
Untrusted Pointer Dereference

<0:4.18.0-348.el8
  • M
Untrusted Pointer Dereference

<0:4.18.0-348.el8
  • M
Untrusted Pointer Dereference

<0:4.18.0-348.el8
  • M
Untrusted Pointer Dereference

<0:4.18.0-348.el8
  • M
Untrusted Pointer Dereference

<0:4.18.0-348.el8
  • M
Untrusted Pointer Dereference

<0:4.18.0-348.el8
  • M
Untrusted Pointer Dereference

<0:4.18.0-348.el8
  • M
Untrusted Pointer Dereference

<0:4.18.0-348.el8
  • M
Untrusted Pointer Dereference

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-193.65.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-193.65.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.65.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.65.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • M
Improper Authentication

<0:4.18.0-348.el8
  • M
Improper Authentication

<0:4.18.0-348.el8
  • M
Improper Authentication

<0:4.18.0-348.el8
  • M
Improper Authentication

<0:4.18.0-348.el8
  • M
Improper Authentication

<0:4.18.0-348.el8
  • M
Improper Authentication

<0:4.18.0-348.el8
  • M
Improper Authentication

<0:4.18.0-348.el8
  • M
Improper Authentication

<0:4.18.0-348.el8
  • M
Improper Authentication

<0:4.18.0-348.el8
  • M
Improper Access Control

*
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-193.70.1.el8_2
  • H
Use After Free

<0:4.18.0-147.57.1.el8_1
  • H
Use After Free

<0:4.18.0-147.57.1.el8_1
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-193.70.1.el8_2
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-193.70.1.el8_2
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-193.70.1.el8_2
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-348.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-348.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-348.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-348.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-348.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-348.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-348.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-348.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-348.el8
  • L
CVE-2020-36311

*
  • M
Buffer Overflow

<0:4.18.0-348.el8
  • M
Buffer Overflow

<0:4.18.0-348.el8
  • M
Buffer Overflow

<0:4.18.0-348.el8
  • M
Buffer Overflow

<0:4.18.0-348.el8
  • M
Buffer Overflow

<0:4.18.0-348.el8
  • M
Buffer Overflow

<0:4.18.0-348.el8
  • M
Buffer Overflow

<0:4.18.0-348.el8
  • M
Buffer Overflow

<0:4.18.0-348.el8
  • M
Buffer Overflow

<0:4.18.0-348.el8
  • L
Incorrect Authorization

*
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Race Condition

*
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • H
Race Condition

<0:4.18.0-193.87.1.el8_2
  • H
Race Condition

<0:4.18.0-193.87.1.el8_2
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • M
Race Condition

<0:4.18.0-348.el8
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • H
Race Condition

<0:4.18.0-193.87.1.el8_2
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • H
Race Condition

<0:4.18.0-305.57.1.el8_4
  • M
Race Condition

<0:4.18.0-348.el8
  • H
Race Condition

<0:4.18.0-193.87.1.el8_2
  • M
Race Condition

<0:4.18.0-348.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • M
Out-of-bounds Read

*
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • M
Missing Authorization

<0:4.18.0-348.el8
  • M
Missing Authorization

<0:4.18.0-348.el8
  • M
Missing Authorization

<0:4.18.0-348.el8
  • M
Missing Authorization

<0:4.18.0-348.el8
  • M
Missing Authorization

<0:4.18.0-348.el8
  • M
Missing Authorization

<0:4.18.0-348.el8
  • M
Missing Authorization

<0:4.18.0-348.el8
  • M
Missing Authorization

<0:4.18.0-348.el8
  • M
Missing Authorization

<0:4.18.0-348.el8
  • M
Integer Underflow

*
  • M
Information Exposure

*
  • H
Resource Exhaustion

<0:4.18.0-553.8.1.el8_10
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Authentication Bypass

<0:4.18.0-348.el8
  • M
Authentication Bypass

<0:4.18.0-348.el8
  • M
Authentication Bypass

<0:4.18.0-348.el8
  • M
Authentication Bypass

<0:4.18.0-348.el8
  • M
Authentication Bypass

<0:4.18.0-348.el8
  • M
Authentication Bypass

<0:4.18.0-348.el8
  • M
Authentication Bypass

<0:4.18.0-348.el8
  • M
Authentication Bypass

<0:4.18.0-348.el8
  • M
Authentication Bypass

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:4.18.0-348.el8
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:4.18.0-348.el8
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:4.18.0-348.el8
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:4.18.0-348.el8
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:4.18.0-348.el8
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:4.18.0-348.el8
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:4.18.0-348.el8
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:4.18.0-348.el8
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Cleartext Transmission of Sensitive Information

*
  • L
NULL Pointer Dereference

*
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Insufficient Verification of Data Authenticity

<0:4.18.0-348.el8
  • M
Insufficient Verification of Data Authenticity

<0:4.18.0-348.el8
  • M
Insufficient Verification of Data Authenticity

<0:4.18.0-348.el8
  • M
Insufficient Verification of Data Authenticity

<0:4.18.0-348.el8
  • M
Insufficient Verification of Data Authenticity

<0:4.18.0-348.el8
  • M
Insufficient Verification of Data Authenticity

<0:4.18.0-348.el8
  • M
Insufficient Verification of Data Authenticity

<0:4.18.0-348.el8
  • M
Insufficient Verification of Data Authenticity

<0:4.18.0-348.el8
  • M
Insufficient Verification of Data Authenticity

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • L
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • L
Improper Cleanup on Thrown Exception

*
  • L
Race Condition

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Memory Leak

*
  • L
Information Exposure

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Authentication Bypass

*
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • M
Resource Exhaustion

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Race Condition

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Information Exposure

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Incorrect Check of Function Return Value

*
  • M
Operation on a Resource after Expiration or Release

*
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • L
Out-of-Bounds

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • L
Unchecked Return Value

*
  • L
Unchecked Return Value

*
  • L
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Information Exposure

*