Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Write | |
Out-of-Bounds | |
Use After Free | |
Double Free | |
Out-of-bounds Write | |
Use After Free | |
CVE-2022-29581 | |
Race Condition | |
Use of a Broken or Risky Cryptographic Algorithm | |
CVE-2022-36946 | |
Buffer Overflow | |
Race Condition | |
Use After Free | |
Double Free | |
Double Free | |
Use After Free | |
Out-of-bounds Write | |
Race Condition | |
Race Condition | |
Use After Free | |
Missing Authorization | |
Race Condition | |
Missing Initialization of Resource | |
Use After Free | |
Improper Preservation of Permissions | |
Incorrect Type Conversion or Cast | |
Use of a Broken or Risky Cryptographic Algorithm | |
Information Exposure | |
Race Condition | |
CVE-2021-43976 | |
Out-of-bounds Write | |
Race Condition | |
Improper Authentication | |
Improper Locking | |
Memory Leak | |
Race Condition | |
Memory Leak | |
Out-of-bounds Read | |
Race Condition | |
Double Free | |
Improper Input Validation | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
CVE-2021-28713 | |
CVE-2021-28712 | |
CVE-2021-28711 | |
Use After Free | |
Race Condition | |
Use After Free | |
Time-of-check Time-of-use (TOCTOU) | |
Buffer Overflow | |
Missing Authorization | |
Out-of-bounds Write | |
Use After Free | |