Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Improper Cross-boundary Removal of Sensitive Data | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
Use After Free | |
Memory Leak | |
Out-of-Bounds | |
Improper Cross-boundary Removal of Sensitive Data | |
Integer Overflow or Wraparound | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Write | |
Use After Free | |
Access of Uninitialized Pointer | |
NULL Pointer Dereference | |
Race Condition | |
Memory Leak | |
Improper Locking | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Double Free | |
Race Condition | |
Buffer Overflow | |
Race Condition | |
Exposure of Resource to Wrong Sphere | |
Improper Cross-boundary Removal of Sensitive Data | |
CVE-2022-28693 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
CVE-2022-39189 | |
Improper Resource Shutdown or Release | |
Out-of-Bounds | |
Out-of-Bounds | |
Memory Leak | |
Out-of-Bounds | |
Improper Resource Shutdown or Release | |
Improper Resource Shutdown or Release | |
Use After Free | |
Improper Synchronization | |
Out-of-bounds Write | |
Out-of-Bounds | |
Improper Resource Shutdown or Release | |
Improper Resource Shutdown or Release | |
Improper Resource Shutdown or Release | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Improper Access Control | |
NULL Pointer Dereference | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Use After Free | |
Race Condition | |
Race Condition | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use of Uninitialized Resource | |
Improper Locking | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Improper Authentication | |
Use of Uninitialized Resource | |
Use After Free | |
CVE-2022-39190 | |
Race Condition | |
CVE-2022-36879 | |
Out-of-bounds Read | |
Use After Free | |
Race Condition | |
Improper Restriction of Communication Channel to Intended Endpoints | |
CVE-2022-26373 | |
Double Free | |
Out-of-bounds Write | |
CVE-2022-20368 | |
Race Condition | |
Incorrect Calculation of Buffer Size | |
Use After Free | |
Arbitrary Code Injection | |
CVE-2022-36946 | |
Information Exposure | |
Information Exposure | |
Improper Cross-boundary Removal of Sensitive Data | |
Use After Free | |
Incorrect Conversion between Numeric Types | |
CVE-2022-29581 | |
Memory Leak | |
Use After Free | |
CVE-2022-21505 | |
Out-of-bounds Write | |
Race Condition | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Race Condition | |
Race Condition | |
Use of a Broken or Risky Cryptographic Algorithm | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Improper Cross-boundary Removal of Sensitive Data | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
Use After Free | |
Memory Leak | |
Out-of-Bounds | |
Improper Cross-boundary Removal of Sensitive Data | |
CVE-2022-1975 | |
Time-of-check Time-of-use (TOCTOU) | |
Use After Free | |
CVE-2020-26541 | |
Incomplete Cleanup | |
Missing Authorization | |
Improper Input Validation | |
Incomplete Cleanup | |
Use of Uninitialized Resource | |
Incomplete Cleanup | |
Incomplete Cleanup | |
CVE-2022-1972 | |
Use After Free | |
Race Condition | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2021-33061 | |
Use After Free | |
CVE-2022-28356 | |
Double Free | |
CVE-2022-1353 | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2022-28748 | |
Use After Free | |
Use After Free | |
CVE-2022-0812 | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
Use After Free | |
Race Condition | |
Memory Leak | |
CVE-2021-29650 | |
Missing Initialization of Resource | |
Race Condition | |
CVE-2021-29264 | |
Out-of-bounds Read | |
Arbitrary Command Injection | |
Buffer Overflow | |
Improper Handling of Exceptional Conditions | |
Race Condition | |
Excessive Iteration | |
Buffer Overflow | |
Improper Initialization | |
Out-of-bounds Write | |
Missing Authorization | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Write | |
Out-of-bounds Read | |
CVE-2021-27363 | |
Use After Free | |
Integer Overflow or Wraparound | |
Incomplete Cleanup | |
Memory Leak | |
CVE-2020-36311 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Out-of-bounds Read | |
Out-of-Bounds | |
CVE-2020-27673 | |
Off-by-one Error | |
Information Exposure | |
CVE-2020-26147 | |
Improper Input Validation | |
Improper Validation of Integrity Check Value | |
Improper Authentication | |
Resource Exhaustion | |
Memory Leak | |
Use After Free | |
Use After Free | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
CVE-2020-24586 | |
Use After Free | |
Use After Free | |
CVE-2021-0129 | |
Out-of-bounds Read | |
Use After Free | |
Improper Authentication | |
Race Condition | |
Missing Initialization of Resource | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Information Exposure | |
Out-of-bounds Write | |
Race Condition | |
Improper Verification of Cryptographic Signature | |
Buffer Overflow | |
Out-of-Bounds | |
Use of Uninitialized Resource | |
NULL Pointer Dereference | |
Access of Uninitialized Pointer | |
Use After Free | |
Integer Overflow or Wraparound | |
CVE-2021-38198 | |
Buffer Overflow | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
CVE-2021-3732 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Missing Authorization | |
Missing Authorization | |
Race Condition | |
Information Exposure | |
Information Exposure | |
CVE-2020-12770 | |
Race Condition | |
Memory Leak | |
Allocation of Resources Without Limits or Throttling | |
Race Condition | |
Memory Leak | |
Allocation of Resources Without Limits or Throttling | |
Cleartext Transmission of Sensitive Information | |
Out-of-bounds Read | |
CVE-2021-43056 | |
Out-of-bounds Write | |
CVE-2021-42252 | |
CVE-2021-43056 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2021-42252 | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
CVE-2021-3896 | |
Integer Overflow or Wraparound | |
Improper Validation of Integrity Check Value | |
CVE-2021-3896 | |
Use After Free | |
Improper Validation of Integrity Check Value | |
Use After Free | |
Use After Free | |
Double Free | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2021-3542 | |
CVE-2021-3542 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
CVE-2021-34981 | |
Out-of-bounds Write | |
Use of Insufficiently Random Values | |
Out-of-bounds Read | |
Use of a Broken or Risky Cryptographic Algorithm | |
CVE-2021-43976 | |
Use of a Broken or Risky Cryptographic Algorithm | |
Out-of-bounds Write | |
Memory Leak | |
Time-of-check Time-of-use (TOCTOU) | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
CVE-2021-28713 | |
CVE-2021-28712 | |
CVE-2021-28711 | |
Use After Free | |
Resource Exhaustion | |
Incorrect Type Conversion or Cast | |
Integer Underflow | |
Improper Initialization | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Race Condition | |
Improper Authentication | |
Improper Locking | |
Memory Leak | |
Race Condition | |
Use After Free | |
Out-of-bounds Write | |
Improper Preservation of Permissions | |
NULL Pointer Dereference | |
Information Exposure | |
Race Condition | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Race Condition | |
Double Free | |
Out-of-bounds Read | |
Improper Validation of Specified Quantity in Input | |
CVE-2022-26966 | |
Buffer Overflow | |
Improper Initialization | |
CVE-2022-0516 | |
Improper Privilege Management | |
Missing Authorization | |
NULL Pointer Dereference | |
CVE-2022-0002 | |
Memory Leak | |
Release of Invalid Pointer or Reference | |
CVE-2022-0001 | |
Improper Handling of Exceptional Conditions | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Double Free | |
Race Condition | |
Double Free | |
CVE-2022-0644 | |
Double Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Race Condition | |
Race Condition | |
Missing Initialization of Resource | |
Use After Free | |
Memory Leak | |
CVE-2022-0850 | |
Use After Free | |