CVE-2022-29581 | |
Race Condition | |
Use After Free | |
Use of a Broken or Risky Cryptographic Algorithm | |
CVE-2022-36946 | |
Race Condition | |
Use After Free | |
Double Free | |
Double Free | |
Buffer Overflow | |
Race Condition | |
Out-of-bounds Write | |
Race Condition | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Use After Free | |
Missing Authorization | |
Race Condition | |
Use After Free | |
Use After Free | |
Improper Preservation of Permissions | |
Use After Free | |
Missing Initialization of Resource | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Buffer Overflow | |
Access of Uninitialized Pointer | |
Use After Free | |
CVE-2021-38198 | |
Buffer Overflow | |
Allocation of Resources Without Limits or Throttling | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-bounds Read | |
CVE-2021-3732 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Missing Authorization | |
Missing Authorization | |
Race Condition | |
Information Exposure | |
Information Exposure | |
Integer Overflow or Wraparound | |
Use of Insufficiently Random Values | |
Integer Underflow | |
Out-of-bounds Write | |
Race Condition | |
Out-of-bounds Write | |
Race Condition | |
Double Free | |
CVE-2022-0516 | |
Race Condition | |
Missing Authorization | |