CVE-2024-2201 | |
Use of Uninitialized Variable | |
Memory Leak | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Race Condition | |
CVE-2024-40998 | |
Deadlock | |
Deadlock | |
Deadlock | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Improper Locking | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Improper Input Validation | |
Incomplete Cleanup | |
CVE-2024-26935 | |
Race Condition | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2024-2201 | |
Out-of-bounds Read | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Memory Leak | |
Out-of-bounds Write | |
Use After Free | |
Resource Injection | |
CVE-2024-40901 | |
Race Condition | |
Improper Initialization | |
CVE-2024-35950 | |
Resource Leak | |
Race Condition | |
Improper Input Validation | |
Improper Input Validation | |
Race Condition | |
Improper Handling of Values | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Update of Reference Count | |
Double Free | |
Improper Privilege Management | |
Use After Free | |
Use After Free | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Improper Validation of Array Index | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
NULL Pointer Dereference | |
Double Free | |
CVE-2024-25743 | |
CVE-2024-25742 | |
Always-Incorrect Control Flow Implementation | |
CVE-2024-53138 | |
CVE-2024-53140 | |
CVE-2024-53135 | |
CVE-2024-53125 | |
Race Condition | |
Improper Initialization | |
Use of Uninitialized Variable | |
Use of Uninitialized Variable | |
NULL Pointer Dereference | |
Off-by-one Error | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-35958 | |
CVE-2024-27435 | |
CVE-2024-27397 | |
NULL Pointer Dereference | |
Mismatched Memory Management Routines | |
Deadlock | |
Improper Handling of Overlap Between Protected Memory Ranges | |
Use After Free | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Exhaustion | |
Improper Initialization | |
Resource Leak | |
Out-of-bounds Read | |
Double Free | |
Use After Free | |
NULL Pointer Dereference | |
Untrusted Pointer Dereference | |
Improper Resource Locking | |
Out-of-bounds Read | |
Race Condition | |
Resource Leak | |
Race Condition | |
Out-of-bounds Read | |
CVE-2024-36005 | |
CVE-2024-35969 | |
CVE-2024-35937 | |
CVE-2024-35911 | |
CVE-2024-35899 | |
CVE-2024-35852 | |
CVE-2024-35848 | |
Improper Input Validation | |
CVE-2024-35823 | |
CVE-2024-35800 | |
CVE-2024-35789 | |
Improper Input Validation | |
CVE-2024-27434 | |
CVE-2024-27417 | |
CVE-2024-27065 | |
CVE-2024-27052 | |
CVE-2024-27049 | |
Race Condition | |
NULL Pointer Dereference | |
Improper Input Validation | |
Integer Underflow | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-21823 | |
Resource Leak | |
CVE-2023-52651 | |
Divide By Zero | |
Time-of-check Time-of-use (TOCTOU) | |
CVE-2024-25743 | |
CVE-2024-25742 | |
Information Exposure | |
Improper Handling of Exceptional Conditions | |
Improper Resource Shutdown or Release | |
Incomplete Internal State Distinction | |
Improper Input Validation | |
Improper Input Validation | |
Memory Leak | |
Improper Update of Reference Count | |
Improper Update of Reference Count | |
Untrusted Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Injection | |
Out-of-bounds Read | |
Improper Update of Reference Count | |
Deadlock | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Deadlock | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-Bounds | |
Out-of-bounds Read | |
Resource Injection | |
Out-of-bounds Write | |
CVE-2024-36003 | |
CVE-2024-35962 | |
CVE-2024-35898 | |
CVE-2024-35897 | |
CVE-2024-35896 | |
CVE-2024-35839 | |
CVE-2024-27415 | |
Race Condition | |
Race Condition | |
CVE-2024-27016 | |
Improper Locking | |
Unchecked Return Value to NULL Pointer Dereference | |
Unchecked Return Value to NULL Pointer Dereference | |
Race Condition | |
Integer Overflow or Wraparound | |
CVE-2024-26581 | |
Resource Injection | |
Improper Resource Locking | |
Return of Wrong Status Code | |
Use of Uninitialized Resource | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Resource Injection | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Improper Initialization | |
CVE-2024-35989 | |
CVE-2024-27403 | |
CVE-2023-52658 | |
CVE-2023-28746 | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Divide By Zero | |
Out-of-bounds Read | |
Allocation of Resources Without Limits or Throttling | |
Use After Free | |
Double Free | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Resource Leak | |
Missing Synchronization | |
Use of Uninitialized Variable | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Read | |
CVE-2024-36000 | |
CVE-2024-35875 | |
CVE-2024-35797 | |
CVE-2024-35791 | |
CVE-2024-26946 | |
Deadlock | |
Divide By Zero | |
Use After Free | |
Return of Wrong Status Code | |
Resource Injection | |
NULL Pointer Dereference | |
CVE-2024-35960 | |
Use After Free | |
CVE-2024-27393 | |
CVE-2024-26974 | |
CVE-2024-26801 | |
Double Free | |
Out-of-bounds Read | |
Improper Control of a Resource Through its Lifetime | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Use of Uninitialized Variable | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
Race Condition | |
CVE-2024-38573 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
CVE-2024-35895 | |
Race Condition | |
CVE-2024-26991 | |
Behavioral Change in New Version or Environment | |
NULL Pointer Dereference | |
Double Free | |
Double Free | |
Use After Free | |
Improper Locking | |
Use After Free | |
CVE-2024-38580 | |
Incomplete Cleanup | |
Deadlock | |
CVE-2024-35907 | |
CVE-2024-35885 | |
NULL Pointer Dereference | |
CVE-2024-27046 | |
CVE-2024-27030 | |
Out-of-bounds Read | |
Resource Injection | |
Use After Free | |
Improper Handling of Values | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Buffer Underflow | |
Use After Free | |
Race Condition | |
Improper Input Validation | |
Use After Free | |
CVE-2024-26602 | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Race Condition | |
Return of Wrong Status Code | |
Race Condition | |
Use After Free | |
CVE-2024-25744 | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Integer Underflow | |
Use After Free | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-Bounds | |
Resource Injection | |
Resource Leak | |
Improper Input Validation | |
Memory Leak | |
Incorrect Calculation of Buffer Size | |
Race Condition | |
NULL Pointer Dereference | |
Resource Leak | |
Improper Input Validation | |
Race Condition | |
Improper Resource Shutdown or Release | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Use After Free | |
Race Condition | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Race Condition | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Race Condition | |
Out-of-bounds Read | |
Double Free | |
Improper Access Control | |
Man-in-the-Middle (MitM) | |
Memory Leak | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Allocation of Resources Without Limits or Throttling | |
Resource Exhaustion | |
CVE-2024-35890 | |
CVE-2024-26804 | |
Resource Injection | |
Race Condition | |
Resource Injection | |
CVE-2024-26993 | |
Use After Free | |
Use After Free | |
Buffer Overflow | |
Information Exposure | |
Use After Free | |
Resource Leak | |
Use After Free | |
Stack-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Time-of-check Time-of-use (TOCTOU) | |
Improper Input Validation | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Double Free | |
Race Condition | |
Double Free | |
Race Condition | |
NULL Pointer Dereference | |
Race Condition | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Incorrect Bitwise Shift of Integer | |
Use After Free | |
Improperly Implemented Security Check for Standard | |
Double Free | |
Improper Resource Locking | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Memory Leak | |
Out-of-bounds Write | |
Memory Leak | |
Race Condition | |
Access of Uninitialized Pointer | |
Information Exposure | |
Use After Free | |
Use After Free | |
Logging of Excessive Data | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Race Condition | |
Resource Injection | |
Out-of-bounds Read | |
Out-of-Bounds | |
Race Condition | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
CVE-2024-53109 | |
CVE-2024-53114 | |
CVE-2024-53105 | |
CVE-2024-53110 | |
NULL Pointer Dereference | |
Race Condition | |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
Divide By Zero | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
CVE-2023-52922 | |
Information Exposure | |
NULL Pointer Dereference | |
Improper Check for Unusual or Exceptional Conditions | |
Race Condition | |
CVE-2024-53073 | |
NULL Pointer Dereference | |
CVE-2024-53042 | |
Buffer Overflow | |
CVE-2024-50256 | |
CVE-2024-50251 | |
Out-of-bounds Write | |
CVE-2024-53072 | |
CVE-2024-50275 | |
CVE-2024-53095 | |
CVE-2024-50185 | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
CVE-2024-50201 | |
Improper Initialization | |
Race Condition | |
CVE-2024-53044 | |
Double Free | |
CVE-2024-50191 | |
Double Free | |
Use of Uninitialized Resource | |
CVE-2024-53059 | |
CVE-2024-53048 | |
Improper Locking | |
Improper Locking | |
CVE-2024-53091 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Use After Free | |
Integer Underflow | |
CVE-2024-50216 | |
Use After Free | |
CVE-2024-50179 | |
CVE-2024-53070 | |
Use of Uninitialized Resource | |
Double Free | |
Improper Locking | |
Improper Locking | |
CVE-2024-53093 | |
CVE-2024-50303 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Locking | |
CVE-2024-50294 | |
NULL Pointer Dereference | |
CVE-2024-50200 | |
CVE-2024-50209 | |
Race Condition | |
Out-of-Bounds | |
Expired Pointer Dereference | |
Memory Leak | |
Use of Uninitialized Resource | |
Improper Locking | |
Improper Locking | |
CVE-2024-53090 | |
Resource Injection | |
CVE-2024-50192 | |
Use After Free | |
CVE-2024-50304 | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Always-Incorrect Control Flow Implementation | |
Out-of-bounds Read | |
Missing Release of Resource after Effective Lifetime | |
CVE-2024-53051 | |
CVE-2024-50194 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Memory Leak | |
CVE-2024-50182 | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
CVE-2024-50219 | |
CVE-2024-53045 | |
CVE-2024-53094 | |
Memory Leak | |
CVE-2024-50211 | |
CVE-2024-50189 | |
Use After Free | |
CVE-2024-50199 | |
Use After Free | |
Use After Free | |
Race Condition | |
Use After Free | |
NULL Pointer Dereference | |
Race Condition | |
Resource Injection | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Resource Injection | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Resource Injection | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Resource Injection | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Excessive Iteration | |
Excessive Iteration | |
Excessive Iteration | |
Excessive Iteration | |
State Issues | |
State Issues | |
State Issues | |
State Issues | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Resource Exhaustion | |
Resource Leak | |
Improper Input Validation | |
Improper Input Validation | |
Improper Handling of Values | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Resource Exhaustion | |
Resource Leak | |
Improper Input Validation | |
Improper Input Validation | |
Improper Handling of Values | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Resource Exhaustion | |
Resource Leak | |
Improper Input Validation | |
Improper Input Validation | |
Improper Handling of Values | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
Improper Handling of Length Parameter Inconsistency | |
NULL Pointer Dereference | |
Improper Handling of Length Parameter Inconsistency | |
NULL Pointer Dereference | |
Improper Handling of Length Parameter Inconsistency | |
NULL Pointer Dereference | |
Improper Handling of Length Parameter Inconsistency | |
CVE-2024-50157 | |
NULL Pointer Dereference | |
Race Condition | |
CVE-2024-50107 | |
CVE-2024-50148 | |
NULL Pointer Dereference | |
CVE-2024-50164 | |
Out-of-bounds Write | |
Use After Free | |
Memory Leak | |
CVE-2024-50163 | |
CVE-2024-50142 | |
Use of Uninitialized Resource | |
NULL Pointer Dereference | |
CVE-2024-50155 | |
Use After Free | |
Use After Free | |
Use of Uninitialized Resource | |
Use After Free | |
CVE-2024-50136 | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
CVE-2024-50093 | |
CVE-2024-50095 | |
CVE-2024-50138 | |
CVE-2024-50099 | |
CVE-2024-50101 | |
Buffer Overflow | |
Use After Free | |
Out-of-bounds Read | |
Information Exposure | |
Memory Leak | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-50120 | |
Memory Leak | |
NULL Pointer Dereference | |
CVE-2024-50162 | |
NULL Pointer Dereference | |
CVE-2024-50139 | |
Use After Free | |
NULL Pointer Dereference | |
Race Condition | |
Memory Leak | |
Use After Free | |
Memory Leak | |
Use After Free | |
Memory Leak | |
Use After Free | |
Memory Leak | |
Use After Free | |
NULL Pointer Dereference | |
Excessive Platform Resource Consumption within a Loop | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Missing Initialization of Resource | |
CVE-2024-50082 | |
Out-of-bounds Write | |
Use After Free | |
CVE-2024-50077 | |
CVE-2024-50075 | |
CVE-2024-50081 | |
CVE-2024-50083 | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Improper Resource Shutdown or Release | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-40998 | |
NULL Pointer Dereference | |
Improper Initialization | |
Incomplete Cleanup | |
Improper Input Validation | |
Improper Resource Locking | |
Race Condition | |
CVE-2024-2201 | |
Race Condition | |
Use After Free | |
CVE-2021-47384 | |
Improper Resource Shutdown or Release | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-40998 | |
NULL Pointer Dereference | |
Improper Initialization | |
Incomplete Cleanup | |
Improper Input Validation | |
Improper Resource Locking | |
Race Condition | |
CVE-2024-2201 | |
Race Condition | |
Use After Free | |
CVE-2021-47384 | |
Improper Resource Shutdown or Release | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-40998 | |
NULL Pointer Dereference | |
Improper Initialization | |
Incomplete Cleanup | |
Improper Input Validation | |
Improper Resource Locking | |
Race Condition | |
CVE-2024-2201 | |
Race Condition | |
Use After Free | |
CVE-2021-47384 | |
CVE-2024-49971 | |
CVE-2024-50060 | |
CVE-2024-49995 | |
Use After Free | |
Memory Leak | |
CVE-2024-50019 | |
CVE-2024-50010 | |
CVE-2024-50038 | |
Operation on a Resource after Expiration or Release | |
CVE-2024-50021 | |
CVE-2024-49968 | |
Improper Locking | |
CVE-2024-50015 | |
CVE-2024-49940 | |
Release of Invalid Pointer or Reference | |
CVE-2024-49886 | |
Access of Uninitialized Pointer | |
CVE-2024-49885 | |
CVE-2024-49946 | |
NULL Pointer Dereference | |
CVE-2024-50028 | |
CVE-2024-47738 | |
Use of Uninitialized Resource | |
Improper Locking | |
CVE-2024-50022 | |
CVE-2024-47715 | |
Improper Resource Shutdown or Release | |
Use After Free | |
Improper Handling of Exceptional Conditions | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Improper Locking | |
Use After Free | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Race Condition | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Double Free | |
Integer Overflow or Wraparound | |
CVE-2024-49948 | |
Double Free | |
CVE-2024-50063 | |
Use After Free | |
Use After Free | |
Memory Leak | |
CVE-2024-50012 | |
Memory Leak | |
Divide By Zero | |
Improper Access Control | |
NULL Pointer Dereference | |
CVE-2024-50023 | |
Use of Uninitialized Resource | |
Incomplete Cleanup | |
NULL Pointer Dereference | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
NULL Pointer Dereference | |
Double Free | |
Use After Free | |
CVE-2024-50020 | |
Always-Incorrect Control Flow Implementation | |
Improper Handling of Exceptional Conditions | |
Improper Validation of Array Index | |
Information Exposure | |
NULL Pointer Dereference | |
CVE-2024-49974 | |
CVE-2024-49878 | |
CVE-2024-49959 | |
CVE-2024-49954 | |
Memory Leak | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
Improper Control of a Resource Through its Lifetime | |
NULL Pointer Dereference | |
Improper Locking | |
CVE-2024-49934 | |
Integer Overflow or Wraparound | |
CVE-2024-49933 | |
Improper Validation of Integrity Check Value | |
CVE-2024-49861 | |
Memory Leak | |
Improper Check for Unusual or Exceptional Conditions | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
CVE-2024-50040 | |
Improper Input Validation | |
CVE-2024-49937 | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
NULL Pointer Dereference | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2024-47710 | |
Incomplete Cleanup | |
Use After Free | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
CVE-2024-49999 | |
CVE-2024-47703 | |
Use of Uninitialized Resource | |
NULL Pointer Dereference | |
Use After Free | |
Off-by-one Error | |
Race Condition | |
Off-by-one Error | |
Use After Free | |
CVE-2024-50008 | |
CVE-2024-49935 | |
CVE-2024-49927 | |
Memory Leak | |
Operation on a Resource after Expiration or Release | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Divide By Zero | |
Use After Free | |
CVE-2024-49944 | |
NULL Pointer Dereference | |
Deadlock | |
CVE-2024-49967 | |
Off-by-one Error | |
CVE-2024-47713 | |
Use of Uninitialized Resource | |
Integer Overflow or Wraparound | |
Incomplete Cleanup | |
CVE-2023-52917 | |
Use After Free | |
Use After Free | |
Use After Free | |
Memory Leak | |
Memory Leak | |
CVE-2022-48994 | |
Improper Validation of Array Index | |
Resource Injection | |
CVE-2022-48978 | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Use After Free | |
Improper Validation of Array Index | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Memory Leak | |
Use After Free | |
Use After Free | |
Memory Leak | |
Incomplete Cleanup | |
CVE-2022-48986 | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
CVE-2022-48961 | |
Missing Release of Resource after Effective Lifetime | |
Improper Control of a Resource Through its Lifetime | |
Out-of-bounds Read | |
Use After Free | |
Race Condition | |
NULL Pointer Dereference | |
Memory Leak | |
Race Condition | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Memory Leak | |
Race Condition | |
CVE-2022-49027 | |
NULL Pointer Dereference | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Improper Input Validation | |
Return of Wrong Status Code | |
Use of Uninitialized Resource | |
Deadlock | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2023-28746 | |
NULL Pointer Dereference | |
Return of Wrong Status Code | |
Use of Uninitialized Resource | |
Deadlock | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2023-28746 | |
NULL Pointer Dereference | |
Return of Wrong Status Code | |
Use of Uninitialized Resource | |
Deadlock | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2023-28746 | |
NULL Pointer Dereference | |
Race Condition | |
Improper Check for Unusual or Exceptional Conditions | |
Race Condition | |
Information Exposure | |
Improper Validation of Array Index | |
CVE-2024-47673 | |
CVE-2022-48695 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2022-48695 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2022-48695 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2022-48695 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Improper Initialization | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-27415 | |
Improper Initialization | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-27415 | |
Out-of-bounds Read | |
Improper Initialization | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-27415 | |
CVE-2022-48936 | |
CVE-2022-48936 | |
CVE-2022-48936 | |
CVE-2022-48936 | |
CVE-2024-46839 | |
NULL Pointer Dereference | |
Unchecked Input for Loop Condition | |
Divide By Zero | |
CVE-2024-46830 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2024-46855 | |
Use After Free | |
Improper Input Validation | |
NULL Pointer Dereference | |
CVE-2024-46825 | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Read | |
CVE-2024-46823 | |
CVE-2024-46820 | |
Improper Validation of Array Index | |
CVE-2024-46861 | |
CVE-2024-46834 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-46828 | |
Out-of-bounds Read | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Improper Handling of Unicode Encoding | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Deadlock | |
NULL Pointer Dereference | |
Race Condition | |
NULL Pointer Dereference | |
Resource Injection | |
State Issues | |
NULL Pointer Dereference | |
Resource Injection | |
NULL Pointer Dereference | |
Improper Check for Unusual or Exceptional Conditions | |
Use After Free | |
Deadlock | |
Information Exposure | |
Use After Free | |
Use After Free | |
Improper Locking | |
NULL Pointer Dereference | |
Integer Underflow | |
CVE-2024-46771 | |
Integer Underflow | |
CVE-2024-46745 | |
Out-of-bounds Write | |
Link Following | |
CVE-2024-46777 | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-46783 | |
Use After Free | |
Integer Underflow | |
Out-of-bounds Write | |
Out-of-bounds Read | |
CVE-2024-46754 | |
Uncontrolled Recursion | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Improper Control of a Resource Through its Lifetime | |
NULL Pointer Dereference | |
CVE-2024-46767 | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Resource Injection | |
NULL Pointer Dereference | |
Improper Resource Shutdown or Release | |
CVE-2024-46715 | |
NULL Pointer Dereference | |
Improper Initialization | |
Race Condition | |
CVE-2024-46787 | |
Use After Free | |
Improper Locking | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Input Validation | |
Resource Injection | |
Resource Injection | |
Memory Leak | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
CVE-2024-38573 | |
Out-of-bounds Read | |
CVE-2024-26974 | |
Deadlock | |
Resource Injection | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Input Validation | |
Resource Injection | |
Resource Injection | |
Memory Leak | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
CVE-2024-38573 | |
Out-of-bounds Read | |
CVE-2024-26974 | |
Deadlock | |
Resource Injection | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Input Validation | |
Resource Injection | |
Resource Injection | |
Memory Leak | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
CVE-2024-38573 | |
Out-of-bounds Read | |
CVE-2024-26974 | |
Deadlock | |
Resource Injection | |
Resource Injection | |
Improper Synchronization | |
Race Condition | |
Out-of-Bounds | |
Out-of-Bounds | |
Use of Uninitialized Variable | |
Improper Locking | |
Improper Initialization | |
NULL Pointer Dereference | |
CVE-2024-46706 | |
CVE-2024-46711 | |
Use After Free | |
Improper Authentication | |
Race Condition | |
Time-of-check Time-of-use (TOCTOU) | |
Double Free | |
Improper Locking | |
NULL Pointer Dereference | |
Multiple Locks of a Critical Resource | |
Use After Free | |
Out-of-bounds Read | |
CVE-2024-45017 | |
Out-of-Bounds | |
Insufficient Control Flow Management | |
Out-of-Bounds | |
Improper Control of a Resource Through its Lifetime | |
Use of Uninitialized Variable | |
Use of Uninitialized Variable | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Control of a Resource Through its Lifetime | |
Use After Free | |
Improper Locking | |
NULL Pointer Dereference | |
Uncontrolled Memory Allocation | |
CVE-2024-44984 | |
Improper Check or Handling of Exceptional Conditions | |
Use After Free | |
Improper Check or Handling of Exceptional Conditions | |
Improper Locking | |
Out-of-Bounds | |
Improper Initialization | |
NULL Pointer Dereference | |
Race Condition | |
NULL Pointer Dereference | |
Use After Free | |
Use of Uninitialized Resource | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Initialization | |
Deadlock | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Divide By Zero | |
Improper Input Validation | |
Improper Update of Reference Count | |
Untrusted Pointer Dereference | |
Use After Free | |
Improper Update of Reference Count | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
CVE-2024-35895 | |
CVE-2024-35875 | |
CVE-2024-35839 | |
CVE-2024-26946 | |
Integer Overflow or Wraparound | |
Divide By Zero | |
Improper Input Validation | |
Improper Update of Reference Count | |
Untrusted Pointer Dereference | |
Use After Free | |
Improper Update of Reference Count | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
CVE-2024-35895 | |
CVE-2024-35875 | |
CVE-2024-35839 | |
CVE-2024-26946 | |
Integer Overflow or Wraparound | |
Divide By Zero | |
Improper Input Validation | |
Improper Update of Reference Count | |
Untrusted Pointer Dereference | |
Use After Free | |
Improper Update of Reference Count | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
CVE-2024-35895 | |
CVE-2024-35875 | |
CVE-2024-35839 | |
CVE-2024-26946 | |
Resource Leak | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Sensitive Information Uncleared Before Release | |
NULL Pointer Dereference | |
Race Condition | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Improper Resource Locking | |
Improper Zeroization of Hardware Register | |
Sensitive Information Uncleared Before Release | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Execution with Unnecessary Privileges | |
Resource Exhaustion | |
Use After Free | |
Interpretation Conflict | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Non-exit on Failed Initialization | |
Out-of-bounds Write | |
Use After Free | |
Incorrect Control Flow Scoping | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Buffer Overflow | |
Improper Locking | |
NULL Pointer Dereference | |
Expected Behavior Violation | |
Use After Free | |
Double Free | |
Improper Update of Reference Count | |
Use After Free | |
Buffer Overflow | |
Out-of-Bounds | |
Use After Free | |
Write-what-where Condition | |
Memory Leak | |
Race Condition During Access to Alternate Channel | |
Race Condition | |
Memory Leak | |
Race Condition | |
Out-of-Bounds | |
Incomplete Cleanup | |
Improper Locking | |
Double Free | |
Improper Restriction of Communication Channel to Intended Endpoints | |
Insecure Default Initialization of Resource | |
Authentication Bypass by Primary Weakness | |
Improper Locking | |
Use After Free | |
NULL Pointer Dereference | |
Race Condition | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Exposure of Resource to Wrong Sphere | |
Improper Ownership Management | |
Integer Overflow or Wraparound | |
Use After Free | |
Buffer Overflow | |
Use After Free | |
Incorrect Calculation of Buffer Size | |
Use After Free | |
Double Free | |
Deadlock | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Use of Uninitialized Variable | |
Missing Report of Error Condition | |
CVE-2022-36946 | |
Use After Free | |
Unchecked Return Value | |
NULL Pointer Dereference | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |
Information Exposure | |
Double Free | |
Incorrect Conversion between Numeric Types | |
Information Exposure | |
Use After Free | |
Authentication Bypass | |
Use of Uninitialized Resource | |
Information Exposure | |
Information Exposure | |
NULL Pointer Dereference | |
Privilege Defined With Unsafe Actions | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incorrect Authorization | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Improper Cross-boundary Removal of Sensitive Data | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Missing Initialization of Resource | |
Memory Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
Race Condition | |
Authentication Bypass | |
Allocation of Resources Without Limits or Throttling | |
Improper Preservation of Permissions | |
Buffer Overflow | |
Out-of-Bounds | |
Improper Locking | |
Incorrect Default Permissions | |
Use After Free | |
Comparison Using Wrong Factors | |
Buffer Overflow | |
Use After Free | |
Use of Uninitialized Resource | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Race Condition | |
Information Exposure | |
Resource Exhaustion | |
Memory Leak | |
Race Condition | |
Resource Exhaustion | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Use After Free | |
Divide By Zero | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Divide By Zero | |
Improper Input Validation | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Reachable Assertion | |
NULL Pointer Dereference | |
CVE-2024-42107 | |
Improper Input Validation | |
Improper Input Validation | |
Memory Leak | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2024-36000 | |
Improper Input Validation | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
CVE-2024-42107 | |
Improper Input Validation | |
Improper Input Validation | |
Memory Leak | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2024-36000 | |
Improper Input Validation | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
CVE-2024-42107 | |
Improper Input Validation | |
Improper Input Validation | |
Memory Leak | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2024-36000 | |
Improper Input Validation | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
CVE-2024-42107 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Double Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
CVE-2022-48936 | |
Race Condition | |
Use After Free | |
Excessive Iteration | |
Memory Leak | |
Buffer Overflow | |
Memory Leak | |
Resource Leak | |
NULL Pointer Dereference | |
Improper Resource Shutdown or Release | |
Resource Leak | |
Improper Check or Handling of Exceptional Conditions | |
Resource Leak | |
Deadlock | |
Resource Injection | |
Resource Leak | |
Improper Access Control | |
NULL Pointer Dereference | |
Incorrect Privilege Assignment | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Resource Injection | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Memory Leak | |
Improper Input Validation | |
NULL Pointer Dereference | |
Missing Release of Resource after Effective Lifetime | |
NULL Pointer Dereference | |
Improper Handling of Length Parameter Inconsistency | |
Incorrect Calculation of Buffer Size | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
NULL Pointer Dereference | |
Resource Leak | |
Memory Leak | |
Resource Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Incorrect Calculation | |
Information Exposure | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Improper Locking | |
Resource Injection | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Reachable Assertion | |
Improper Input Validation | |
Deadlock | |
Missing Initialization of a Variable | |
Deadlock | |
Numeric Range Comparison Without Minimum Check | |
CVE-2024-42304 | |
Divide By Zero | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Injection | |
NULL Pointer Dereference | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Restriction of Power Consumption | |
NULL Pointer Dereference | |
Return of Wrong Status Code | |
CVE-2024-42322 | |
Multiple Locks of a Critical Resource | |
NULL Pointer Dereference | |
Improper Validation of Array Index | |
Race Condition | |
Use After Free | |
Improper Locking | |
Resource Exhaustion | |
Use After Free | |
Improper Handling of Length Parameter Inconsistency | |
Memory Leak | |
Resource Injection | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Use of Uninitialized Resource | |
Out-of-bounds Read | |
Improper Input Validation | |
Double Free | |
Use of Uninitialized Variable | |
Out-of-bounds Read | |
Use After Free | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Improper Resource Locking | |
CVE-2024-35937 | |
CVE-2024-35907 | |
CVE-2024-35852 | |
Improper Input Validation | |
CVE-2024-35789 | |
CVE-2024-27052 | |
CVE-2024-27046 | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
CVE-2024-21823 | |
Resource Leak | |
Improper Resource Locking | |
CVE-2023-52651 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Double Free | |
Use of Uninitialized Variable | |
Out-of-bounds Read | |
Use After Free | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Improper Resource Locking | |
CVE-2024-35937 | |
CVE-2024-35907 | |
CVE-2024-35852 | |
Improper Input Validation | |
CVE-2024-35789 | |
CVE-2024-27052 | |
CVE-2024-27046 | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
CVE-2024-21823 | |
Resource Leak | |
Improper Resource Locking | |
CVE-2023-52651 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Double Free | |
Use of Uninitialized Variable | |
Out-of-bounds Read | |
Use After Free | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Improper Resource Locking | |
CVE-2024-35937 | |
CVE-2024-35907 | |
CVE-2024-35852 | |
Improper Input Validation | |
CVE-2024-35789 | |
CVE-2024-27052 | |
CVE-2024-27046 | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
CVE-2024-21823 | |
Resource Leak | |
Improper Resource Locking | |
CVE-2023-52651 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Input Validation | |
Improper Input Validation | |
Untrusted Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2024-35898 | |
CVE-2024-35897 | |
CVE-2024-27403 | |
CVE-2024-27397 | |
CVE-2024-27393 | |
CVE-2024-26993 | |
Use After Free | |
Resource Injection | |
CVE-2024-21823 | |
Race Condition | |
Resource Leak | |
Allocation of Resources Without Limits or Throttling | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Injection | |
Resource Injection | |
Improper Locking | |
Resource Injection | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Resource Injection | |
Improper Clearing of Heap Memory Before Release ('Heap Inspection') | |
Resource Injection | |
Improper Input Validation | |
Resource Injection | |
Race Condition | |
Resource Injection | |
Resource Injection | |
Missing Synchronization | |
Improper Initialization | |
Resource Injection | |
Out-of-bounds Read | |
Untrusted Pointer Dereference | |
Race Condition | |
Out-of-bounds Read | |
CVE-2024-35962 | |
CVE-2024-35896 | |
CVE-2024-35885 | |
CVE-2024-35823 | |
Improper Input Validation | |
Improper Resource Locking | |
CVE-2024-27030 | |
Behavioral Change in New Version or Environment | |
Double Free | |
Race Condition | |
Range Error | |
Use After Free | |
NULL Pointer Dereference | |
Missing Lock Check | |
NULL Pointer Dereference | |
Use After Free | |
Improper Initialization | |
Resource Injection | |
Out-of-bounds Read | |
Untrusted Pointer Dereference | |
Race Condition | |
Out-of-bounds Read | |
CVE-2024-35962 | |
CVE-2024-35896 | |
CVE-2024-35885 | |
CVE-2024-35823 | |
Improper Input Validation | |
Improper Resource Locking | |
CVE-2024-27030 | |
Behavioral Change in New Version or Environment | |
Double Free | |
Race Condition | |
Range Error | |
Use After Free | |
NULL Pointer Dereference | |
Missing Lock Check | |
NULL Pointer Dereference | |
Use After Free | |
Improper Initialization | |
Resource Injection | |
Out-of-bounds Read | |
Untrusted Pointer Dereference | |
Race Condition | |
Out-of-bounds Read | |
CVE-2024-35962 | |
CVE-2024-35896 | |
CVE-2024-35885 | |
CVE-2024-35823 | |
Improper Input Validation | |
Improper Resource Locking | |
CVE-2024-27030 | |
Behavioral Change in New Version or Environment | |
Double Free | |
Race Condition | |
Range Error | |
Use After Free | |
NULL Pointer Dereference | |
Missing Lock Check | |
NULL Pointer Dereference | |
Use After Free | |
Use of Uninitialized Variable | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Improper Validation of Array Index | |
Use of Uninitialized Resource | |
Use of Uninitialized Variable | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Untrusted Pointer Dereference | |
Use of Uninitialized Variable | |
NULL Pointer Dereference | |
Improper Handling of Length Parameter Inconsistency | |
Buffer Overflow | |
NULL Pointer Dereference | |
Deadlock | |
Resource Management Errors | |
Improper Resource Shutdown or Release | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Use After Free | |
Improper Resource Locking | |
Excessive Iteration | |
Memory Leak | |
Resource Injection | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Incomplete Internal State Distinction | |
Use After Free | |
Double Free | |
NULL Pointer Dereference | |
CVE-2024-42129 | |
Resource Injection | |
Use After Free | |
Allocation of Resources Without Limits or Throttling | |
Improper Input Validation | |
Release of Invalid Pointer or Reference | |
Use After Free | |
Integer Overflow or Wraparound | |
Double Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Out-of-bounds Write | |
Access of Uninitialized Pointer | |
Use of Uninitialized Variable | |
Use After Free | |
NULL Pointer Dereference | |
Static Code Injection | |
NULL Pointer Dereference | |
Information Exposure | |
Incomplete Internal State Distinction | |
Divide By Zero | |
Use After Free | |
Double Free | |
NULL Pointer Dereference | |
Improper Input Validation | |
Improper Control of Document Type Definition | |
Deadlock | |
Incomplete Internal State Distinction | |
Incomplete Internal State Distinction | |
Stack-based Buffer Overflow | |
Deadlock | |
Resource Injection | |
NULL Pointer Dereference | |
Unchecked Return Value | |
Resource Injection | |
Deadlock | |
Allocation of Resources Without Limits or Throttling | |
Information Exposure | |
Improper Update of Reference Count | |
Memory Leak | |
Improper Input Validation | |
NULL Pointer Dereference | |
Double Free | |
Unchecked Return Value | |
Stack-based Buffer Overflow | |
Resource Injection | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Heap-based Buffer Overflow | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Race Condition | |
Buffer Overflow | |
Resource Injection | |
Information Exposure | |
Resource Leak | |
Improper Resource Locking | |
Unchecked Return Value | |
Deadlock | |
Improper Input Validation | |
Use After Free | |
Heap-based Buffer Overflow | |
CVE-2024-35890 | |
CVE-2024-35890 | |
CVE-2024-35890 | |
CVE-2024-35890 | |
Improper Input Validation | |
Improper Input Validation | |
Race Condition | |
Out-of-bounds Write | |
Incomplete Cleanup | |
Deadlock | |
Use After Free | |
Resource Leak | |
Out-of-bounds Write | |
CVE-2024-35950 | |
CVE-2024-35899 | |
CVE-2024-35897 | |
CVE-2024-35791 | |
CVE-2024-27417 | |
CVE-2024-27065 | |
Race Condition | |
Race Condition | |
CVE-2024-27016 | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Double Free | |
Improper Locking | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
Resource Injection | |
Race Condition | |
Use After Free | |
Improper Handling of Values | |
Use After Free | |
Double Free | |
Race Condition | |
Integer Overflow or Wraparound | |
CVE-2024-26581 | |
Stack-based Buffer Overflow | |
Improper Update of Reference Count | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Resource Leak | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-Bounds | |
Double Free | |
Race Condition | |
Buffer Underflow | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
Race Condition | |
Out-of-bounds Write | |
Incomplete Cleanup | |
Deadlock | |
Use After Free | |
Resource Leak | |
Out-of-bounds Write | |
CVE-2024-35950 | |
CVE-2024-35899 | |
CVE-2024-35897 | |
CVE-2024-35791 | |
CVE-2024-27417 | |
CVE-2024-27065 | |
Race Condition | |
Race Condition | |
CVE-2024-27016 | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Double Free | |
Improper Locking | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
Resource Injection | |
Race Condition | |
Use After Free | |
Improper Handling of Values | |
Use After Free | |
Double Free | |
Race Condition | |
Integer Overflow or Wraparound | |
CVE-2024-26581 | |
Stack-based Buffer Overflow | |
Improper Update of Reference Count | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Resource Leak | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-Bounds | |
Double Free | |
Race Condition | |
Buffer Underflow | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
Race Condition | |
Out-of-bounds Write | |
Incomplete Cleanup | |
Deadlock | |
Use After Free | |
Resource Leak | |
Out-of-bounds Write | |
CVE-2024-35950 | |
CVE-2024-35899 | |
CVE-2024-35897 | |
CVE-2024-35791 | |
CVE-2024-27417 | |
CVE-2024-27065 | |
Race Condition | |
Race Condition | |
CVE-2024-27016 | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Double Free | |
Improper Locking | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
Resource Injection | |
Race Condition | |
Use After Free | |
Improper Handling of Values | |
Use After Free | |
Double Free | |
Race Condition | |
Integer Overflow or Wraparound | |
CVE-2024-26581 | |
Stack-based Buffer Overflow | |
Improper Update of Reference Count | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Resource Leak | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-Bounds | |
Double Free | |
Race Condition | |
Buffer Underflow | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Race Condition | |
Out-of-bounds Read | |
Stack-based Buffer Overflow | |
CVE-2024-40998 | |
Improper Input Validation | |
Resource Injection | |
Resource Injection | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Improper Update of Reference Count | |
Resource Injection | |
Deadlock | |
Resource Exhaustion | |
NULL Pointer Dereference | |
Improper Input Validation | |
Improper Update of Reference Count | |
NULL Pointer Dereference | |
Deadlock | |
Out-of-Bounds | |
Resource Injection | |
Return of Wrong Status Code | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
Deadlock | |
Deadlock | |
Expired Pointer Dereference | |
NULL Pointer Dereference | |
Resource Leak | |
Use After Free | |
Improper Update of Reference Count | |
NULL Pointer Dereference | |
Expired Pointer Dereference | |
Use After Free | |
Resource Injection | |
Untrusted Pointer Dereference | |
Deadlock | |
Time-of-check Time-of-use (TOCTOU) | |
Resource Injection | |
Use After Free | |
Use After Free | |
Improper Locking | |
Resource Injection | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Injection | |
Integer Overflow or Wraparound | |
Deadlock | |
Improper Initialization | |
Improper Synchronization | |
Resource Leak | |
Out-of-bounds Write | |
Use After Free | |
Use of Uninitialized Resource | |
NULL Pointer Dereference | |
Resource Injection | |
Improper Resource Locking | |
Resource Injection | |
Out-of-bounds Read | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Resource Injection | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Memory Leak | |
Memory Leak | |
Improper Initialization | |
Non-exit on Failed Initialization | |
CVE-2022-48849 | |
Resource Injection | |
Out-of-bounds Read | |
Use After Free | |
Integer Underflow | |
CVE-2022-48834 | |
Resource Injection | |
Use After Free | |
Resource Injection | |
Use After Free | |
Integer Overflow or Wraparound | |
Resource Injection | |
Improper Input Validation | |
NULL Pointer Dereference | |
Missing Lock Check | |
Use After Free | |
CVE-2022-48830 | |
Race Condition | |
Deadlock | |
Use After Free | |
Race Condition | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Management Errors | |
CVE-2022-48831 | |
CVE-2022-48836 | |
Resource Injection | |
Resource Leak | |
NULL Pointer Dereference | |
Resource Leak | |
Resource Injection | |
State Issues | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
NULL Pointer Dereference | |
Incorrect Check of Function Return Value | |
Release of Invalid Pointer or Reference | |
NULL Pointer Dereference | |
CVE-2022-48802 | |
CVE-2022-48832 | |
CVE-2022-48811 | |
Permission Issues | |
Resource Injection | |
Improper Update of Reference Count | |
CVE-2022-48785 | |
Deadlock | |
Resource Injection | |
Expired Pointer Dereference | |
Race Condition | |
Use After Free | |
Out-of-Bounds | |
Resource Leak | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Use After Free | |
CVE-2024-39507 | |
CVE-2024-40901 | |
CVE-2024-39509 | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
CVE-2024-36005 | |
CVE-2024-35969 | |
CVE-2024-35898 | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-26801 | |
Mismatched Memory Management Routines | |
Divide By Zero | |
Race Condition | |
Race Condition | |
Deadlock | |
Improper Handling of Overlap Between Protected Memory Ranges | |
Use After Free | |
Improper Validation of Array Index | |
Use After Free | |
Out-of-bounds Write | |
CVE-2024-36005 | |
CVE-2024-35969 | |
CVE-2024-35898 | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-26801 | |
Mismatched Memory Management Routines | |
Divide By Zero | |
Race Condition | |
Race Condition | |
Deadlock | |
Improper Handling of Overlap Between Protected Memory Ranges | |
Use After Free | |
Improper Validation of Array Index | |
Use After Free | |
Out-of-bounds Write | |
CVE-2024-36005 | |
CVE-2024-35969 | |
CVE-2024-35898 | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-26801 | |
Mismatched Memory Management Routines | |
Divide By Zero | |
Race Condition | |
Race Condition | |
Deadlock | |
Improper Handling of Overlap Between Protected Memory Ranges | |
Use After Free | |
Improper Validation of Array Index | |
CVE-2024-39490 | |
Memory Leak | |
Out-of-bounds Read | |
CVE-2024-39491 | |
Race Condition | |
CVE-2024-39488 | |
Resource Injection | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
CVE-2024-36936 | |
Out-of-bounds Write | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Use After Free | |
Resource Injection | |
Deadlock | |
Covert Timing Channel | |
Out-of-bounds Read | |
Stack-based Buffer Overflow | |
Improper Initialization | |
Deadlock | |
Resource Leak | |
Resource Injection | |
Race Condition | |
Off-by-one Error | |
CVE-2024-35960 | |
CVE-2024-35958 | |
Use After Free | |
CVE-2024-27403 | |
CVE-2024-27397 | |
CVE-2024-27393 | |
Improper Control of a Resource Through its Lifetime | |
Off-by-one Error | |
CVE-2024-35960 | |
CVE-2024-35958 | |
Use After Free | |
CVE-2024-27403 | |
CVE-2024-27397 | |
CVE-2024-27393 | |
Improper Control of a Resource Through its Lifetime | |
Off-by-one Error | |
CVE-2024-35960 | |
CVE-2024-35958 | |
Use After Free | |
CVE-2024-27403 | |
CVE-2024-27397 | |
CVE-2024-27393 | |
Improper Control of a Resource Through its Lifetime | |
Use After Free | |
Resource Leak | |
Resource Injection | |
Double Free | |
Out-of-bounds Read | |
Double Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Leak | |
Improper Input Validation | |
Improper Locking | |
Resource Leak | |
Resource Leak | |
Improper Input Validation | |
Improper Locking | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Improper Resource Locking | |
Use After Free | |
Out-of-bounds Read | |
Resource Injection | |
Out-of-bounds Read | |
Incomplete Cleanup | |
Improper Initialization | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Race Condition | |
Improper Locking | |
Use of Uninitialized Variable | |
Use of Uninitialized Variable | |
Resource Injection | |
Deadlock | |
Incomplete Cleanup | |
Use After Free | |
Race Condition | |
Stack-based Buffer Overflow | |
CVE-2024-38573 | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Use After Free | |
Resource Injection | |
Improper Initialization | |
Improper Input Validation | |
NULL Pointer Dereference | |
CVE-2024-38580 | |
Improper Initialization | |
NULL Pointer Dereference | |
Memory Leak | |
Out-of-bounds Read | |
Out-of-Bounds | |
Missing Synchronization | |
Resource Leak | |
Incorrect Default Permissions | |
Unchecked Return Value | |
Resource Leak | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Race Condition | |
NULL Pointer Dereference | |
Incomplete Internal State Distinction | |
Resource Injection | |
CVE-2022-48764 | |
Resource Leak | |
Missing Initialization of Resource | |
Out-of-bounds Write | |
CVE-2022-48751 | |
NULL Pointer Dereference | |
Buffer Underflow | |
Resource Injection | |
Incomplete Cleanup | |
Out-of-bounds Read | |
Resource Leak | |
Use After Free | |
Resource Leak | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
CVE-2022-48752 | |
Improper Input Validation | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Out-of-bounds Read | |
Use of Uninitialized Variable | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Resource Leak | |
Missing Standardized Error Handling Mechanism | |
Deadlock | |
NULL Pointer Dereference | |
Allocation of Resources Without Limits or Throttling | |
Use After Free | |
Divide By Zero | |
Release of Invalid Pointer or Reference | |
Use of Uninitialized Variable | |
Race Condition | |
Use After Free | |
CVE-2021-47607 | |
NULL Pointer Dereference | |
Improper Locking | |
Resource Exhaustion | |
Use After Free | |
Out-of-bounds Write | |
Resource Exhaustion | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Resource Injection | |
Out-of-bounds Write | |
Use After Free | |
Memory Leak | |
Resource Injection | |
CVE-2024-36970 | |
CVE-2024-36966 | |
Resource Injection | |
Use After Free | |
Double Free | |
Race Condition | |
Race Condition | |
Improper Handling of Exceptional Conditions | |
Use After Free | |
Double Free | |
Race Condition | |
Race Condition | |
Improper Handling of Exceptional Conditions | |
Use After Free | |
Double Free | |
Race Condition | |
Race Condition | |
Improper Handling of Exceptional Conditions | |
Buffer Overflow | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
Deadlock | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Leak | |
Use After Free | |
Race Condition | |
Resource Injection | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Read | |
Race Condition | |
Resource Injection | |
Resource Leak | |
Stack-based Buffer Overflow | |
Resource Leak | |
Resource Leak | |
Resource Injection | |
Resource Exhaustion | |
Cross-site Scripting (XSS) | |
Resource Exhaustion | |
Allocation of Resources Without Limits or Throttling | |
CVE-2023-39321 | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Resource Exhaustion | |
Resource Exhaustion | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use After Free | |
CVE-2023-2728 | |
CVE-2023-2727 | |
Resource Exhaustion | |
Improper Locking | |
Improper Locking | |
Out-of-bounds Read | |
Resource Injection | |
Use of Uninitialized Variable | |
Improper Null Termination | |
Resource Leak | |
Use After Free | |
Resource Injection | |
Incomplete Cleanup | |
Resource Leak | |
Resource Injection | |
Improper Locking | |
Resource Leak | |
NULL Pointer Dereference | |
Race Condition | |
Off-by-one Error | |
NULL Pointer Dereference | |
Divide By Zero | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Improper Initialization | |
NULL Pointer Dereference | |
Use of Uninitialized Variable | |
Integer Overflow or Wraparound | |
Resource Leak | |
Improper Preservation of Permissions | |
NULL Pointer Dereference | |
CVE-2024-36918 | |
Untrusted Pointer Dereference | |
Resource Leak | |
Use After Free | |
Double Free | |
Use After Free | |
Double Free | |
Improper Initialization | |
Resource Injection | |
CVE-2024-36920 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Injection | |
Use of Uninitialized Resource | |
NULL Pointer Dereference | |
Deadlock | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Deadlock | |
Out-of-bounds Write | |
Leftover Debug Code | |
Out-of-Bounds | |
Improper Initialization | |
Race Condition | |
Out-of-bounds Read | |
Race Condition | |
Memory Leak | |
Deadlock | |
NULL Pointer Dereference | |
Improper Resource Locking | |
Out-of-bounds Write | |
Resource Injection | |
Stack-based Buffer Overflow | |
Out-of-bounds Write | |
CVE-2023-52881 | |
CVE-2024-36015 | |
CVE-2024-26993 | |
Integer Underflow | |
CVE-2024-26804 | |
Use After Free | |
Resource Injection | |
Race Condition | |
Resource Injection | |
CVE-2024-26993 | |
Integer Underflow | |
CVE-2024-26804 | |
Use After Free | |
Resource Injection | |
Race Condition | |
Resource Injection | |
CVE-2024-26993 | |
Integer Underflow | |
CVE-2024-26804 | |
Use After Free | |
Resource Injection | |
Race Condition | |
Resource Injection | |
Out-of-bounds Write | |
CVE-2024-25743 | |
CVE-2024-25742 | |
Use After Free | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
CVE-2024-25743 | |
CVE-2024-25742 | |
Use After Free | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
Resource Injection | |
NULL Pointer Dereference | |
Memory Leak | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Information Exposure | |
NULL Pointer Dereference | |
Improper Resource Shutdown or Release | |
Resource Exhaustion | |
Improper Update of Reference Count | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Memory Leak | |
Memory Leak | |
Resource Injection | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Use After Free | |
Memory Leak | |
Race Condition | |
Out-of-bounds Write | |
Deadlock | |
CVE-2021-47441 | |
Deadlock | |
Resource Leak | |
Improper Initialization | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2021-47290 | |
Resource Injection | |
CVE-2021-47272 | |
Out-of-bounds Write | |
CVE-2021-47276 | |
Improper Initialization | |
Resource Injection | |
Use After Free | |
Resource Exhaustion | |
Deadlock | |
Resource Leak | |
NULL Pointer Dereference | |
Resource Leak | |
CVE-2021-47222 | |
Resource Leak | |
Resource Leak | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Resource Leak | |
Use After Free | |
Improper Initialization | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Dead Code | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Injection | |
Out-of-bounds Read | |
Double Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Resource Locking | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Deadlock | |
Improper Input Validation | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Improper Resource Locking | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Double Free | |
Resource Injection | |
Race Condition | |
Use After Free | |
Improper Validation of Array Index | |
Resource Injection | |
Incomplete Cleanup | |
Resource Injection | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
External Control of System or Configuration Setting | |
Improper Input Validation | |
NULL Pointer Dereference | |
Resource Injection | |
Memory Leak | |
Use After Free | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Memory Leak | |
External Control of System or Configuration Setting | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
Resource Leak | |
NULL Pointer Dereference | |
Improper Resource Shutdown or Release | |
Stack-based Buffer Overflow | |
Out-of-bounds Read | |
Divide By Zero | |
Improper Locking | |
Race Condition | |
Double Free | |
Improper Resource Shutdown or Release | |
Missing Initialization of a Variable | |
Use After Free | |
Resource Injection | |
CVE-2021-47455 | |
Resource Injection | |
Improper Check for Unusual or Exceptional Conditions | |
Memory Leak | |
Improper Control of a Resource Through its Lifetime | |
NULL Pointer Dereference | |
CVE-2021-47384 | |
Incomplete Cleanup | |
CVE-2021-47432 | |
CVE-2021-47430 | |
Resource Leak | |
Improper Input Validation | |
Resource Leak | |
NULL Pointer Dereference | |
Access of Uninitialized Pointer | |
Out-of-bounds Read | |
Resource Leak | |
Resource Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Memory Leak | |
CVE-2021-47327 | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-bounds Write | |
Resource Injection | |
Resource Leak | |
Use After Free | |
Resource Leak | |
Deadlock | |
NULL Pointer Dereference | |
CVE-2024-36000 | |
CVE-2024-35998 | |
CVE-2024-35976 | |
CVE-2024-35995 | |
Memory Leak | |
CVE-2024-35957 | |
CVE-2024-35926 | |
CVE-2024-35966 | |
CVE-2024-35964 | |
CVE-2024-35960 | |
CVE-2024-35958 | |
CVE-2024-35944 | |
CVE-2024-35950 | |
CVE-2024-36004 | |
CVE-2024-35962 | |
CVE-2024-35939 | |
CVE-2024-35946 | |
CVE-2024-35942 | |
CVE-2024-35979 | |
CVE-2024-35959 | |
CVE-2024-35989 | |
CVE-2024-35963 | |
CVE-2024-35952 | |
CVE-2024-35923 | |
CVE-2024-35918 | |
CVE-2024-35872 | |
CVE-2024-35867 | |
Use After Free | |
CVE-2024-35885 | |
CVE-2024-35879 | |
Use After Free | |
CVE-2024-35875 | |
Use After Free | |
CVE-2024-35868 | |
CVE-2024-35860 | |
CVE-2024-36005 | |
CVE-2024-35861 | |
CVE-2024-35981 | |
CVE-2024-35969 | |
CVE-2024-35983 | |
Use After Free | |
CVE-2024-35954 | |
CVE-2024-35974 | |
CVE-2024-35934 | |
CVE-2024-35945 | |
CVE-2024-35922 | |
CVE-2024-35880 | |
CVE-2024-35980 | |
CVE-2024-36002 | |
Use After Free | |
CVE-2024-36007 | |
CVE-2024-35991 | |
CVE-2024-35999 | |
CVE-2024-35973 | |
CVE-2024-35876 | |
CVE-2024-35869 | |
CVE-2024-36006 | |
CVE-2024-35937 | |
CVE-2024-35967 | |
CVE-2024-35933 | |
Memory Leak | |
CVE-2024-36003 | |
CVE-2024-35865 | |
CVE-2024-35938 | |
CVE-2024-35925 | |
CVE-2024-35965 | |
CVE-2024-35924 | |
CVE-2024-35878 | |
CVE-2024-35877 | |
CVE-2024-35931 | |
CVE-2024-35890 | |
CVE-2024-35896 | |
CVE-2024-35899 | |
CVE-2024-35897 | |
CVE-2024-35894 | |
CVE-2024-35947 | |
CVE-2024-35930 | |
CVE-2024-35912 | |
CVE-2024-35904 | |
CVE-2024-35927 | |
CVE-2024-35907 | |
CVE-2024-35908 | |
CVE-2024-35892 | |
CVE-2024-35901 | |
CVE-2024-35891 | |
CVE-2024-35886 | |
CVE-2024-35900 | |
CVE-2024-35895 | |
CVE-2024-35905 | |
CVE-2024-35917 | |
CVE-2024-35898 | |
CVE-2024-35928 | |
CVE-2024-35929 | |
CVE-2024-35913 | |
CVE-2024-35903 | |
CVE-2024-35911 | |
CVE-2024-35888 | |
CVE-2023-52662 | |
CVE-2023-52663 | |
CVE-2023-52661 | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
CVE-2024-35810 | |
CVE-2024-35859 | |
CVE-2024-35823 | |
CVE-2024-35847 | |
CVE-2024-35853 | |
CVE-2024-35840 | |
CVE-2024-35855 | |
CVE-2024-35803 | |
CVE-2024-35824 | |
CVE-2024-35812 | |
CVE-2024-35817 | |
CVE-2024-35794 | |
CVE-2024-35808 | |
CVE-2024-35805 | |
CVE-2024-35787 | |
CVE-2024-35789 | |
CVE-2024-35848 | |
CVE-2024-35790 | |
CVE-2024-27435 | |
CVE-2024-35800 | |
NULL Pointer Dereference | |
CVE-2024-35839 | |
CVE-2024-35836 | |
Improper Input Validation | |
CVE-2024-35854 | |
Resource Leak | |
CVE-2024-27404 | |
CVE-2024-35807 | |
CVE-2024-27431 | |
CVE-2024-27417 | |
Missing Synchronization | |
CVE-2024-35838 | |
CVE-2024-35852 | |
CVE-2024-27415 | |
CVE-2024-35843 | |
CVE-2024-35797 | |
CVE-2024-35814 | |
CVE-2024-35827 | |
Resource Exhaustion | |
CVE-2024-35834 | |
CVE-2024-35835 | |
CVE-2024-35801 | |
CVE-2024-35822 | |
CVE-2024-27403 | |
CVE-2024-27414 | |
CVE-2024-35809 | |
CVE-2024-35791 | |
CVE-2024-27436 | |
CVE-2024-35826 | |
CVE-2024-35804 | |
CVE-2024-27413 | |
CVE-2024-35802 | |
CVE-2024-27434 | |
CVE-2024-27410 | |
CVE-2023-52669 | |
CVE-2023-52680 | |
CVE-2023-52658 | |
CVE-2023-52674 | |
CVE-2023-52679 | |
CVE-2023-52698 | |
CVE-2023-52696 | |
CVE-2023-52686 | |
CVE-2023-52659 | |
Double Free | |
CVE-2023-52676 | |
CVE-2023-52675 | |
CVE-2023-52689 | |
CVE-2023-52664 | |
CVE-2023-52697 | |
CVE-2023-52690 | |
CVE-2023-52683 | |
CVE-2023-52672 | |
CVE-2024-27393 | |
CVE-2024-27399 | |
CVE-2024-27398 | |
CVE-2024-27397 | |
CVE-2024-27395 | |
CVE-2024-21823 | |
CVE-2023-52656 | |
CVE-2023-52654 | |
CVE-2024-25744 | |
Out-of-bounds Write | |
CVE-2024-25744 | |
Out-of-bounds Write | |
CVE-2024-25744 | |
Out-of-bounds Write | |
Resource Exhaustion | |
Cross-site Scripting (XSS) | |
Resource Exhaustion | |
Allocation of Resources Without Limits or Throttling | |
CVE-2023-39321 | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Resource Exhaustion | |
Resource Exhaustion | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use After Free | |
CVE-2023-2728 | |
CVE-2023-2727 | |
Resource Exhaustion | |
CVE-2024-26974 | |
CVE-2022-48702 | |
Memory Leak | |
CVE-2022-48694 | |
CVE-2022-48704 | |
CVE-2022-48696 | |
CVE-2022-48705 | |
Race Condition | |
Improper Locking | |
CVE-2022-48703 | |
Off-by-one Error | |
CVE-2022-48695 | |
CVE-2022-48701 | |
Improper Handling of Exceptional Conditions | |
CVE-2022-48697 | |
CVE-2022-48690 | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2024-27073 | |
CVE-2024-27057 | |
CVE-2024-27390 | |
CVE-2024-27077 | |
Race Condition | |
CVE-2024-27030 | |
CVE-2024-27003 | |
CVE-2024-27038 | |
CVE-2024-27011 | |
Race Condition | |
CVE-2024-27017 | |
CVE-2024-27389 | |
CVE-2024-27026 | |
CVE-2024-27052 | |
CVE-2024-26993 | |
CVE-2024-27010 | |
CVE-2024-27049 | |
CVE-2024-27065 | |
CVE-2024-26991 | |
CVE-2024-27048 | |
CVE-2024-27004 | |
CVE-2024-27042 | |
CVE-2024-27056 | |
CVE-2024-27027 | |
CVE-2024-26976 | |
Behavioral Change in New Version or Environment | |
CVE-2024-27016 | |
Improper Locking | |
Improper Locking | |
CVE-2024-26989 | |
CVE-2024-27025 | |
Improper Resource Locking | |
CVE-2024-27031 | |
CVE-2024-27023 | |
NULL Pointer Dereference | |
CVE-2024-26975 | |
CVE-2024-27059 | |
Allocation of Resources Without Limits or Throttling | |
CVE-2024-26962 | |
CVE-2024-27046 | |
Out-of-bounds Read | |
CVE-2024-26938 | |
Double Free | |
Race Condition | |
CVE-2024-27079 | |
CVE-2024-27055 | |
CVE-2024-26992 | |
CVE-2024-26988 | |
Race Condition | |
Memory Leak | |
CVE-2024-26999 | |
CVE-2024-26953 | |
Incomplete Cleanup | |
CVE-2024-26973 | |
CVE-2024-26990 | |
Improper Locking | |
CVE-2024-26958 | |
CVE-2024-26950 | |
CVE-2024-26951 | |
CVE-2024-27039 | |
CVE-2024-26945 | |
CVE-2024-26960 | |
NULL Pointer Dereference | |
Improper Locking | |
CVE-2024-27015 | |
CVE-2024-26939 | |
CVE-2024-26946 | |
Reachable Assertion | |
CVE-2024-26964 | |
Double Free | |
CVE-2024-26935 | |
Improper Input Validation | |
CVE-2023-52651 | |
CVE-2023-52650 | |
CVE-2023-52653 | |
CVE-2023-52649 | |
CVE-2023-52648 | |
CVE-2022-48669 | |
Stack-based Buffer Overflow | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Input Validation | |
Use After Free | |
Race Condition | |
Deadlock | |
Memory Leak | |
CVE-2024-25743 | |
CVE-2024-25742 | |
CVE-2024-25743 | |
CVE-2024-25742 | |
Memory Leak | |
CVE-2024-25743 | |
CVE-2024-25742 | |
Memory Leak | |
Use After Free | |
Out-of-Bounds | |
Integer Underflow | |
NULL Pointer Dereference | |
Integer Underflow | |
Double Free | |
CVE-2022-48662 | |
Integer Overflow or Wraparound | |
Incomplete Internal State Distinction | |
Improper Handling of Values | |
Resource Exhaustion | |
Modules with Circular Dependencies | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Access of Uninitialized Pointer | |
Attempt to Access Child of a Non-structure Pointer | |
Heap-based Buffer Overflow | |
NULL Pointer Dereference | |
Use After Free | |
Resource Exhaustion | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Integer Underflow | |
Resource Leak | |
Improper Validation of Specified Index, Position, or Offset in Input | |
Use After Free | |
Race Condition | |
Race Condition | |
Improper Locking | |
Improper Input Validation | |
Deadlock | |
NULL Pointer Dereference | |
Resource Leak | |
NULL Pointer Dereference | |
Race Condition | |
Buffer Underflow | |
Resource Injection | |
Improper Input Validation | |
Race Condition | |
NULL Pointer Dereference | |
Buffer Overflow | |
Incomplete Cleanup | |
Improper Input Validation | |
Race Condition | |
NULL Pointer Dereference | |
Race Condition | |
Resource Injection | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
Race Condition | |
Resource Leak | |
Use After Free | |
Resource Injection | |
Resource Leak | |
Resource Leak | |
Improper Input Validation | |
Unchecked Return Value to NULL Pointer Dereference | |
CVE-2024-26920 | |
Improper Input Validation | |
Stack-based Buffer Overflow | |
Memory Leak | |
Out-of-bounds Read | |
Resource Injection | |
Improper Input Validation | |
Improper Resource Locking | |
Race Condition | |
Data Element containing Pointer Item without Proper Copy Control Element | |
CVE-2024-26918 | |
Use After Free | |
Stack-based Buffer Overflow | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Divide By Zero | |
NULL Pointer Dereference | |
Resource Leak | |
Out-of-bounds Write | |
Return of Wrong Status Code | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Return of Wrong Status Code | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Return of Wrong Status Code | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
NULL Pointer Dereference | |
Buffer Access with Incorrect Length Value | |
Resource Leak | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Use After Free | |
Resource Leak | |
Improper Neutralization of Null Byte or NUL Character | |
Excessive Platform Resource Consumption within a Loop | |
Improper Input Validation | |
Out-of-bounds Read | |
Improper Handling of Unicode Encoding | |
Resource Injection | |
NULL Pointer Dereference | |
Race Condition | |
CVE-2024-26782 | |
CVE-2024-26786 | |
Mismatched Memory Management Routines | |
Resource Injection | |
CVE-2024-26803 | |
Use After Free | |
Resource Exhaustion | |
CVE-2024-26804 | |
CVE-2024-26801 | |
Deadlock | |
Improper Input Validation | |
Divide By Zero | |
Improper Handling of Values | |
Incomplete Cleanup | |
Improper Handling of Values | |
Improper Null Termination | |
Race Condition | |
Divide By Zero | |
Race Condition | |
Deadlock | |
Improper Null Termination | |
Unchecked Input for Loop Condition | |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
Deadlock | |
Double Free | |
Race Condition | |
Heap-based Buffer Overflow | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Improper Input Validation | |
Improper Null Termination | |
Divide By Zero | |
Resource Injection | |
Improper Input Validation | |
Race Condition | |
Improper Handling of Undefined Parameters | |
Race Condition | |
Improper Input Validation | |
NULL Pointer Dereference | |
Deadlock | |
Use After Free | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Use After Free | |
Resource Injection | |
Improper Input Validation | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2024-26707 | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Use After Free | |
Deadlock | |
Race Condition | |
Unchecked Input for Loop Condition | |
Resource Injection | |
Improper Protection Against Physical Side Channels | |
Improper Input Validation | |
Use After Free | |
Resource Injection | |
CVE-2024-26666 | |
Out-of-bounds Read | |
Improper Input Validation | |
Resource Leak | |
Resource Injection | |
Resource Injection | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Resource Injection | |
Missing Lock Check | |
Improper Locking | |
Integer Underflow | |
Improper Handling of Unicode Encoding | |
Improper Handling of Unicode Encoding | |
NULL Pointer Dereference | |
Deadlock | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Race Condition | |
Resource Injection | |
Out-of-bounds Read | |
Race Condition | |
Resource Injection | |
Improper Resource Locking | |
Incorrect Calculation of Buffer Size | |
Resource Injection | |
CVE-2024-26602 | |
Integer Underflow | |
CVE-2024-26602 | |
Integer Underflow | |
CVE-2024-26602 | |
Integer Underflow | |
Race Condition | |
Resource Injection | |
Resource Injection | |
CVE-2023-28746 | |
Improper Input Validation | |
Missing Initialization of a Variable | |
Improper Input Validation | |
Improper Input Validation | |
Resource Injection | |
Missing Lock Check | |
Resource Injection | |
Resource Exhaustion | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Resource Leak | |
Unchecked Input for Loop Condition | |
Memory Leak | |
Return of Wrong Status Code | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Read | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Improper Input Validation | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Deadlock | |
Deadlock | |
Improper Resource Locking | |
Deadlock | |
NULL Pointer Dereference | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Resource Leak | |
Resource Exhaustion | |
Return of Stack Variable Address | |
Race Condition | |
Race Condition | |
NULL Pointer Dereference | |
Improper Resource Shutdown or Release | |
NULL Pointer Dereference | |
Improper Protection Against Physical Side Channels | |
NULL Pointer Dereference | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
NULL Pointer Dereference | |
CVE-2024-26602 | |
Out-of-bounds Write | |
Memory Leak | |
Use After Free | |
Race Condition | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Improper Validation of Array Index | |
Double Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Incorrect Calculation | |
Use After Free | |
Information Exposure | |
NULL Pointer Dereference | |
Use After Free | |
Allocation of Resources Without Limits or Throttling | |
CVE-2024-26602 | |
Out-of-bounds Write | |
Memory Leak | |
Use After Free | |
Race Condition | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Improper Validation of Array Index | |
Double Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Incorrect Calculation | |
Use After Free | |
Information Exposure | |
NULL Pointer Dereference | |
Use After Free | |
Allocation of Resources Without Limits or Throttling | |
Use After Free | |
Out-of-bounds Read | |
Use of Uninitialized Variable | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Resource Leak | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
CVE-2024-26602 | |
Unchecked Return Value | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Incorrect Calculation of Buffer Size | |
Use After Free | |
Race Condition | |
NULL Pointer Dereference | |
CVE-2023-52520 | |
CVE-2023-52575 | |
Out-of-bounds Read | |
Improper Input Validation | |
NULL Pointer Dereference | |
Improper Input Validation | |
Race Condition | |
Resource Leak | |
Memory Leak | |
Resource Leak | |
Resource Injection | |
Improper Handling of Overlap Between Protected Memory Ranges | |
Missing Encryption of Sensitive Data | |
NULL Pointer Dereference | |
Resource Leak | |
Resource Leak | |
Resource Injection | |
Resource Leak | |
NULL Pointer Dereference | |
Memory Leak | |
Use After Free | |
Memory Leak | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Deadlock | |
Use After Free | |
Resource Leak | |
Out-of-Bounds | |
Use After Free | |
Resource Leak | |
Resource Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Resource Leak | |
Resource Leak | |
Improper Check or Handling of Exceptional Conditions | |
Stack-based Buffer Overflow | |
Resource Leak | |
Use After Free | |
Range Error | |
Improper Input Validation | |
Missing Support for Integrity Check | |
Resource Injection | |
Unchecked Error Condition | |
Use After Free | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
CVE-2023-52474 | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Range Error | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Deadlock | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Untrusted Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2023-52462 | |
Use After Free | |
CVE-2023-52455 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Buffer Access with Incorrect Length Value | |
NULL Pointer Dereference | |
Improper Initialization | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
Return of Wrong Status Code | |
Use After Free | |
CVE-2024-26581 | |
Out-of-Bounds | |
Use After Free | |
Improper Authentication | |
Memory Leak | |
Improper Check for Unusual or Exceptional Conditions | |
CVE-2024-25744 | |
Stack-based Buffer Overflow | |
Resource Exhaustion | |
Out-of-bounds Write | |
Memory Leak | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Allocation of Resources Without Limits or Throttling | |
Memory Leak | |
Out-of-bounds Write | |
Memory Leak | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Allocation of Resources Without Limits or Throttling | |
Memory Leak | |
Out-of-bounds Write | |
Memory Leak | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Allocation of Resources Without Limits or Throttling | |
Memory Leak | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Resource Exhaustion | |
Information Exposure | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Improper Handling of Unicode Encoding | |
Arbitrary Code Injection | |
Resource Exhaustion | |
Directory Traversal | |
Use of a Broken or Risky Cryptographic Algorithm | |
Improper Handling of Unicode Encoding | |
Arbitrary Code Injection | |
Resource Exhaustion | |
Directory Traversal | |
Use of a Broken or Risky Cryptographic Algorithm | |
Information Exposure | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Resource Exhaustion | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Improper Privilege Management | |
Use After Free | |
Use After Free | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Improper Validation of Array Index | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Incorrect Calculation | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Improper Privilege Management | |
Use After Free | |
Use After Free | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Improper Validation of Array Index | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Incorrect Calculation | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Improper Privilege Management | |
Use After Free | |
Use After Free | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Improper Validation of Array Index | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Incorrect Calculation | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Double Free | |
Improper Privilege Management | |
Use After Free | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Update of Reference Count | |
Double Free | |
Improper Privilege Management | |
Use After Free | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Update of Reference Count | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Deadlock | |
Deadlock | |
Improper Handling of Values | |
Integer Underflow | |
NULL Pointer Dereference | |
Resource Leak | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Race Condition | |
Use After Free | |
Memory Leak | |
Race Condition | |
Race Condition | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Man-in-the-Middle (MitM) | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Double Free | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Double Free | |
Information Exposure | |
CVE-2022-27672 | |
Double Free | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Double Free | |
Information Exposure | |
CVE-2022-27672 | |
Double Free | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Double Free | |
Information Exposure | |
CVE-2022-27672 | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Zeroization of Hardware Register | |
Use After Free | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Zeroization of Hardware Register | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Race Condition | |
Use After Free | |
Improper Handling of Exceptional Conditions | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Improper Privilege Management | |
Improper Update of Reference Count | |
Out-of-bounds Write | |
Allocation of Resources Without Limits or Throttling | |
Buffer Overflow | |
Double Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Race Condition | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Improper Access Control | |
Use After Free | |
Use After Free | |
Use After Free | |
Stack-based Buffer Overflow | |
Improper Validation of Array Index | |
Information Exposure | |
Information Exposure | |
Out-of-bounds Read | |
Use After Free | |
Time-of-check Time-of-use (TOCTOU) | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Zeroization of Hardware Register | |
Improper Zeroization of Hardware Register | |
Improper Zeroization of Hardware Register | |
Improper Zeroization of Hardware Register | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Double Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Race Condition | |
Double Free | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
Improper Resource Locking | |
Improper Resource Locking | |
Improper Resource Locking | |
Improper Resource Locking | |
Incorrect Bitwise Shift of Integer | |
Incorrect Bitwise Shift of Integer | |
Incorrect Bitwise Shift of Integer | |
Divide By Zero | |
Race Condition | |
Release of Invalid Pointer or Reference | |
Sensitive Information Uncleared Before Release | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Reachable Assertion | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Resource Locking | |
Exposure of Resource to Wrong Sphere | |
Exposure of Resource to Wrong Sphere | |
Exposure of Resource to Wrong Sphere | |
Exposure of Resource to Wrong Sphere | |
Improper Update of Reference Count | |
Improperly Implemented Security Check for Standard | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Double Free | |
Interpretation Conflict | |
Interpretation Conflict | |
Interpretation Conflict | |
Interpretation Conflict | |
Double Free | |
Use of Uninitialized Variable | |
Use of Uninitialized Variable | |
Use of Uninitialized Variable | |
Use of Uninitialized Variable | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Sensitive Information Uncleared Before Release | |
Out-of-bounds Read | |
Use After Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Improper Ownership Management | |
Improper Ownership Management | |
Improper Ownership Management | |
Improper Ownership Management | |
Improper Ownership Management | |
Improper Ownership Management | |
Improper Initialization | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2022-27672 | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Memory Leak | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Externally Controlled Reference to a Resource in Another Sphere | |
Memory Leak | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Write-what-where Condition | |
Write-what-where Condition | |
Write-what-where Condition | |
Write-what-where Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Use After Free | |
Insecure Default Initialization of Resource | |
Insecure Default Initialization of Resource | |
Insecure Default Initialization of Resource | |
Insecure Default Initialization of Resource | |
Memory Leak | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Non-exit on Failed Initialization | |
Non-exit on Failed Initialization | |
Non-exit on Failed Initialization | |
Non-exit on Failed Initialization | |
NULL Pointer Dereference | |
Information Exposure | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Logging of Excessive Data | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Integer Overflow or Wraparound | |
Memory Leak | |
Memory Leak | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Improper Locking | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Uninitialized Pointer | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Race Condition During Access to Alternate Channel | |
Race Condition During Access to Alternate Channel | |
Race Condition During Access to Alternate Channel | |
Race Condition During Access to Alternate Channel | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Use After Free | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Expected Behavior Violation | |
Incorrect Control Flow Scoping | |
Incorrect Control Flow Scoping | |
Incorrect Control Flow Scoping | |
Incorrect Control Flow Scoping | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Missing Report of Error Condition | |
Missing Report of Error Condition | |
Missing Report of Error Condition | |
Missing Report of Error Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Improper Restriction of Communication Channel to Intended Endpoints | |
Improper Restriction of Communication Channel to Intended Endpoints | |
Improper Restriction of Communication Channel to Intended Endpoints | |
Improper Restriction of Communication Channel to Intended Endpoints | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Update of Reference Count | |
Improper Update of Reference Count | |
Improper Update of Reference Count | |
Improper Update of Reference Count | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2022-36946 | |
CVE-2022-36946 | |
CVE-2022-36946 | |
CVE-2022-36946 | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Incorrect Conversion between Numeric Types | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
Improper Locking | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Comparison Using Wrong Factors | |
Comparison Using Wrong Factors | |
Comparison Using Wrong Factors | |
Comparison Using Wrong Factors | |
Comparison Using Wrong Factors | |
Comparison Using Wrong Factors | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Privilege Defined With Unsafe Actions | |
Privilege Defined With Unsafe Actions | |
Privilege Defined With Unsafe Actions | |
Privilege Defined With Unsafe Actions | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Time-of-check Time-of-use (TOCTOU) | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Improper Cross-boundary Removal of Sensitive Data | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
Double Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Missing Initialization of Resource | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Information Exposure | |
Memory Leak | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Out-of-bounds Write | |
Improper Preservation of Permissions | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Buffer Overflow | |
Memory Leak | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Use of Uninitialized Resource | |
Allocation of Resources Without Limits or Throttling | |
Release of Invalid Pointer or Reference | |
Out-of-Bounds | |
Race Condition | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Memory Leak | |
Out-of-bounds Write | |
Out-of-Bounds | |
Insufficient Comparison | |
Information Exposure | |
Use After Free | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Improper Initialization | |
Out-of-bounds Read | |
Incorrect Authorization | |
Resource Exhaustion | |
Improper Restriction of Excessive Authentication Attempts | |
Authentication Bypass | |
Origin Validation Error | |
Information Exposure | |
Improper Cleanup on Thrown Exception | |
Authentication Bypass | |
Incorrect Check of Function Return Value | |