CVE-2024-50157
| |
CVE-2024-50146
| |
CVE-2024-50107
| |
Race Condition
| |
CVE-2024-50148
| |
NULL Pointer Dereference
| |
Use After Free
| |
CVE-2024-50164
| |
CVE-2024-50151
| |
CVE-2024-50142
| |
CVE-2024-50165
| |
CVE-2024-50163
| |
CVE-2024-50143
| |
CVE-2024-50155
| |
Use After Free
| |
CVE-2024-50145
| |
Use After Free
| |
Use After Free
| |
Use of Uninitialized Resource
| |
CVE-2024-50136
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Out-of-bounds Read
| |
CVE-2024-50138
| |
CVE-2024-50095
| |
CVE-2024-50093
| |
CVE-2024-50099
| |
CVE-2024-50101
| |
Buffer Overflow
| |
CVE-2024-50154
| |
CVE-2024-50158
| |
Information Exposure
| |
CVE-2024-50167
| |
Use After Free
| |
CVE-2024-50147
| |
CVE-2024-50120
| |
CVE-2024-50172
| |
CVE-2024-50153
| |
CVE-2024-50162
| |
NULL Pointer Dereference
| |
Use After Free
| |
CVE-2024-50139
| |
NULL Pointer Dereference
| |
Race Condition
| |
Memory Leak
| |
Use After Free
| |
Memory Leak
| |
Use After Free
| |
Memory Leak
| |
Use After Free
| |
Memory Leak
| |
Use After Free
| |
NULL Pointer Dereference
| |
Excessive Platform Resource Consumption within a Loop
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Missing Initialization of Resource
| |
CVE-2024-50082
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2024-50077
| |
CVE-2024-50081
| |
CVE-2024-50075
| |
CVE-2024-50083
| |
CVE-2024-50078
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Improper Resource Shutdown or Release
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Use After Free
| |
CVE-2024-40998
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Incomplete Cleanup
| |
Improper Input Validation
| |
Improper Resource Locking
| |
Race Condition
| |
CVE-2024-2201
| |
Race Condition
| |
Use After Free
| |
CVE-2021-47384
| |
Improper Resource Shutdown or Release
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Use After Free
| |
CVE-2024-40998
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Incomplete Cleanup
| |
Improper Input Validation
| |
Improper Resource Locking
| |
Race Condition
| |
CVE-2024-2201
| |
Race Condition
| |
Use After Free
| |
CVE-2021-47384
| |
Improper Resource Shutdown or Release
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Use After Free
| |
CVE-2024-40998
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Incomplete Cleanup
| |
Improper Input Validation
| |
Improper Resource Locking
| |
Race Condition
| |
CVE-2024-2201
| |
Race Condition
| |
Use After Free
| |
CVE-2021-47384
| |
CVE-2024-49971
| |
CVE-2024-50060
| |
Use After Free
| |
Memory Leak
| |
CVE-2024-49995
| |
CVE-2024-50019
| |
Operation on a Resource after Expiration or Release
| |
CVE-2024-50021
| |
CVE-2024-49968
| |
CVE-2024-50038
| |
CVE-2024-50010
| |
CVE-2024-50015
| |
CVE-2024-49940
| |
Improper Locking
| |
Release of Invalid Pointer or Reference
| |
CVE-2024-49886
| |
CVE-2024-49938
| |
CVE-2024-49885
| |
CVE-2024-50028
| |
CVE-2024-49946
| |
NULL Pointer Dereference
| |
CVE-2024-47738
| |
Improper Locking
| |
CVE-2024-50022
| |
Use of Uninitialized Resource
| |
CVE-2024-47715
| |
Improper Check for Unusual or Exceptional Conditions
| |
CVE-2024-50024
| |
Use After Free
| |
Improper Handling of Exceptional Conditions
| |
Out-of-bounds Write
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Locking
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
NULL Pointer Dereference
| |
CVE-2024-49864
| |
Double Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
CVE-2024-49948
| |
Double Free
| |
CVE-2024-47702
| |
CVE-2024-50063
| |
CVE-2024-49925
| |
Use After Free
| |
CVE-2024-50025
| |
CVE-2024-50012
| |
Memory Leak
| |
Memory Leak
| |
Improper Access Control
| |
NULL Pointer Dereference
| |
Divide By Zero
| |
Incomplete Cleanup
| |
CVE-2024-50023
| |
Use of Uninitialized Resource
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2024-50020
| |
Always-Incorrect Control Flow Implementation
| |
Use After Free
| |
Double Free
| |
Improper Validation of Array Index
| |
Information Exposure
| |
Improper Handling of Exceptional Conditions
| |
NULL Pointer Dereference
| |
CVE-2024-49959
| |
CVE-2024-49974
| |
CVE-2024-49878
| |
Memory Leak
| |
CVE-2024-49954
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Locking
| |
CVE-2024-49939
| |
CVE-2024-49934
| |
CVE-2024-49888
| |
CVE-2024-49861
| |
Improper Validation of Integrity Check Value
| |
CVE-2024-49933
| |
Improper Validation of Array Index
| |
NULL Pointer Dereference
| |
Improper Check for Unusual or Exceptional Conditions
| |
Use After Free
| |
Memory Leak
| |
Use After Free
| |
CVE-2024-50040
| |
NULL Pointer Dereference
| |
CVE-2024-50042
| |
Improper Input Validation
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
CVE-2024-49937
| |
CVE-2024-49866
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Incomplete Cleanup
| |
Use After Free
| |
CVE-2024-47710
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
CVE-2024-49999
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Use of Uninitialized Resource
| |
CVE-2024-47703
| |
Off-by-one Error
| |
Race Condition
| |
Use After Free
| |
Off-by-one Error
| |
CVE-2024-50008
| |
Use After Free
| |
CVE-2024-49935
| |
CVE-2024-49927
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Operation on a Resource after Expiration or Release
| |
Divide By Zero
| |
Use After Free
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
CVE-2024-49944
| |
Use After Free
| |
Use After Free
| |
CVE-2024-49967
| |
CVE-2024-47713
| |
Off-by-one Error
| |
Use of Uninitialized Resource
| |
Out-of-bounds Write
| |
Incomplete Cleanup
| |
CVE-2023-52917
| |
Use After Free
| |
Improper Locking
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Memory Leak
| |
Use After Free
| |
Memory Leak
| |
CVE-2022-48994
| |
Improper Validation of Array Index
| |
Resource Injection
| |
Use of Uninitialized Resource
| |
CVE-2022-48978
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
Operation on a Resource after Expiration or Release
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Use After Free
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Use of Uninitialized Variable
| |
Improper Validation of Array Index
| |
Memory Leak
| |
Memory Leak
| |
Use After Free
| |
Use After Free
| |
Incomplete Cleanup
| |
CVE-2022-48986
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Use After Free
| |
Missing Release of Resource after Effective Lifetime
| |
CVE-2022-48961
| |
Improper Control of a Resource Through its Lifetime
| |
Out-of-bounds Read
| |
Use After Free
| |
Race Condition
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Use After Free
| |
Out-of-Bounds
| |
Race Condition
| |
Buffer Overflow
| |
Memory Leak
| |
Race Condition
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
CVE-2022-49027
| |
Improper Validation of Array Index
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Return of Wrong Status Code
| |
Use of Uninitialized Resource
| |
Deadlock
| |
Information Exposure
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Improper Input Validation
| |
CVE-2023-28746
| |
NULL Pointer Dereference
| |
Return of Wrong Status Code
| |
Use of Uninitialized Resource
| |
Deadlock
| |
Information Exposure
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Improper Input Validation
| |
CVE-2023-28746
| |
NULL Pointer Dereference
| |
Return of Wrong Status Code
| |
Use of Uninitialized Resource
| |
Deadlock
| |
Information Exposure
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Improper Input Validation
| |
CVE-2023-28746
| |
NULL Pointer Dereference
| |
CVE-2024-47672
| |
Race Condition
| |
Race Condition
| |
CVE-2024-47671
| |
Improper Validation of Array Index
| |
CVE-2024-47673
| |
CVE-2022-48695
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2022-48695
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2022-48695
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2022-48695
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Use After Free
| |
NULL Pointer Dereference
| |
CVE-2024-27415
| |
Improper Initialization
| |
Use After Free
| |
NULL Pointer Dereference
| |
CVE-2024-27415
| |
Out-of-bounds Read
| |
Improper Initialization
| |
Use After Free
| |
NULL Pointer Dereference
| |
CVE-2024-27415
| |
CVE-2022-48936
| |
CVE-2022-48936
| |
CVE-2022-48936
| |
CVE-2022-48936
| |
CVE-2024-46839
| |
Unchecked Input for Loop Condition
| |
NULL Pointer Dereference
| |
Divide By Zero
| |
CVE-2024-46830
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
CVE-2024-46855
| |
Use After Free
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
CVE-2024-46826
| |
CVE-2024-46825
| |
Out-of-bounds Read
| |
CVE-2024-46823
| |
CVE-2024-46820
| |
Improper Validation of Array Index
| |
CVE-2024-46861
| |
NULL Pointer Dereference
| |
CVE-2024-46834
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
CVE-2024-46828
| |
Out-of-bounds Read
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Improper Handling of Unicode Encoding
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Deadlock
| |
NULL Pointer Dereference
| |
Race Condition
| |
NULL Pointer Dereference
| |
Resource Injection
| |
State Issues
| |
NULL Pointer Dereference
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Improper Check for Unusual or Exceptional Conditions
| |
Use After Free
| |
Deadlock
| |
CVE-2024-46794
| |
Use After Free
| |
Use After Free
| |
Improper Locking
| |
NULL Pointer Dereference
| |
CVE-2024-46771
| |
Integer Underflow
| |
Integer Underflow
| |
CVE-2024-46745
| |
Out-of-bounds Write
| |
Link Following
| |
NULL Pointer Dereference
| |
CVE-2024-46783
| |
Use After Free
| |
CVE-2024-46777
| |
Integer Underflow
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
CVE-2024-46754
| |
Use After Free
| |
CVE-2024-46788
| |
NULL Pointer Dereference
| |
CVE-2024-46774
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2024-46748
| |
Out-of-bounds Read
| |
CVE-2024-46767
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Read
| |
Resource Injection
| |
NULL Pointer Dereference
| |
CVE-2024-46736
| |
Out-of-bounds Read
| |
CVE-2024-46715
| |
Use of Uninitialized Resource
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2024-46787
| |
Use After Free
| |
Improper Locking
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Input Validation
| |
Resource Injection
| |
Resource Injection
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Incomplete Cleanup
| |
CVE-2024-38573
| |
Out-of-bounds Read
| |
CVE-2024-26974
| |
Deadlock
| |
Resource Injection
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Input Validation
| |
Resource Injection
| |
Resource Injection
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Incomplete Cleanup
| |
CVE-2024-38573
| |
Out-of-bounds Read
| |
CVE-2024-26974
| |
Deadlock
| |
Resource Injection
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Input Validation
| |
Resource Injection
| |
Resource Injection
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Incomplete Cleanup
| |
CVE-2024-38573
| |
Out-of-bounds Read
| |
CVE-2024-26974
| |
Deadlock
| |
Resource Injection
| |
CVE-2024-46713
| |
Resource Injection
| |
Race Condition
| |
Out-of-Bounds
| |
CVE-2024-46709
| |
Improper Locking
| |
Use of Uninitialized Variable
| |
CVE-2024-46706
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
CVE-2024-46711
| |
NULL Pointer Dereference
| |
Improper Authentication
| |
CVE-2024-46710
| |
Time-of-check Time-of-use (TOCTOU)
| |
Double Free
| |
Multiple Locks of a Critical Resource
| |
Improper Locking
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
CVE-2024-45017
| |
Use After Free
| |
Out-of-Bounds
| |
Insufficient Control Flow Management
| |
Improper Control of a Resource Through its Lifetime
| |
Out-of-Bounds
| |
Use of Uninitialized Variable
| |
Use of Uninitialized Variable
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Control of a Resource Through its Lifetime
| |
Use After Free
| |
Improper Locking
| |
Uncontrolled Memory Allocation
| |
NULL Pointer Dereference
| |
Improper Check or Handling of Exceptional Conditions
| |
Improper Check or Handling of Exceptional Conditions
| |
Use After Free
| |
CVE-2024-44984
| |
Out-of-Bounds
| |
Improper Initialization
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Race Condition
| |
Use After Free
| |
Use of Uninitialized Resource
| |
Improper Input Validation
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
Deadlock
| |
Improper Initialization
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Divide By Zero
| |
Improper Input Validation
| |
Improper Update of Reference Count
| |
Untrusted Pointer Dereference
| |
Use After Free
| |
Improper Update of Reference Count
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
CVE-2024-35895
| |
CVE-2024-35875
| |
CVE-2024-35839
| |
CVE-2024-26946
| |
Integer Overflow or Wraparound
| |
Divide By Zero
| |
Improper Input Validation
| |
Improper Update of Reference Count
| |
Untrusted Pointer Dereference
| |
Use After Free
| |
Improper Update of Reference Count
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
CVE-2024-35895
| |
CVE-2024-35875
| |
CVE-2024-35839
| |
CVE-2024-26946
| |
Integer Overflow or Wraparound
| |
Divide By Zero
| |
Improper Input Validation
| |
Improper Update of Reference Count
| |
Untrusted Pointer Dereference
| |
Use After Free
| |
Improper Update of Reference Count
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
CVE-2024-35895
| |
CVE-2024-35875
| |
CVE-2024-35839
| |
CVE-2024-26946
| |
Resource Leak
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Sensitive Information Uncleared Before Release
| |
NULL Pointer Dereference
| |
Race Condition
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Resource Locking
| |
Use After Free
| |
Improper Zeroization of Hardware Register
| |
Out-of-bounds Write
| |
Sensitive Information Uncleared Before Release
| |
Out-of-bounds Read
| |
Execution with Unnecessary Privileges
| |
Resource Exhaustion
| |
Use After Free
| |
Interpretation Conflict
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Non-exit on Failed Initialization
| |
Out-of-bounds Write
| |
Use After Free
| |
Incorrect Control Flow Scoping
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Improper Locking
| |
NULL Pointer Dereference
| |
Expected Behavior Violation
| |
Use After Free
| |
Double Free
| |
Improper Update of Reference Count
| |
Use After Free
| |
Buffer Overflow
| |
Out-of-Bounds
| |
Use After Free
| |
Write-what-where Condition
| |
Memory Leak
| |
Race Condition During Access to Alternate Channel
| |
Race Condition
| |
Memory Leak
| |
Race Condition
| |
Out-of-Bounds
| |
Incomplete Cleanup
| |
Improper Locking
| |
Double Free
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Insecure Default Initialization of Resource
| |
Authentication Bypass by Primary Weakness
| |
Improper Locking
| |
Use After Free
| |
NULL Pointer Dereference
| |
Race Condition
| |
Out-of-bounds Write
| |
Integer Overflow or Wraparound
| |
Exposure of Resource to Wrong Sphere
| |
Improper Ownership Management
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Incorrect Calculation of Buffer Size
| |
Use After Free
| |
Double Free
| |
Deadlock
| |
Allocation of Resources Without Limits or Throttling
| |
Improper Preservation of Permissions
| |
Buffer Overflow
| |
Out-of-Bounds
| |
Improper Locking
| |
Improper Validation of Array Index
| |
NULL Pointer Dereference
| |
Use of Uninitialized Variable
| |
Missing Report of Error Condition
| |
CVE-2022-36946
| |
Use After Free
| |
Unchecked Return Value
| |
NULL Pointer Dereference
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Double Free
| |
Incorrect Conversion between Numeric Types
| |
Information Exposure
| |
Use After Free
| |
Authentication Bypass
| |
Use of Uninitialized Resource
| |
Information Exposure
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Privilege Defined With Unsafe Actions
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incorrect Authorization
| |
Out-of-bounds Write
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Missing Initialization of Resource
| |
Memory Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Race Condition
| |
Authentication Bypass
| |
Incorrect Default Permissions
| |
Use After Free
| |
Comparison Using Wrong Factors
| |
Buffer Overflow
| |
Use After Free
| |
Use of Uninitialized Resource
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Use After Free
| |
Race Condition
| |
Information Exposure
| |
Resource Exhaustion
| |
Memory Leak
| |
Race Condition
| |
Resource Exhaustion
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
Use After Free
| |
Divide By Zero
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Read
| |
Divide By Zero
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Reachable Assertion
| |
NULL Pointer Dereference
| |
CVE-2024-42107
| |
Improper Input Validation
| |
Improper Input Validation
| |
Memory Leak
| |
Deadlock
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
CVE-2024-36000
| |
Improper Input Validation
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
CVE-2024-42107
| |
Improper Input Validation
| |
Improper Input Validation
| |
Memory Leak
| |
Deadlock
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
CVE-2024-36000
| |
Improper Input Validation
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
CVE-2024-42107
| |
Improper Input Validation
| |
Improper Input Validation
| |
Memory Leak
| |
Deadlock
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
CVE-2024-36000
| |
Improper Input Validation
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
CVE-2024-42107
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Double Free
| |
Use After Free
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Memory Leak
| |
CVE-2022-48936
| |
Race Condition
| |
Use After Free
| |
Excessive Iteration
| |
Memory Leak
| |
Buffer Overflow
| |
Memory Leak
| |
Missing Release of Resource after Effective Lifetime
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Improper Resource Shutdown or Release
| |
Resource Leak
| |
Deadlock
| |
Resource Leak
| |
Resource Injection
| |
Resource Leak
| |
Improper Access Control
| |
NULL Pointer Dereference
| |
Incorrect Privilege Assignment
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Resource Injection
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Missing Release of Resource after Effective Lifetime
| |
NULL Pointer Dereference
| |
Incorrect Calculation of Buffer Size
| |
Improper Handling of Length Parameter Inconsistency
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Use After Free
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Resource Leak
| |
Resource Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Information Exposure
| |
Improper Validation of Array Index
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Reachable Assertion
| |
Missing Initialization of a Variable
| |
Improper Input Validation
| |
Deadlock
| |
Deadlock
| |
Divide By Zero
| |
CVE-2024-42304
| |
Numeric Range Comparison Without Minimum Check
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Resource Injection
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Improper Restriction of Power Consumption
| |
NULL Pointer Dereference
| |
Return of Wrong Status Code
| |
CVE-2024-42322
| |
Multiple Locks of a Critical Resource
| |
NULL Pointer Dereference
| |
Improper Validation of Array Index
| |
Race Condition
| |
Use After Free
| |
Improper Locking
| |
Resource Exhaustion
| |
Use After Free
| |
Improper Handling of Length Parameter Inconsistency
| |
Memory Leak
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
Use of Uninitialized Resource
| |
Improper Input Validation
| |
Double Free
| |
Use of Uninitialized Variable
| |
Out-of-bounds Read
| |
Use After Free
| |
Resource Injection
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
CVE-2024-35937
| |
CVE-2024-35907
| |
CVE-2024-35852
| |
CVE-2024-35845
| |
CVE-2024-35789
| |
CVE-2024-27052
| |
CVE-2024-27046
| |
Race Condition
| |
Unchecked Return Value to NULL Pointer Dereference
| |
CVE-2024-21823
| |
Resource Leak
| |
Improper Resource Locking
| |
CVE-2023-52651
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Double Free
| |
Use of Uninitialized Variable
| |
Out-of-bounds Read
| |
Use After Free
| |
Resource Injection
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
CVE-2024-35937
| |
CVE-2024-35907
| |
CVE-2024-35852
| |
CVE-2024-35845
| |
CVE-2024-35789
| |
CVE-2024-27052
| |
CVE-2024-27046
| |
Race Condition
| |
Unchecked Return Value to NULL Pointer Dereference
| |
CVE-2024-21823
| |
Resource Leak
| |
Improper Resource Locking
| |
CVE-2023-52651
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Double Free
| |
Use of Uninitialized Variable
| |
Out-of-bounds Read
| |
Use After Free
| |
Resource Injection
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
CVE-2024-35937
| |
CVE-2024-35907
| |
CVE-2024-35852
| |
CVE-2024-35845
| |
CVE-2024-35789
| |
CVE-2024-27052
| |
CVE-2024-27046
| |
Race Condition
| |
Unchecked Return Value to NULL Pointer Dereference
| |
CVE-2024-21823
| |
Resource Leak
| |
Improper Resource Locking
| |
CVE-2023-52651
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Input Validation
| |
Improper Input Validation
| |
Untrusted Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2024-35898
| |
CVE-2024-35897
| |
CVE-2024-27403
| |
CVE-2024-27397
| |
CVE-2024-27393
| |
CVE-2024-26993
| |
Use After Free
| |
Resource Injection
| |
CVE-2024-21823
| |
Race Condition
| |
Resource Leak
| |
Allocation of Resources Without Limits or Throttling
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Injection
| |
Resource Injection
| |
Improper Locking
| |
Resource Injection
| |
Resource Injection
| |
Improper Clearing of Heap Memory Before Release ('Heap Inspection')
| |
Resource Injection
| |
Improper Input Validation
| |
Resource Injection
| |
Race Condition
| |
Resource Injection
| |
Resource Injection
| |
Improper Initialization
| |
Resource Injection
| |
Out-of-bounds Read
| |
Untrusted Pointer Dereference
| |
Race Condition
| |
Out-of-bounds Read
| |
CVE-2024-35962
| |
CVE-2024-35896
| |
CVE-2024-35885
| |
CVE-2024-35823
| |
Improper Input Validation
| |
Improper Resource Locking
| |
CVE-2024-27030
| |
Behavioral Change in New Version or Environment
| |
Double Free
| |
Race Condition
| |
Range Error
| |
Use After Free
| |
NULL Pointer Dereference
| |
Missing Lock Check
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Initialization
| |
Resource Injection
| |
Out-of-bounds Read
| |
Untrusted Pointer Dereference
| |
Race Condition
| |
Out-of-bounds Read
| |
CVE-2024-35962
| |
CVE-2024-35896
| |
CVE-2024-35885
| |
CVE-2024-35823
| |
Improper Input Validation
| |
Improper Resource Locking
| |
CVE-2024-27030
| |
Behavioral Change in New Version or Environment
| |
Double Free
| |
Race Condition
| |
Range Error
| |
Use After Free
| |
NULL Pointer Dereference
| |
Missing Lock Check
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Initialization
| |
Resource Injection
| |
Out-of-bounds Read
| |
Untrusted Pointer Dereference
| |
Race Condition
| |
Out-of-bounds Read
| |
CVE-2024-35962
| |
CVE-2024-35896
| |
CVE-2024-35885
| |
CVE-2024-35823
| |
Improper Input Validation
| |
Improper Resource Locking
| |
CVE-2024-27030
| |
Behavioral Change in New Version or Environment
| |
Double Free
| |
Race Condition
| |
Range Error
| |
Use After Free
| |
NULL Pointer Dereference
| |
Missing Lock Check
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use of Uninitialized Variable
| |
Out-of-bounds Read
| |
CVE-2024-42151
| |
Improper Validation of Array Index
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Variable
| |
NULL Pointer Dereference
| |
Use of Uninitialized Variable
| |
Untrusted Pointer Dereference
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Improper Handling of Length Parameter Inconsistency
| |
NULL Pointer Dereference
| |
Deadlock
| |
Resource Management Errors
| |
Use After Free
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
Improper Resource Locking
| |
Resource Injection
| |
Excessive Iteration
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
CVE-2024-42138
| |
CVE-2024-42129
| |
NULL Pointer Dereference
| |
Use After Free
| |
Resource Injection
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2024-42132
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Double Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Access of Uninitialized Pointer
| |
Out-of-bounds Write
| |
Use of Uninitialized Variable
| |
NULL Pointer Dereference
| |
Use After Free
| |
Static Code Injection
| |
CVE-2024-42141
| |
Information Exposure
| |
Incomplete Internal State Distinction
| |
NULL Pointer Dereference
| |
Double Free
| |
Improper Input Validation
| |
Improper Control of Document Type Definition
| |
Deadlock
| |
Incomplete Internal State Distinction
| |
Incomplete Internal State Distinction
| |
Stack-based Buffer Overflow
| |
Deadlock
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Unchecked Return Value
| |
Resource Injection
| |
Deadlock
| |
Information Exposure
| |
Allocation of Resources Without Limits or Throttling
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Double Free
| |
Unchecked Return Value
| |
Stack-based Buffer Overflow
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Heap-based Buffer Overflow
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Use After Free
| |
NULL Pointer Dereference
| |
Race Condition
| |
Buffer Overflow
| |
Resource Injection
| |
Information Exposure
| |
Resource Leak
| |
Improper Resource Locking
| |
Unchecked Return Value
| |
Deadlock
| |
Use After Free
| |
Improper Input Validation
| |
Heap-based Buffer Overflow
| |
CVE-2024-35890
| |
CVE-2024-35890
| |
CVE-2024-35890
| |
CVE-2024-35890
| |
Improper Input Validation
| |
Improper Input Validation
| |
Race Condition
| |
Out-of-bounds Write
| |
Incomplete Cleanup
| |
Deadlock
| |
Use After Free
| |
Resource Leak
| |
Out-of-bounds Write
| |
CVE-2024-35950
| |
CVE-2024-35899
| |
CVE-2024-35897
| |
CVE-2024-35791
| |
CVE-2024-27417
| |
CVE-2024-27065
| |
Race Condition
| |
Race Condition
| |
CVE-2024-27016
| |
CVE-2024-26982
| |
CVE-2024-26931
| |
Double Free
| |
Improper Locking
| |
Race Condition
| |
Unchecked Return Value to NULL Pointer Dereference
| |
Resource Injection
| |
Race Condition
| |
Use After Free
| |
Improper Handling of Values
| |
Use After Free
| |
Double Free
| |
Race Condition
| |
Integer Overflow or Wraparound
| |
CVE-2024-26581
| |
Stack-based Buffer Overflow
| |
Improper Update of Reference Count
| |
NULL Pointer Dereference
| |
Use After Free
| |
Race Condition
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-Bounds
| |
Double Free
| |
Race Condition
| |
Buffer Underflow
| |
Use After Free
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Race Condition
| |
Out-of-bounds Write
| |
Incomplete Cleanup
| |
Deadlock
| |
Use After Free
| |
Resource Leak
| |
Out-of-bounds Write
| |
CVE-2024-35950
| |
CVE-2024-35899
| |
CVE-2024-35897
| |
CVE-2024-35791
| |
CVE-2024-27417
| |
CVE-2024-27065
| |
Race Condition
| |
Race Condition
| |
CVE-2024-27016
| |
CVE-2024-26982
| |
CVE-2024-26931
| |
Double Free
| |
Improper Locking
| |
Race Condition
| |
Unchecked Return Value to NULL Pointer Dereference
| |
Resource Injection
| |
Race Condition
| |
Use After Free
| |
Improper Handling of Values
| |
Use After Free
| |
Double Free
| |
Race Condition
| |
Integer Overflow or Wraparound
| |
CVE-2024-26581
| |
Stack-based Buffer Overflow
| |
Improper Update of Reference Count
| |
NULL Pointer Dereference
| |
Use After Free
| |
Race Condition
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-Bounds
| |
Double Free
| |
Race Condition
| |
Buffer Underflow
| |
Use After Free
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Race Condition
| |
Out-of-bounds Write
| |
Incomplete Cleanup
| |
Deadlock
| |
Use After Free
| |
Resource Leak
| |
Out-of-bounds Write
| |
CVE-2024-35950
| |
CVE-2024-35899
| |
CVE-2024-35897
| |
CVE-2024-35791
| |
CVE-2024-27417
| |
CVE-2024-27065
| |
Race Condition
| |
Race Condition
| |
CVE-2024-27016
| |
CVE-2024-26982
| |
CVE-2024-26931
| |
Double Free
| |
Improper Locking
| |
Race Condition
| |
Unchecked Return Value to NULL Pointer Dereference
| |
Resource Injection
| |
Race Condition
| |
Use After Free
| |
Improper Handling of Values
| |
Use After Free
| |
Double Free
| |
Race Condition
| |
Integer Overflow or Wraparound
| |
CVE-2024-26581
| |
Stack-based Buffer Overflow
| |
Improper Update of Reference Count
| |
NULL Pointer Dereference
| |
Use After Free
| |
Race Condition
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-Bounds
| |
Double Free
| |
Race Condition
| |
Buffer Underflow
| |
Use After Free
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Out-of-bounds Read
| |
Stack-based Buffer Overflow
| |
CVE-2024-40998
| |
Improper Input Validation
| |
Improper Input Validation
| |
Resource Injection
| |
Use After Free
| |
Resource Injection
| |
Resource Injection
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Deadlock
| |
Improper Input Validation
| |
Improper Update of Reference Count
| |
Resource Exhaustion
| |
Deadlock
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Resource Injection
| |
Return of Wrong Status Code
| |
NULL Pointer Dereference
| |
Expired Pointer Dereference
| |
Use After Free
| |
Deadlock
| |
Deadlock
| |
NULL Pointer Dereference
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Expired Pointer Dereference
| |
Resource Injection
| |
Use After Free
| |
Untrusted Pointer Dereference
| |
Use After Free
| |
Time-of-check Time-of-use (TOCTOU)
| |
Resource Injection
| |
Improper Locking
| |
Use After Free
| |
Resource Injection
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Race Condition
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Resource Injection
| |
Improper Initialization
| |
Integer Overflow or Wraparound
| |
Deadlock
| |
Improper Synchronization
| |
Use After Free
| |
Use of Uninitialized Resource
| |
Resource Leak
| |
Out-of-bounds Write
| |
Resource Injection
| |
Improper Resource Locking
| |
Resource Injection
| |
Out-of-bounds Read
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Memory Leak
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Resource Injection
| |
Non-exit on Failed Initialization
| |
Improper Initialization
| |
Memory Leak
| |
CVE-2022-48849
| |
Out-of-bounds Read
| |
Resource Injection
| |
Use After Free
| |
Integer Underflow
| |
CVE-2022-48834
| |
Resource Injection
| |
Resource Injection
| |
Use After Free
| |
Resource Injection
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Missing Lock Check
| |
Use After Free
| |
Deadlock
| |
Race Condition
| |
CVE-2022-48830
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2022-48836
| |
Resource Injection
| |
CVE-2022-48831
| |
Resource Management Errors
| |
Resource Leak
| |
State Issues
| |
Resource Injection
| |
Resource Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Integer Overflow or Wraparound
| |
Incorrect Check of Function Return Value
| |
NULL Pointer Dereference
| |
Release of Invalid Pointer or Reference
| |
CVE-2022-48832
| |
NULL Pointer Dereference
| |
CVE-2022-48802
| |
Resource Injection
| |
Permission Issues
| |
CVE-2022-48811
| |
CVE-2022-48785
| |
Improper Update of Reference Count
| |
Deadlock
| |
Resource Injection
| |
Expired Pointer Dereference
| |
Use After Free
| |
Race Condition
| |
Resource Leak
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
CVE-2024-39507
| |
CVE-2024-40901
| |
Use After Free
| |
CVE-2024-39509
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2024-36005
| |
CVE-2024-35969
| |
CVE-2024-35898
| |
CVE-2024-35857
| |
Use After Free
| |
CVE-2024-26801
| |
Mismatched Memory Management Routines
| |
Divide By Zero
| |
Race Condition
| |
Race Condition
| |
Deadlock
| |
Improper Handling of Overlap Between Protected Memory Ranges
| |
Use After Free
| |
Improper Validation of Array Index
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2024-36005
| |
CVE-2024-35969
| |
CVE-2024-35898
| |
CVE-2024-35857
| |
Use After Free
| |
CVE-2024-26801
| |
Mismatched Memory Management Routines
| |
Divide By Zero
| |
Race Condition
| |
Race Condition
| |
Deadlock
| |
Improper Handling of Overlap Between Protected Memory Ranges
| |
Use After Free
| |
Improper Validation of Array Index
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2024-36005
| |
CVE-2024-35969
| |
CVE-2024-35898
| |
CVE-2024-35857
| |
Use After Free
| |
CVE-2024-26801
| |
Mismatched Memory Management Routines
| |
Divide By Zero
| |
Race Condition
| |
Race Condition
| |
Deadlock
| |
Improper Handling of Overlap Between Protected Memory Ranges
| |
Use After Free
| |
Improper Validation of Array Index
| |
CVE-2024-39490
| |
Memory Leak
| |
Out-of-bounds Read
| |
CVE-2024-39491
| |
Race Condition
| |
CVE-2024-39488
| |
Resource Injection
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
CVE-2024-36936
| |
Out-of-bounds Write
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
Use After Free
| |
Resource Injection
| |
Covert Timing Channel
| |
Out-of-bounds Read
| |
Stack-based Buffer Overflow
| |
Deadlock
| |
Resource Leak
| |
Race Condition
| |
Resource Injection
| |
Resource Injection
| |
Off-by-one Error
| |
CVE-2024-35960
| |
CVE-2024-35958
| |
Use After Free
| |
CVE-2024-27403
| |
CVE-2024-27397
| |
CVE-2024-27393
| |
Improper Control of a Resource Through its Lifetime
| |
Off-by-one Error
| |
CVE-2024-35960
| |
CVE-2024-35958
| |
Use After Free
| |
CVE-2024-27403
| |
CVE-2024-27397
| |
CVE-2024-27393
| |
Improper Control of a Resource Through its Lifetime
| |
Off-by-one Error
| |
CVE-2024-35960
| |
CVE-2024-35958
| |
Use After Free
| |
CVE-2024-27403
| |
CVE-2024-27397
| |
CVE-2024-27393
| |
Improper Control of a Resource Through its Lifetime
| |
Use After Free
| |
Resource Leak
| |
Resource Injection
| |
Double Free
| |
Out-of-bounds Read
| |
Double Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Resource Leak
| |
Improper Locking
| |
Resource Leak
| |
Resource Leak
| |
Improper Input Validation
| |
Improper Locking
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Resource Injection
| |
Out-of-bounds Read
| |
Improper Resource Locking
| |
Use After Free
| |
Resource Injection
| |
Out-of-bounds Read
| |
Use After Free
| |
Incomplete Cleanup
| |
Improper Initialization
| |
Out-of-Bounds
| |
Race Condition
| |
Use After Free
| |
Improper Locking
| |
Improper Input Validation
| |
Use After Free
| |
Deadlock
| |
Incomplete Cleanup
| |
Race Condition
| |
CVE-2024-38573
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Use After Free
| |
Improper Initialization
| |
Resource Injection
| |
Improper Input Validation
| |
Improper Initialization
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Out-of-bounds Read
| |
Missing Synchronization
| |
Out-of-Bounds
| |
Unchecked Return Value
| |
Resource Leak
| |
Incorrect Default Permissions
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Race Condition
| |
Resource Leak
| |
Resource Injection
| |
Incomplete Internal State Distinction
| |
CVE-2022-48764
| |
Use After Free
| |
CVE-2022-48751
| |
Missing Initialization of Resource
| |
Out-of-bounds Write
| |
Incomplete Cleanup
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Resource Leak
| |
Resource Leak
| |
NULL Pointer Dereference
| |
CVE-2022-48752
| |
Improper Input Validation
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Out-of-bounds Read
| |
Use of Uninitialized Variable
| |
Out-of-bounds Write
| |
Use After Free
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Out-of-bounds Read
| |
Resource Leak
| |
Missing Standardized Error Handling Mechanism
| |
Deadlock
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Divide By Zero
| |
Release of Invalid Pointer or Reference
| |
Use of Uninitialized Variable
| |
Race Condition
| |
CVE-2021-47607
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Out-of-bounds Write
| |
Resource Exhaustion
| |
Use After Free
| |
Resource Exhaustion
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
Resource Injection
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Write
| |
Memory Leak
| |
Resource Injection
| |
CVE-2024-36970
| |
CVE-2024-36966
| |
Resource Injection
| |
Use After Free
| |
Double Free
| |
Race Condition
| |
Race Condition
| |
Improper Handling of Exceptional Conditions
| |
Use After Free
| |
Double Free
| |
Race Condition
| |
Race Condition
| |
Improper Handling of Exceptional Conditions
| |
Use After Free
| |
Double Free
| |
Race Condition
| |
Race Condition
| |
Improper Handling of Exceptional Conditions
| |
Buffer Overflow
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Incomplete Cleanup
| |
Deadlock
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Resource Leak
| |
Use After Free
| |
Resource Injection
| |
Race Condition
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Race Condition
| |
Resource Injection
| |
Resource Leak
| |
Stack-based Buffer Overflow
| |
Resource Leak
| |
Resource Leak
| |
Resource Injection
| |
Resource Exhaustion
| |
Cross-site Scripting (XSS)
| |
Resource Exhaustion
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2023-39321
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Improper Handling of Missing Special Element
| |
Use After Free
| |
CVE-2023-2728
| |
CVE-2023-2727
| |
Resource Exhaustion
| |
Improper Locking
| |
Improper Locking
| |
Out-of-bounds Read
| |
Resource Injection
| |
Use of Uninitialized Variable
| |
Improper Null Termination
| |
Resource Leak
| |
Resource Injection
| |
Resource Leak
| |
Resource Injection
| |
Improper Locking
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Race Condition
| |
NULL Pointer Dereference
| |
Divide By Zero
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Initialization
| |
NULL Pointer Dereference
| |
Use of Uninitialized Variable
| |
Resource Leak
| |
Integer Overflow or Wraparound
| |
Improper Preservation of Permissions
| |
NULL Pointer Dereference
| |
CVE-2024-36918
| |
Untrusted Pointer Dereference
| |
Resource Leak
| |
Time-of-check Time-of-use (TOCTOU)
| |
Use After Free
| |
Double Free
| |
Improper Initialization
| |
Resource Injection
| |
Double Free
| |
CVE-2024-36920
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Use of Uninitialized Resource
| |
Out-of-bounds Read
| |
Deadlock
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Leftover Debug Code
| |
Out-of-Bounds
| |
Improper Initialization
| |
Out-of-bounds Read
| |
Race Condition
| |
Memory Leak
| |
Deadlock
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
Resource Injection
| |
Stack-based Buffer Overflow
| |
Out-of-bounds Write
| |
CVE-2023-52881
| |
CVE-2024-36015
| |
CVE-2024-26993
| |
Integer Underflow
| |
CVE-2024-26804
| |
Use After Free
| |
Resource Injection
| |
Race Condition
| |
Resource Injection
| |
CVE-2024-26993
| |
Integer Underflow
| |
CVE-2024-26804
| |
Use After Free
| |
Resource Injection
| |
Race Condition
| |
Resource Injection
| |
CVE-2024-26993
| |
Integer Underflow
| |
CVE-2024-26804
| |
Use After Free
| |
Resource Injection
| |
Race Condition
| |
Resource Injection
| |
Out-of-bounds Write
| |
CVE-2024-25743
| |
CVE-2024-25742
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2024-25743
| |
CVE-2024-25742
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Use After Free
| |
Resource Injection
| |
Memory Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-Bounds
| |
Information Exposure
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
Improper Resource Shutdown or Release
| |
Memory Leak
| |
Improper Update of Reference Count
| |
Memory Leak
| |
Resource Exhaustion
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Out-of-Bounds
| |
Resource Exhaustion
| |
Use After Free
| |
Memory Leak
| |
Race Condition
| |
Out-of-bounds Write
| |
CVE-2021-47441
| |
Deadlock
| |
Deadlock
| |
Improper Initialization
| |
Resource Leak
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
CVE-2021-47290
| |
NULL Pointer Dereference
| |
CVE-2021-47272
| |
Resource Injection
| |
Out-of-bounds Write
| |
CVE-2021-47276
| |
Improper Initialization
| |
Resource Injection
| |
Resource Exhaustion
| |
Use After Free
| |
Deadlock
| |
Resource Leak
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Resource Leak
| |
CVE-2021-47222
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-Bounds
| |
Resource Leak
| |
Use After Free
| |
Improper Initialization
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Dead Code
| |
Out-of-bounds Read
| |
Resource Injection
| |
Out-of-bounds Read
| |
Double Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Use After Free
| |
Deadlock
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Resource Locking
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Double Free
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Race Condition
| |
Improper Validation of Array Index
| |
Resource Injection
| |
Resource Injection
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Improper Validation of Array Index
| |
NULL Pointer Dereference
| |
External Control of System or Configuration Setting
| |
Improper Input Validation
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Use After Free
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Memory Leak
| |
External Control of System or Configuration Setting
| |
Improper Input Validation
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Incomplete Cleanup
| |
NULL Pointer Dereference
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Improper Resource Shutdown or Release
| |
Stack-based Buffer Overflow
| |
Divide By Zero
| |
Out-of-bounds Read
| |
Race Condition
| |
Improper Locking
| |
Double Free
| |
Improper Resource Shutdown or Release
| |
Missing Initialization of a Variable
| |
Resource Injection
| |
Use After Free
| |
CVE-2021-47455
| |
Resource Injection
| |
Improper Check for Unusual or Exceptional Conditions
| |
Memory Leak
| |
CVE-2021-47384
| |
NULL Pointer Dereference
| |
CVE-2021-47432
| |
Incomplete Cleanup
| |
CVE-2021-47430
| |
Resource Leak
| |
Improper Input Validation
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Access of Uninitialized Pointer
| |
Out-of-bounds Read
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Resource Leak
| |
NULL Pointer Dereference
| |
CVE-2021-47327
| |
Memory Leak
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Resource Injection
| |
Resource Leak
| |
Resource Leak
| |
Use After Free
| |
Deadlock
| |
NULL Pointer Dereference
| |
CVE-2024-36000
| |
CVE-2024-35998
| |
CVE-2024-35976
| |
Memory Leak
| |
CVE-2024-35995
| |
CVE-2024-35957
| |
CVE-2024-35926
| |
CVE-2024-35966
| |
CVE-2024-35964
| |
CVE-2024-35944
| |
CVE-2024-36004
| |
CVE-2024-35950
| |
CVE-2024-35962
| |
CVE-2024-35939
| |
CVE-2024-35946
| |
CVE-2024-35942
| |
CVE-2024-35979
| |
CVE-2024-35989
| |
CVE-2024-35943
| |
CVE-2024-35959
| |
CVE-2024-35963
| |
CVE-2024-35884
| |
CVE-2024-35923
| |
CVE-2024-35952
| |
CVE-2024-35918
| |
CVE-2024-35872
| |
CVE-2024-35867
| |
CVE-2024-35879
| |
Use After Free
| |
Use After Free
| |
CVE-2024-35868
| |
CVE-2024-35875
| |
CVE-2024-35860
| |
CVE-2024-36005
| |
CVE-2024-35861
| |
CVE-2024-35981
| |
CVE-2024-35969
| |
CVE-2024-35954
| |
Use After Free
| |
CVE-2024-35983
| |
CVE-2024-35974
| |
CVE-2024-35934
| |
CVE-2024-35945
| |
CVE-2024-35922
| |
CVE-2024-35880
| |
CVE-2024-36002
| |
CVE-2024-35980
| |
CVE-2024-36007
| |
CVE-2024-35991
| |
Use After Free
| |
CVE-2024-35999
| |
CVE-2024-35876
| |
CVE-2024-35869
| |
CVE-2024-35973
| |
CVE-2024-36006
| |
CVE-2024-35937
| |
CVE-2024-35933
| |
CVE-2024-35967
| |
Memory Leak
| |
CVE-2024-36003
| |
CVE-2024-35925
| |
CVE-2024-35938
| |
CVE-2024-35865
| |
CVE-2024-35965
| |
CVE-2024-35924
| |
CVE-2024-35878
| |
CVE-2024-35877
| |
CVE-2024-35931
| |
CVE-2024-35899
| |
CVE-2024-35897
| |
CVE-2024-35947
| |
CVE-2024-35894
| |
CVE-2024-35896
| |
CVE-2024-35930
| |
CVE-2024-35912
| |
CVE-2024-35904
| |
CVE-2024-35927
| |
CVE-2024-35892
| |
CVE-2024-35908
| |
CVE-2024-35901
| |
CVE-2024-35886
| |
CVE-2024-35900
| |
CVE-2024-35891
| |
CVE-2024-35895
| |
CVE-2024-35905
| |
CVE-2024-35887
| |
CVE-2024-35898
| |
CVE-2024-35917
| |
CVE-2024-35928
| |
CVE-2024-35929
| |
CVE-2024-35903
| |
CVE-2024-35911
| |
CVE-2024-35913
| |
CVE-2024-35888
| |
CVE-2023-52662
| |
CVE-2023-52663
| |
CVE-2023-52661
| |
Resource Leak
| |
Resource Leak
| |
Resource Leak
| |
CVE-2024-35810
| |
CVE-2024-35853
| |
CVE-2024-35859
| |
CVE-2024-35840
| |
CVE-2024-35847
| |
CVE-2024-35855
| |
CVE-2024-35817
| |
CVE-2024-35803
| |
CVE-2024-35824
| |
CVE-2024-35812
| |
CVE-2024-35794
| |
CVE-2024-35805
| |
CVE-2024-35808
| |
CVE-2024-35789
| |
CVE-2024-35787
| |
CVE-2024-35848
| |
CVE-2024-35790
| |
CVE-2024-35839
| |
CVE-2024-35800
| |
CVE-2024-35854
| |
CVE-2024-35836
| |
Resource Leak
| |
CVE-2024-35845
| |
Missing Synchronization
| |
CVE-2024-27404
| |
CVE-2024-35807
| |
Missing Synchronization
| |
CVE-2024-27417
| |
Missing Synchronization
| |
CVE-2024-27431
| |
Premature Release of Resource During Expected Lifetime
| |
CVE-2024-35838
| |
Missing Synchronization
| |
CVE-2024-35852
| |
Missing Synchronization
| |
CVE-2024-27415
| |
CVE-2024-35843
| |
CVE-2024-35834
| |
Resource Exhaustion
| |
CVE-2024-35814
| |
CVE-2024-35797
| |
CVE-2024-35827
| |
Missing Synchronization
| |
CVE-2024-35801
| |
CVE-2024-35835
| |
Missing Synchronization
| |
CVE-2024-27403
| |
Missing Synchronization
| |
CVE-2024-27414
| |
CVE-2024-35822
| |
CVE-2024-35826
| |
CVE-2024-35809
| |
CVE-2024-27436
| |
Missing Synchronization
| |
CVE-2024-35791
| |
CVE-2024-35804
| |
Missing Synchronization
| |
Missing Synchronization
| |
CVE-2024-27413
| |
Missing Synchronization
| |
CVE-2024-35802
| |
CVE-2024-27434
| |
CVE-2024-27410
| |
CVE-2023-52669
| |
CVE-2023-52680
| |
CVE-2023-52674
| |
CVE-2023-52679
| |
CVE-2023-52658
| |
CVE-2023-52698
| |
CVE-2023-52696
| |
CVE-2023-52676
| |
CVE-2023-52686
| |
CVE-2023-52659
| |
CVE-2023-52664
| |
CVE-2023-52675
| |
CVE-2023-52697
| |
CVE-2023-52689
| |
CVE-2023-52690
| |
CVE-2023-52683
| |
CVE-2023-52672
| |
CVE-2024-27393
| |
CVE-2024-27399
| |
CVE-2024-27398
| |
CVE-2024-27395
| |
CVE-2024-21823
| |
CVE-2023-52656
| |
CVE-2023-52654
| |
CVE-2024-25744
| |
Out-of-bounds Write
| |
CVE-2024-25744
| |
Out-of-bounds Write
| |
CVE-2024-25744
| |
Out-of-bounds Write
| |
Resource Exhaustion
| |
Cross-site Scripting (XSS)
| |
Resource Exhaustion
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2023-39321
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Improper Handling of Missing Special Element
| |
Use After Free
| |
CVE-2023-2728
| |
CVE-2023-2727
| |
Resource Exhaustion
| |
CVE-2022-48702
| |
Memory Leak
| |
CVE-2022-48694
| |
Out-of-bounds Read
| |
CVE-2022-48704
| |
Race Condition
| |
CVE-2022-48705
| |
CVE-2022-48703
| |
Improper Locking
| |
Off-by-one Error
| |
Use After Free
| |
Improper Handling of Exceptional Conditions
| |
CVE-2022-48701
| |
CVE-2022-48697
| |
CVE-2022-48695
| |
NULL Pointer Dereference
| |
CVE-2022-48690
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
CVE-2024-27057
| |
CVE-2024-27073
| |
CVE-2024-27077
| |
CVE-2024-27390
| |
CVE-2024-27003
| |
CVE-2024-27011
| |
Race Condition
| |
CVE-2024-27017
| |
CVE-2024-27038
| |
Race Condition
| |
CVE-2024-27389
| |
CVE-2024-27026
| |
CVE-2024-27010
| |
CVE-2024-26991
| |
CVE-2024-27048
| |
CVE-2024-27388
| |
CVE-2024-27065
| |
CVE-2024-27056
| |
CVE-2024-27004
| |
CVE-2024-26976
| |
CVE-2024-27042
| |
CVE-2024-27027
| |
Improper Locking
| |
CVE-2024-26989
| |
CVE-2024-27016
| |
Improper Locking
| |
Improper Resource Locking
| |
CVE-2024-27031
| |
CVE-2024-27025
| |
CVE-2024-26975
| |
CVE-2024-27059
| |
CVE-2024-27023
| |
CVE-2024-26931
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2024-26962
| |
CVE-2024-27000
| |
CVE-2024-26938
| |
CVE-2024-27055
| |
Race Condition
| |
CVE-2024-27079
| |
CVE-2024-27002
| |
Use of Uninitialized Resource
| |
CVE-2024-26992
| |
CVE-2024-26988
| |
Memory Leak
| |
Incomplete Cleanup
| |
CVE-2024-26999
| |
CVE-2024-26953
| |
CVE-2024-26973
| |
CVE-2024-26950
| |
CVE-2024-26958
| |
CVE-2024-26990
| |
Improper Locking
| |
CVE-2024-26945
| |
CVE-2024-26951
| |
CVE-2024-26960
| |
CVE-2024-27039
| |
NULL Pointer Dereference
| |
CVE-2024-27015
| |
Improper Locking
| |
CVE-2024-26939
| |
CVE-2024-26964
| |
CVE-2024-26946
| |
CVE-2024-26937
| |
CVE-2024-26935
| |
Double Free
| |
Improper Input Validation
| |
CVE-2023-52651
| |
CVE-2023-52650
| |
CVE-2023-52653
| |
CVE-2023-52649
| |
CVE-2023-52648
| |
CVE-2022-48669
| |
Stack-based Buffer Overflow
| |
Improper Neutralization of Null Byte or NUL Character
| |
Improper Input Validation
| |
Race Condition
| |
Use After Free
| |
Deadlock
| |
CVE-2024-25743
| |
CVE-2024-25742
| |
Memory Leak
| |
CVE-2024-25743
| |
CVE-2024-25742
| |
CVE-2024-25743
| |
CVE-2024-25742
| |
Memory Leak
| |
Memory Leak
| |
Use After Free
| |
Out-of-Bounds
| |
Integer Underflow
| |
NULL Pointer Dereference
| |
Integer Underflow
| |
Double Free
| |
CVE-2022-48662
| |
Integer Overflow or Wraparound
| |
Improper Handling of Values
| |
Incomplete Internal State Distinction
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
Modules with Circular Dependencies
| |
Access of Uninitialized Pointer
| |
NULL Pointer Dereference
| |
Attempt to Access Child of a Non-structure Pointer
| |
Heap-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Use After Free
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Integer Underflow
| |
Resource Leak
| |
Improper Validation of Specified Index, Position, or Offset in Input
| |
Use After Free
| |
Race Condition
| |
Improper Input Validation
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Race Condition
| |
Buffer Underflow
| |
Resource Injection
| |
Race Condition
| |
Improper Input Validation
| |
Buffer Overflow
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Incomplete Cleanup
| |
Race Condition
| |
Race Condition
| |
Resource Injection
| |
Race Condition
| |
Use After Free
| |
Race Condition
| |
Resource Leak
| |
Resource Leak
| |
Resource Injection
| |
Resource Leak
| |
Improper Input Validation
| |
CVE-2024-26920
| |
Improper Input Validation
| |
Stack-based Buffer Overflow
| |
Memory Leak
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Improper Resource Locking
| |
CVE-2024-26918
| |
Race Condition
| |
Data Element containing Pointer Item without Proper Copy Control Element
| |
Stack-based Buffer Overflow
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Resource Leak
| |
Out-of-bounds Write
| |
Return of Wrong Status Code
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Return of Wrong Status Code
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Return of Wrong Status Code
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Write
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Buffer Access with Incorrect Length Value
| |
Resource Leak
| |
Out-of-bounds Read
| |
Use After Free
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Resource Injection
| |
Improper Input Validation
| |
Improper Neutralization of Null Byte or NUL Character
| |
Excessive Platform Resource Consumption within a Loop
| |
Out-of-bounds Read
| |
Improper Handling of Unicode Encoding
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2024-26782
| |
CVE-2024-26786
| |
Resource Injection
| |
CVE-2024-26803
| |
Resource Exhaustion
| |
Deadlock
| |
Improper Input Validation
| |
Divide By Zero
| |
Improper Handling of Values
| |
Incomplete Cleanup
| |
Improper Null Termination
| |
Race Condition
| |
Divide By Zero
| |
Race Condition
| |
Deadlock
| |
Improper Null Termination
| |
Unchecked Input for Loop Condition
| |
Use After Free
| |
Deadlock
| |
NULL Pointer Dereference
| |
Double Free
| |
Heap-based Buffer Overflow
| |
Deadlock
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Divide By Zero
| |
Improper Null Termination
| |
Improper Input Validation
| |
Resource Injection
| |
Race Condition
| |
Improper Handling of Undefined Parameters
| |
Race Condition
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Use After Free
| |
Deadlock
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
CVE-2024-26707
| |
NULL Pointer Dereference
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Race Condition
| |
Unchecked Input for Loop Condition
| |
Improper Protection Against Physical Side Channels
| |
Resource Injection
| |
Use After Free
| |
Improper Input Validation
| |
Resource Injection
| |
CVE-2024-26666
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Resource Leak
| |
Resource Injection
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Resource Injection
| |
Missing Lock Check
| |
Improper Locking
| |
Integer Underflow
| |
Improper Handling of Unicode Encoding
| |
Improper Handling of Unicode Encoding
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Deadlock
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Race Condition
| |
Resource Injection
| |
Race Condition
| |
Resource Injection
| |
Improper Resource Locking
| |
Incorrect Calculation of Buffer Size
| |
Resource Injection
| |
CVE-2024-26602
| |
Integer Underflow
| |
CVE-2024-26602
| |
Integer Underflow
| |
CVE-2024-26602
| |
Integer Underflow
| |
CVE-2023-28746
| |
Improper Input Validation
| |
Missing Initialization of a Variable
| |
Improper Input Validation
| |
Resource Injection
| |
Missing Lock Check
| |
Resource Injection
| |
Resource Exhaustion
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Unchecked Input for Loop Condition
| |
Memory Leak
| |
Return of Wrong Status Code
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Deadlock
| |
Improper Resource Locking
| |
Deadlock
| |
NULL Pointer Dereference
| |
Deadlock
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Resource Exhaustion
| |
Return of Stack Variable Address
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Protection Against Physical Side Channels
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
NULL Pointer Dereference
| |
CVE-2024-26602
| |
Missing Write Protection for Parametric Data Values
| |
Memory Leak
| |
Use After Free
| |
Race Condition
| |
Out-of-bounds Write
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Validation of Array Index
| |
Double Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Use After Free
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2024-26602
| |
Missing Write Protection for Parametric Data Values
| |
Memory Leak
| |
Use After Free
| |
Race Condition
| |
Out-of-bounds Write
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Validation of Array Index
| |
Double Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Use After Free
| |
Allocation of Resources Without Limits or Throttling
| |
Use After Free
| |
Out-of-bounds Read
| |
Use of Uninitialized Variable
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Unchecked Return Value
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
CVE-2023-52520
| |
CVE-2023-52575
| |
Out-of-bounds Read
| |
Race Condition
| |
Improper Input Validation
| |
Resource Leak
| |
Resource Injection
| |
Missing Encryption of Sensitive Data
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Resource Injection
| |
Resource Leak
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Use After Free
| |
Memory Leak
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Deadlock
| |
Use After Free
| |
Resource Leak
| |
Out-of-Bounds
| |
Use After Free
| |
Resource Leak
| |
Resource Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Resource Leak
| |
Resource Leak
| |
Improper Check or Handling of Exceptional Conditions
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Range Error
| |
Resource Leak
| |
Improper Input Validation
| |
Resource Injection
| |
Missing Support for Integrity Check
| |
Unchecked Error Condition
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
CVE-2023-52474
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Range Error
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
NULL Pointer Dereference
| |
Deadlock
| |
Use After Free
| |
NULL Pointer Dereference
| |
Untrusted Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2023-52462
| |
Use After Free
| |
CVE-2023-52455
| |
Out-of-bounds Read
| |
Buffer Access with Incorrect Length Value
| |
Improper Initialization
| |
NULL Pointer Dereference
| |
CVE-2024-26581
| |
Use After Free
| |
Improper Authentication
| |
Memory Leak
| |
Improper Check for Unusual or Exceptional Conditions
| |
CVE-2024-25744
| |
Stack-based Buffer Overflow
| |
Resource Exhaustion
| |
Missing Write Protection for Parametric Data Values
| |
Memory Leak
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Memory Leak
| |
Missing Write Protection for Parametric Data Values
| |
Memory Leak
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Memory Leak
| |
Missing Write Protection for Parametric Data Values
| |
Memory Leak
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Memory Leak
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Resource Exhaustion
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Improper Handling of Unicode Encoding
| |
Arbitrary Code Injection
| |
Resource Exhaustion
| |
Directory Traversal
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Improper Handling of Unicode Encoding
| |
Arbitrary Code Injection
| |
Resource Exhaustion
| |
Directory Traversal
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Resource Injection
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incorrect Calculation
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Improper Privilege Management
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Update of Reference Count
| |
Double Free
| |
Improper Privilege Management
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Update of Reference Count
| |
Use After Free
| |
Use After Free
| |
Deadlock
| |
Deadlock
| |
Improper Handling of Values
| |
Resource Leak
| |
Information Exposure
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Double Free
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Information Exposure
| |
CVE-2022-27672
| |
Double Free
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Information Exposure
| |
CVE-2022-27672
| |
Double Free
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Information Exposure
| |
CVE-2022-27672
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Zeroization of Hardware Register
| |
Use After Free
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Zeroization of Hardware Register
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Handling of Exceptional Conditions
| |
Allocation of Resources Without Limits or Throttling
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Improper Resource Locking
| |
Improper Resource Locking
| |
Improper Resource Locking
| |
Improper Resource Locking
| |
Incorrect Bitwise Shift of Integer
| |
Incorrect Bitwise Shift of Integer
| |
Divide By Zero
| |
Release of Invalid Pointer or Reference
| |
Sensitive Information Uncleared Before Release
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Reachable Assertion
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Exposure of Resource to Wrong Sphere
| |
Exposure of Resource to Wrong Sphere
| |
Exposure of Resource to Wrong Sphere
| |
Improper Update of Reference Count
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Improper Validation of Array Index
| |
Improper Validation of Array Index
| |
Improper Validation of Array Index
| |
Improper Validation of Array Index
| |
Improper Validation of Array Index
| |
Improper Validation of Array Index
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Use After Free
| |
Interpretation Conflict
| |
Interpretation Conflict
| |
Interpretation Conflict
| |
Interpretation Conflict
| |
Use of Uninitialized Variable
| |
Use of Uninitialized Variable
| |
Use of Uninitialized Variable
| |
Use of Uninitialized Variable
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Out-of-bounds Read
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Improper Ownership Management
| |
Improper Ownership Management
| |
Improper Ownership Management
| |
Improper Ownership Management
| |
Improper Ownership Management
| |
Improper Ownership Management
| |
Improper Initialization
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Authentication Bypass
| |
Authentication Bypass
| |
Authentication Bypass
| |
Authentication Bypass
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2022-27672
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Externally Controlled Reference to a Resource in Another Sphere
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Write-what-where Condition
| |
Write-what-where Condition
| |
Write-what-where Condition
| |
Write-what-where Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Insecure Default Initialization of Resource
| |
Insecure Default Initialization of Resource
| |
Insecure Default Initialization of Resource
| |
Insecure Default Initialization of Resource
| |
Memory Leak
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Non-exit on Failed Initialization
| |
Non-exit on Failed Initialization
| |
Non-exit on Failed Initialization
| |
Non-exit on Failed Initialization
| |
NULL Pointer Dereference
| |
Information Exposure
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Unchecked Return Value
| |
Unchecked Return Value
| |
Unchecked Return Value
| |
Unchecked Return Value
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Memory Leak
| |
Memory Leak
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Improper Locking
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Race Condition During Access to Alternate Channel
| |
Race Condition During Access to Alternate Channel
| |
Race Condition During Access to Alternate Channel
| |
Race Condition During Access to Alternate Channel
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Authentication Bypass by Primary Weakness
| |
Authentication Bypass by Primary Weakness
| |
Authentication Bypass by Primary Weakness
| |
Authentication Bypass by Primary Weakness
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Expected Behavior Violation
| |
Incorrect Control Flow Scoping
| |
Incorrect Control Flow Scoping
| |
Incorrect Control Flow Scoping
| |
Incorrect Control Flow Scoping
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Missing Report of Error Condition
| |
Missing Report of Error Condition
| |
Missing Report of Error Condition
| |
Missing Report of Error Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Expected Behavior Violation
| |
Expected Behavior Violation
| |
Expected Behavior Violation
| |
Expected Behavior Violation
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Update of Reference Count
| |
Improper Update of Reference Count
| |
Improper Update of Reference Count
| |
Improper Update of Reference Count
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2022-36946
| |
CVE-2022-36946
| |
CVE-2022-36946
| |
CVE-2022-36946
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Comparison Using Wrong Factors
| |
Comparison Using Wrong Factors
| |
Comparison Using Wrong Factors
| |
Comparison Using Wrong Factors
| |
Comparison Using Wrong Factors
| |
Comparison Using Wrong Factors
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Privilege Defined With Unsafe Actions
| |
Privilege Defined With Unsafe Actions
| |
Privilege Defined With Unsafe Actions
| |
Privilege Defined With Unsafe Actions
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Time-of-check Time-of-use (TOCTOU)
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
Double Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Missing Initialization of Resource
| |
Missing Initialization of Resource
| |
Missing Initialization of Resource
| |
Missing Initialization of Resource
| |
Missing Initialization of Resource
| |
Missing Initialization of Resource
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Information Exposure
| |
Memory Leak
| |
Authentication Bypass
| |
Authentication Bypass
| |
Authentication Bypass
| |
Authentication Bypass
| |
Out-of-bounds Write
| |
Improper Preservation of Permissions
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Memory Leak
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Use of Uninitialized Resource
| |
Release of Invalid Pointer or Reference
| |
Out-of-Bounds
| |
Race Condition
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Memory Leak
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Insufficient Comparison
| |
Information Exposure
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Improper Initialization
| |
Out-of-bounds Read
| |
Incorrect Authorization
| |
Improper Restriction of Excessive Authentication Attempts
| |
Authentication Bypass
| |
Origin Validation Error
| |
Information Exposure
| |
Improper Cleanup on Thrown Exception
| |
Authentication Bypass
| |
Incorrect Check of Function Return Value
| |