| CVE-2025-9230 | <1.1.1-1ubuntu2.1~18.04.23+esm6 |
| Improper Check for Unusual or Exceptional Conditions | <1.1.1-1ubuntu2.1~18.04.23+esm4 |
| CVE-2024-0727 | <1.1.1-1ubuntu2.1~18.04.23+esm4 |
| Excessive Iteration | <1.1.1-1ubuntu2.1~18.04.23+esm3 |
| Inefficient Regular Expression Complexity | <1.1.1-1ubuntu2.1~18.04.23+esm3 |
| Allocation of Resources Without Limits or Throttling | <1.1.1-1ubuntu2.1~18.04.23 |
| Improper Certificate Validation | <1.1.1-1ubuntu2.1~18.04.22 |
| Improper Certificate Validation | <1.1.1-1ubuntu2.1~18.04.22 |
| Improper Certificate Validation | <1.1.1-1ubuntu2.1~18.04.22 |
| Access of Resource Using Incompatible Type ('Type Confusion') | <1.1.1-1ubuntu2.1~18.04.21 |
| Use After Free | <1.1.1-1ubuntu2.1~18.04.21 |
| Information Exposure | <1.1.1-1ubuntu2.1~18.04.21 |
| Double Free | <1.1.1-1ubuntu2.1~18.04.21 |
| Use of a Broken or Risky Cryptographic Algorithm | <1.1.1-1ubuntu2.1~18.04.20 |
| OS Command Injection | <1.1.1-1ubuntu2.1~18.04.19 |
| OS Command Injection | <1.1.1-1ubuntu2.1~18.04.17 |
| Loop with Unreachable Exit Condition ('Infinite Loop') | <1.1.1-1ubuntu2.1~18.04.15 |
| Buffer Overflow | <1.1.1-1ubuntu2.1~18.04.13 |
| Out-of-bounds Read | <1.1.1-1ubuntu2.1~18.04.13 |
| NULL Pointer Dereference | <1.1.1-1ubuntu2.1~18.04.9 |
| Integer Overflow or Wraparound | <1.1.1-1ubuntu2.1~18.04.8 |
| Integer Overflow or Wraparound | <1.1.1-1ubuntu2.1~18.04.8 |
| NULL Pointer Dereference | <1.1.1-1ubuntu2.1~18.04.7 |
| Information Exposure | <1.1.1-1ubuntu2.1~18.04.6 |
| Use of a Broken or Risky Cryptographic Algorithm | <1.1.1-1ubuntu2.1~18.04.6 |
| Use of Insufficiently Random Values | <1.1.1-1ubuntu2.1~18.04.6 |
| CVE-2019-1547 | <1.1.1-1ubuntu2.1~18.04.6 |
| Use of a Broken or Risky Cryptographic Algorithm | <1.1.1-1ubuntu2.1~18.04.2 |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Information Exposure | |
| Information Exposure | |
| Key Management Errors | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Uncontrolled Recursion | |
| Information Exposure | |
| Resource Exhaustion | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Numeric Errors | |
| Information Exposure | |
| Out-of-bounds Read | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Numeric Errors | |
| Resource Management Errors | |
| Cryptographic Issues | |
| Out-of-Bounds | |
| Numeric Errors | |
| CVE-2016-0797 | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Race Condition | |
| CVE-2015-1790 | |
| Code | |
| Code | |
| CVE-2015-0289 | |
| CVE-2015-0209 | |
| Out-of-Bounds | |
| CVE-2015-0288 | |
| Improper Input Validation | |
| CVE-2014-3571 | |
| Cryptographic Issues | |
| Cryptographic Issues | |
| Cryptographic Issues | |
| Cryptographic Issues | |
| CVE-2014-3569 | |
| Cryptographic Issues | |
| Improper Input Validation | |
| Cryptographic Issues | |
| CVE-2014-3505 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Information Exposure | |
| CVE-2014-3510 | |