torvalds/linux vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|torvalds/linux package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-bounds Write

[2.6.26,4.19.324)[5.4,5.4.286)[5.10,5.10.230)[5.15,5.15.172)[6.1,6.1.117)[6.6,6.6.61)[6.11,6.11.8)[6.12,6.12.1)
  • M
Improper Control of Speculative Execution with Observable Side Effects

[0,)
  • M
Out-of-bounds Read

[,6.5-rc6)
  • M
Denial of Service (DoS)

[,6.5-rc4)
  • M
Out-of-bounds Read

[,6.5-rc6)
  • H
Race Condition

[4.1,6.11-rc7)
  • M
Denial of Service (DoS)

[,6.10.0-rc5)
  • M
Improper Check for Unusual or Exceptional Conditions

[,6.10)
  • M
Out-of-bounds Write

[,6.11-rc1)
  • M
NULL Pointer Dereference

[,6.11-rc1)
  • M
Race Condition

[,6.10-rc6)
  • H
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,6.11-rc1)
  • M
NULL Pointer Dereference

[,6.11-rc1)
  • H
Improper Privilege Management

[,v5.11-rc1)
  • M
Improper Input Validation

[,4.8-rc3)
  • M
Improper Input Validation

[,6.9-rc1)
  • M
Resource Exhaustion

[5.2,5.4.119)[5.10,5.10.37)[5.11,5.11.21)[5.12,5.12.4)
  • M
Out-of-bounds Write

[4.14.113,4.14.233)[4.19.19,4.19.190)[5.0,5.4.117)[5.10,5.10.35)[5.11,5.11.19)[5.12,5.12.2)
  • M
Memory Leak

[4.5,4.9.269)[4.14,4.14.233)[4.19,4.19.191)[5.4,5.4.118)[5.10,5.10.36)[5.11,5.11.20)[5.12,5.12.3)
  • M
Resource Exhaustion

[5.10,5.10.37)[5.11,5.11.21)[5.12,5.12.4)
  • M
Resource Exhaustion

[4.20,5.4.118)[5.10,5.10.36)[5.11,5.11.20)[5.12,5.12.3)
  • M
Out-of-bounds Write

[5.10,5.10.36)[5.11,5.11.20)[5.12,5.12.3)
  • M
Resource Exhaustion

[5.11.0,5.11.20)[5.12.0,5.12.3)
  • M
Allocation of Resources Without Limits or Throttling

[5.1,5.4.119)[5.10.0,5.10.37)[5.11.0,5.11.21)[5.12.0,5.12.4)
  • M
Out-of-bounds Write

[5.8,5.10.36)[5.11.0,5.11.20)[5.12.0,5.12.3)
  • M
Out-of-bounds Write

[5.8,5.12.4)[,5.13-rc1)
  • M
Resource Exhaustion

[5.10,5.10.37)[5.11.0,5.11.21)[5.12.0,5.12.4)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,5.13-rc1)
  • M
Use After Free

[,5.13-rc1)
  • M
Use After Free

[,5.13-rc1)
  • M
Buffer Overflow

[,5.13-rc1)
  • M
Integer Overflow or Wraparound

[0,)
  • M
Resource Exhaustion

[,5.13-rc1)
  • M
Resource Exhaustion

[,5.13-rc1)
  • H
Buffer Overflow

[,5.12-rc8)
  • H
Out-of-bounds Read

[,5.0)
  • H
Use After Free

[,6.8-rc1)
  • H
Improper Control of a Resource Through its Lifetime

[,5.12-rc8)
  • H
Information Exposure

[,5.12-rc8)
  • H
Incorrect Permission Assignment for Critical Resource

[,5.12-rc8)
  • H
Improper Input Validation

[,5.13-rc1)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,5.13-rc1)
  • H
Use After Free

[,6.0-rc1)
  • H
Out-of-bounds Write

[,6.4-rc1)
  • H
Use After Free

[,6.8-rc1)
  • H
NULL Pointer Dereference

[,6.8-rc5)
  • M
NULL Pointer Dereference

[,5.12-rc7)
  • M
NULL Pointer Dereference

[,6.8-rc1)
  • H
NULL Pointer Dereference

[,6.8-rc1)
  • M
Use After Free

[,5.17-rc4)
  • M
Lock Order Reversal

[,6.8-rc3)
  • M
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,6.8-rc4)
  • M
Resource Exhaustion

[,6.8-rc3)
  • M
NULL Pointer Dereference

[,6.8-rc3)
  • M
Out-of-bounds Read

[,6.8-rc1)
  • H
Use After Free

[,6.8-rc1)
  • H
Out-of-bounds Read

[,6.8-rc1)
  • M
Deadlock

[,6.8-rc1)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,6.8-rc1)
  • H
Improper Input Validation

[,6.8-rc1)
  • H
Out-of-bounds Write

[,6.8-rc1)
  • M
Resource Exhaustion

[,6.8-rc1)
  • M
Race Condition

[,6.8-rc1)
  • H
Improper Input Validation

[,6.8-rc1)
  • M
NULL Pointer Dereference

[,6.8-rc1)
  • H
Use After Free

[,6.8-rc1)
  • H
Out-of-bounds Write

[,6.8-rc1)
  • H
Out-of-bounds Write

[,6.8-rc5)
  • H
Out-of-bounds Write

[,6.8-rc1)
  • H
Use After Free

[,6.8-rc1)
  • H
Race Condition

[,6.8-rc1)
  • H
Use After Free

[,6.8-rc1)
  • H
Use After Free

[,6.8-rc1)
  • M
NULL Pointer Dereference

[,6.8-rc1)
  • H
Out-of-bounds Write

[,6.8-rc1)
  • M
Resource Exhaustion

[,6.8-rc1)
  • H
Out-of-bounds Write

[,6.8-rc1)
  • M
NULL Pointer Dereference

[,6.8-rc1)
  • H
NULL Pointer Dereference

[,6.8-rc1)
  • H
Resource Exhaustion

[,6.8-rc5)
  • H
Race Condition

[,6.8-rc5)
  • H
Use After Free

[,6.8-rc5)
  • M
Race Condition

[,6.8-rc5)
  • C
Out-of-bounds Read

[,6.7-rc6)
  • C
Buffer Overflow

[,6.7-rc6)
  • H
Use After Free

[,6.8-rc1)
  • H
Improper Null Termination

[,6.8-rc1)
  • H
Out-of-bounds Write

[,6.8-rc1)
  • H
Use After Free

[,6.8-rc1)
  • H
Use After Free

[,6.6-rc1)
  • H
Out-of-bounds Write

[,6.8-rc4)
  • M
Double Free

[0,)
  • M
Denial of Service (DoS)

[,6.8-rc3)
  • M
Stack-based Buffer Overflow

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Improper Control of a Resource Through its Lifetime

[,6.7-rc5)
  • M
Use After Free

[,6.5-rc4)
  • M
Observable Timing Discrepancy

[0,)
  • H
Use After Free

[3.15,6.8-rc2)
  • H
Use After Free

[,6.8-rc1)
  • M
Race Condition

[,6.5-rc2)
  • M
Race Condition

[,6.5-rc1)
  • L
Use After Free

[2.6.12-rc2,6.8-rc1)
  • L
Information Exposure

[4.4.0-96.119,)
  • M
Improper Check or Handling of Exceptional Conditions

[0,)
  • M
NULL Pointer Dereference

[0,)
  • M
Resource Exhaustion

[,6.3-rc1)
  • H
Race Condition

[,6.7-rc7)
  • M
Use After Free

[,6.5-rc1)
  • H
Out-of-bounds Read

[,6.7-rc8)
  • M
Use After Free

[,6.5-rc3)
  • M
NULL Pointer Dereference

[,6.6-rc7)
  • M
Use After Free

[0,)
  • M
Allocation of Resources Without Limits or Throttling

[0,)
  • H
Off-by-one Error

[0,)
  • H
Out-of-bounds Write

[,6.7-rc5)
  • H
Out-of-bounds Write

[,6.7-rc2)
  • M
Use After Free

[,6.7-rc4)
  • H
Use After Free

[,6.7-rc4)
  • H
Integer Underflow

[,6.7-rc6)
  • H
Use After Free

[,6.0-rc3)
  • M
NULL Pointer Dereference

[,6.7-rc7)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,5.18-rc1)
  • M
Transmission of Private Resources into a New Sphere ('Resource Leak')

[,6.4-rc7)
  • H
Out-of-bounds Read

[,5.18-rc1)
  • M
Use After Free

[,6.0-rc1)
  • M
Double Free

[,6.3-rc2)
  • M
Exposure of Sensitive Information to an Unauthorized Actor

[,5.11)
  • H
Out-of-bounds Write

[,5.11)
  • H
Race Condition

[,6.7-rc7)
  • H
Use After Free

[0,)
  • H
Use After Free

[0,)
  • H
Denial of Service (DoS)

[,6.7-rc5)
  • H
Use After Free

[,6.7-rc6)
  • H
Use After Free

[,6.7-rc6)
  • H
Use After Free

[,6.7-rc6)
  • M
NULL Pointer Dereference

[0,)
  • M
Race Condition

[,6.5-rc7)
  • H
Out-of-bounds Write

[,6.7-rc5)
  • H
Use After Free

[,6.7-rc4)
  • H
Use After Free

[,6.7-rc5)
  • M
Insufficient Encryption Strength

[0,)
  • M
NULL Pointer Dereference

[0,)
  • H
NULL Pointer Dereference

[0,)
  • M
NULL Pointer Dereference

[0,)
  • H
NULL Pointer Dereference

[0,)
  • M
Information Exposure

[,6.1-rc1)
  • M
Insufficient Granularity of Access Control

[,5.10-rc4)
  • M
NULL Pointer Dereference

[0,)
  • H
Out-of-Bounds Read

[0,)
  • H
Out-of-bounds Read

[0,)
  • M
Use of Out-of-range Pointer Offset

[,6.7-rc4)
  • H
NULL Pointer Dereference

[,6.6-rc7)
  • M
Buffer Overflow

[0,)
  • M
Out-of-bounds Read

[0,)
  • M
Uncontrolled Resource Consumption

[,6.6-rc2)
  • H
Use After Free

[,6.7-rc1)
  • M
Use After Free

[0,)
  • H
Race Condition

[,6.5-rc7)
  • M
Out-of-bounds Read

[0,)
  • M
Improper Check or Handling of Exceptional Conditions

[,6.6-rc7)
  • H
Use After Free

[,6.4-rc6)
  • M
Use After Free

[0,)
  • H
Out-of-Bounds Write

[,6.6-rc7)
  • M
NULL Pointer Dereference

[0,)
  • H
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

[,6.6-rc7)
  • H
Use After Free

[,6.6-rc6)
  • H
Use After Free

[,6.6-rc1)
  • H
Improper Input Validation

[,v6.6-rc1)
  • H
Use After Free

[0,)
  • M
Use After Free

[,v6.6-rc1)
  • H
Denial of Service (DoS)

[,v6.5-rc6)
  • H
Out-of-bounds Write

[,6.2.5)
  • M
Out-of-bounds Write

[,6.2.3)
  • H
Buffer Overflow

[,6.5.3)
  • H
Improper Input Validation

[,6.3-rc1)
  • L
Out-of-bounds Read

[,6.5-rc7)
  • M
Out-of-bounds Read

[,6.6-rc1)
  • M
Out-of-bounds Read

[,6.6-rc1)
  • M
Out-of-bounds Read

[,6.6-rc1)
  • H
Use After Free

[,6.6-rc4)
  • M
NULL Pointer Dereference

[,6.6-rc3)
  • H
Use After Free

[0,)
  • H
Improper Ownership Management

[2.6.12-rc2,6.2-rc6)
  • M
Release of Invalid Pointer or Reference

[2.6.12-rc2,5.17-rc1)
  • H
Out-of-Bounds

[,4.1-rc1)
  • H
Buffer Overflow

[,6.5-rc2)
  • H
Use After Free

[,6.6-rc3)
  • M
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

[,6.6-rc3)
  • H
Denial of Service (DoS)

[5.13-rc1,)
  • H
Out-of-bounds Write

[,6.6-rc1)
  • M
Use of Out-of-range Pointer Offset

[,6.3-rc1)
  • C
Integer Overflow or Wraparound

[0,)
  • M
Information Exposure

[,5.9-rc1)
  • M
Race Condition

[,6.5-rc6)
  • M
Out-of-bounds Write

[,6.6-rc1)
  • M
Use After Free

[0,)
  • M
Use After Free

[,6.5-rc5)
  • H
Use After Free

[0,)
  • H
Use After Free

[,6.5-rc6)
  • C
Use After Free

[,6.5-rc4)
  • H
Use After Free

[,6.5-rc3)
  • M
Access Restriction Bypass

[,6.5-rc4)
  • H
Use After Free

[,6.4.10)
  • M
Stack-based Buffer Overflow

[,6.5-rc5)
  • H
Use After Free

[,6.5-rc5)
  • M
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[2.6.22-rc7,6.4-rc1)
  • H
Use After Free

[,6.5-rc3)
  • M
Use After Free

[,6.3)
  • M
Use After Free

[,6.3-rc1)
  • M
Denial of Service (DoS)

[0,)
  • M
Use After Free

[,6.5-rc1)
  • M
Use After Free

[0,)
  • H
Information Exposure

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Privilege Escalation

[,6.4-rc1)
  • H
Race Condition

[,6.4-rc1)
  • H
NULL Pointer Dereference

[,6.4-rc1)
  • M
Information Exposure

[,6.4-rc1)
  • M
Information Exposure

[0,)
  • H
NULL Pointer Dereference

[,6.4-rc1)
  • H
Race Condition

[,6.4-rc1)
  • H
Denial of Service (DoS)

[,6.4-rc1)
  • M
Improper Resource Locking

[,6.2-rc5)
  • H
Denial of Service (DoS)

[,6.3-rc7)
  • H
Out-of-bounds Read

[,6.4)
  • H
Out-of-bounds Read

[,6.4-rc6)
  • H
Out-of-bounds Read

[,6.4-rc6)
  • H
Out-of-bounds Read

[,6.4-rc6)
  • H
Out-of-bounds Read

[,6.4-rc3)
  • M
Off-by-one Error

[,6.4-rc3)
  • H
Out-of-bounds Read

[,6.4-rc3)
  • M
Deadlock

[,6.4-rc1)
  • M
Denial of Service (DoS)

[,4.0-rc1)
  • M
NULL Pointer Dereference

[,4.8-rc7)
  • M
NULL Pointer Dereference

[,4.8-rc7)
  • H
Use After Free

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Privilege Escalation

[0,)
  • M
Information Exposure

[,6.2-rc6)
  • M
Information Exposure

[,6.2-rc5)
  • M
Use After Free

[,5.18-rc5)
  • M
Use After Free

[4.15-rc1,6.4-rc1)
  • H
Out-of-bounds Write

[4.19-rc1,6.4-rc5)
  • H
Use After Free

[,6.4-rc1)
  • H
Use After Free

[,6.3.8)
  • H
Use After Free

[,6.4-rc1)
  • H
Use After Free

[,6.4-rc1)
  • H
Use After Free

[,6.3.4)
  • H
Use After Free

[,6.3.2)
  • M
NULL Pointer Dereference

[,v6.4-rc2)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,5.2-rc1)
  • M
Incorrect Bitwise Shift of Integer

[,6.2-rc7)
  • H
Out-of-bounds Read

[2.6.12-rc2,6.2-rc1)
  • M
Out-of-bounds Read

[2.6.24-rc1,6.4-rc2)
  • H
Use After Free

[2.6.12-rc2,6.4-rc1)
  • C
Use After Free

[0,)
  • M
NULL Pointer Dereference

[0,)
  • C
Use After Free

[0,)
  • C
Race Condition

[,6.4-rc1)
  • H
Privilege Escalation

[,5.18-rc1)
  • C
Race Condition

[,6.4-rc1)
  • M
Use After Free

[,6.3-rc4)
  • H
Use After Free

[,6.3-rc4)
  • H
Out-of-Bounds

[,6.4-rc1)
  • M
Execution with Unnecessary Privileges

[4.9,6.4-rc1)
  • H
Use After Free

[,6.4-rc1)
  • M
Use After Free

[,v6.0-rc1)
  • H
Reachable Assertion

[,6.3)
  • M
Use After Free

[,6.3-rc4)
  • H
Use After Free

[,6.3-rc3)
  • H
Use After Free

[,6.2-rc7)
  • H
NULL Pointer Dereference

[5.10-rc1,)
  • H
Out-of-bounds Write

[,6.3)
  • M
Division by zero

[0,)
  • H
NULL Pointer Dereference

[0,)
  • H
Out-of-bounds Write

[0,)
  • M
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Improper Update of Reference Count

[,6.0-rc1)
  • M
Improper Resource Locking

[0,)
  • H
Race Condition

[,6.1-rc7)
  • H
Time-of-check Time-of-use (TOCTOU) Race Condition

[,6.0-rc1)
  • M
Out-of-Bounds

[4.2-rc1,6.3-rc4)
  • H
Use After Free

[,5.18-rc2)
  • H
Improper Validation of Array Index

[,5.19-rc4)
  • M
Use After Free

[,6.2-rc1)
  • L
Missing Release of Memory after Effective Lifetime

[,6.2-rc1)
  • M
Denial of Service (DoS)

[,6.0)
  • M
Incorrect Authorization

[,5.19-rc1)
  • M
Information Exposure

[5.19-rc7,6.3-rc1)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Use After Free

[5.14-rc1,6.2-rc5)
  • M
Use After Free

[,6.2.9)
  • H
Use After Free

[,6.3-rc1)
  • M
Denial of Service (DoS)

[,6.3-rc3)
  • H
Double Free

[0,)
  • M
Information Exposure

[,6.2-rc7)
  • L
Missing Release of Memory after Effective Lifetime

[,6.2-rc6)
  • L
Information Exposure

[0,)
  • H
Out-of-Bounds

[,6.2-rc5)
  • M
Denial of Service (DoS)

[0,)
  • M
Out-of-bounds Read

[5.17-rc1,6.3-rc4)
  • H
Use After Free

[,6.2)
  • H
Denial of Service (DoS)

[,5.8-rc1)
  • M
Buffer Overflow

[,5.14-rc1)
  • L
Improper Initialization

[,6.2)
  • H
Improper Input Validation

[,6.1.3)
  • H
Improper Input Validation

[,6.2.7)
  • H
Improper Input Validation

[,6.1.3)
  • H
Excessive Platform Resource Consumption within a Loop

[,5.11-rc4)
  • M
Race Condition

[,6.3-rc2)
  • H
Use After Free

[,5.0-rc1)
  • M
Buffer Overflow

[,5.19-rc1)
  • M
Improper Cleanup on Thrown Exception

[,6.2-rc3)
  • M
Use After Free

[,6.2-rc1)
  • M
Denial of Service (DoS)

[,5.17-rc1)
  • M
Denial of Service (DoS)

[,6.2-rc1)
  • M
Denial of Service (DoS)

[,5.16-rc8)
  • M
Denial of Service (DoS)

[,5.17-rc1)
  • M
Denial of Service (DoS)

[,v5.19-rc1)
  • M
Denial of Service (DoS)

[,5.16-rc6)
  • M
Denial of Service (DoS)

[,5.17-rc1)
  • H
Denial of Service (DoS)

[,6.0-rc1)
  • H
Denial of Service (DoS)

[,6.2-rc1)
  • H
Denial of Service (DoS)

[,5.17-rc1)
  • H
Denial of Service (DoS)

[,5.18-rc1)
  • H
NULL Pointer Dereference

[,6.0)
  • H
Use After Free

[0,)
  • H
Use After Free

[0,)
  • M
Denial of Service (DoS)

[,5.17-rc1)
  • H
Use After Free

[0,)
  • H
Out-of-bounds Read

[0,)
  • H
Use After Free

[0,)
  • H
Denial of Service (DoS)

[,6.1.13)
  • H
Use After Free

[0,)
  • M
Use After Free

[0,)
  • M
Information Exposure

[0,)
  • M
Denial of Service (DoS)

[,6.1-rc7)
  • M
Integer Underflow (Wrap or Wraparound)

[,6.1-rc7)
  • M
Use After Free

[,6.1-rc7)
  • H
Heap-based Buffer Overflow

[,6.2-rc4)
  • H
Use After Free

[,6.2-rc4)
  • H
Denial of Service (DoS)

[,6.2-rc4)
  • M
Stack-based Buffer Overflow

[5.5-rc1,6.2-rc5)
  • M
NULL Pointer Dereference

[,6.2RC4)
  • H
Buffer Overflow

[0,)
  • H
Denial of Service (DoS)

[,6.2-rc3)
  • H
Denial of Service (DoS)

[,6.2-rc3)
  • H
Denial of Service (DoS)

[5.10-rc1,5.12-rc2)
  • H
Heap-based Buffer Overflow

[,6.0-rc1)
  • M
Uninitialized Memory Exposure

[,6.0-rc1)
  • H
Use After Free

[,6.0-rc1)
  • H
Out-of-bounds Read

[,6.0-rc1)
  • H
Improper Input Validation

[,5.19-rc1)
  • H
Out-of-bounds Read

[,6.0)
  • H
Improper Input Validation

[,6.0.11)
  • H
Improper Input Validation

[,6.0.11)
  • H
Improper Input Validation

[,6.0.11)
  • H
Improper Input Validation

[,6.0.11)
  • L
NULL Pointer Dereference

[,5.17-rc6)
  • L
NULL Pointer Dereference

[,5.17-rc6)
  • L
Unchecked Return Value

[,5.17-rc6)
  • L
NULL Pointer Dereference

[,5.19-rc1)
  • H
NULL Pointer Dereference

[,5.17-rc6)
  • L
NULL Pointer Dereference

[,5.17-rc6)
  • L
NULL Pointer Dereference

[,5.17-rc6)
  • L
NULL Pointer Dereference

[,5.17-rc6)
  • L
NULL Pointer Dereference

[,5.17-rc6)
  • L
NULL Pointer Dereference

[,5.17-rc6)
  • L
NULL Pointer Dereference

[,5.16)
  • H
Stack-based Buffer Overflow

[,6.1)
  • M
Denial of Service (DoS)

[4.10-rc1,5.16-rc2)
  • H
Use After Free

[5.12-rc3,5.14-rc7)
  • M
Denial of Service (DoS)

[5.12-rc2,6.1-rc7)
  • H
Use After Free

[3.12.0,6.1-rc4)
  • H
Improper Locking

[,6.1-rc6)
  • M
NULL Pointer Dereference

[,5.19-rc7)
  • M
NULL Pointer Dereference

[,5.19-rc6)
  • H
Use After Free

[0,)
  • H
Integer Overflow or Wraparound

[0,)
  • H
Use After Free

[,6.1-rc1)
  • H
Denial of Service (DoS)

[0,)
  • H
Use After Free

[0,)
  • H
Use After Free

[0,)
  • H
Use After Free

[0,)
  • H
Use After Free

[0,)
  • M
Use After Free

[,6.1-rc1)
  • M
Buffer Overflow

[,5.19.17)[6.0.0,6.0.2)
  • M
Denial of Service (DoS)

[,5.19.15)[6.0.0,6.0.1)
  • M
Denial of Service (DoS)

[5.1-rc1,6.1-rc1)
  • H
Use After Free

[5.1-rc1,6.1-rc1)
  • H
User After Free

[5.2-rc1,6.1-rc1)
  • H
Heap-based Buffer Overflow

[5.1-rc1,6.1-rc1)
  • H
Use After Free

[5.10-rc1,5.12-rc2)
  • M
Denial of Service (DoS)

[5.8.0,5.19.16)
  • M
Use After Free

[,6.0-rc4)
  • L
Race Condition

[0,)
  • M
Race Condition

[0,)
  • L
Race Condition

[0,)
  • H
Use After Free

[,5.13.3)
  • H
Use After Free

[0,)
  • M
Information Exposure

[0,)
  • H
Use After Free

[0,v6.0-rc1)
  • M
NULL Pointer Dereference

[,5.15.62)
  • M
Out-of-bounds Read

[,6.0-rc4)
  • M
Denial of Service (DoS)

[0,)
  • H
Buffer Overflow

[,5.19)
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[,3.2-rc2)
  • H
Out-of-Bounds

[,5.17)
  • H
Out-of-bounds Read

[,6.0-rc4)
  • H
Race Condition

[0,)
  • H
Buffer Overflow

[,5.19)
  • H
Out-of-bounds Write

[,5.18-rc4)
  • L
Race Condition

[,5.19-rc8)
  • H
Denial of Service (DoS)

[,6.0-rc3)
  • H
Denial of Service (DoS)

[,5.19-rc2)
  • H
Use After Free

[,5.10-rc1)
  • M
Improper Access Control

[0,)
  • M
NULL Pointer Dereference

[,5.18-rc3)
  • M
Use After Free

[,6.0-rc1)
  • M
NULL Pointer Dereference

[,5.18-rc1)
  • M
Out-of-bounds Read

[0,)
  • M
Information Exposure

[,5.14-rc1)
  • H
Use After Free

[,5.17-rc6)
  • H
Out-of-Bounds

[,5.10-rc1)
  • H
Improper Access Control

[0,)
  • M
Incomplete Cleanup

[,5.18-rc4)
  • M
NULL Pointer Dereference

[,5.18-rc1)
  • M
Uncontrolled Resource Consumption

[,5.15.3-1)
  • H
Race Condition

[,v5.19-rc1)
  • H
Arbitrary Code Execution

[0,)
  • H
Out-of-Bounds

[5.8-rc1,5.17-rc1)
  • M
Exposure of Sensitive Information Through Data Queries

[,5.7-rc1)
  • M
Incorrect Calculation of Buffer Size

[,5.16)
  • H
Use After Free

[5.10-rc1,5.15-rc4)
  • M
Denial of Service (DoS)

[,5.15-rc1)
  • M
Information Exposure

[0,)
  • L
Information Exposure

[5.14-rc1,5.15-rc1)
  • H
Use After Free

[5.2-rc1,5.17-rc2)
  • H
Race Condition

[0,)
  • M
Race Condition

[2.6.12-rc2,v5.14-rc4)
  • M
Use After Free

[,5.19-rc1)
  • H
Use After Free

[5.2,5.18)
  • H
Use After Free

[,5.18-rc6)
  • H
Use After Free

[,5.18-rc7)
  • H
Denial of Service (DoS)

[,5.19-rc6)
  • H
Denial of Service (DoS)

[0,)
  • M
Improper Resource Shutdown or Release

[,5.19-rc8)
  • H
NULL Pointer Dereference

[,5.6-rc3)
  • M
Use After Free

[,5.7-rc1)
  • M
Out-of-bounds Read

[,5.19-rc6)
  • M
Information Exposure

[0,)
  • M
Use After Free

[,5.19-rc5)
  • H
Heap-based Buffer Overflow

[5.8,5.19-rc6)
  • M
Improper Validation of Integrity Check Value

[,5.15)
  • M
NULL Pointer Dereference

[,5.17)
  • H
Use After Free

[,5.16-rc2)
  • M
Out-of-bounds Write

[4.0-rc1,5.13-rc1)
  • H
Arbitrary Code Execution

[5.8-rc1,5.14)
  • M
Race Condition

[5.5-rc1,5.16-rc2)
  • M
Improper Preservation of Permissions

[0,)
  • H
Out-of-bounds Write

[5.12-rc2,5.18-rc1)
  • H
Use After Free

[,5.16-rc1)
  • H
Buffer Overflow

[4.9-rc1,5.17-rc6)
  • H
Double Free

[5.13-rc1,5.18.4)
  • H
Double Free

[5.13-rc1,5.19-rc1)
  • H
Use After Free

[3.18-rc1,5.6)
  • L
Information Exposure

[,5.17-rc8)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[5.10-rc1,5.17-rc1)
  • H
Race Condition

[2.6.25-rc1,5.14-rc1)
  • H
Use After Free

[,5.14-rc2)
  • M
Information Exposure

[3.18-rc2,5.14-rc6)
  • M
Use After Free

[5.1-rc1,5.17-rc3)
  • M
Information Exposure

[,5.17-rc5)
  • M
Incomplete Cleanup

[3.6,5.16-rc3)
  • M
NULL Pointer Dereference

[5.7-rc5,5.18-rc1)
  • M
Use After Free

[,5.15-rc7)
  • M
Information Exposure

[,5.15-rc1)
  • M
Use After Free

[,5.16-rc1)
  • H
Denial of Service (DoS)

[4.2-rc1,5.17-rc2)
  • M
Denial of Service (DoS)

[4.20-rc1,5.15-rc1)
  • M
Denial of Service (DoS)

[5.15-rc1,5.15-rc7)
  • M
Denial of Service (DoS)

[5.9-rc1,5.14-rc2)
  • M
Denial of Service (DoS)

[5.2-rc2,5.9-rc2)
  • H
Privilege Escalation

[2.6.24-rc1,5.17-rc3)
  • H
Buffer Overflow

[4.8-rc1,5.17-rc4)
  • H
Race Condition

[,5.16-rc4)
  • L
Information Exposure

[,v5.16-rc6)
  • M
Information Exposure

[0,5.16)
  • H
Use After Free

[,v5.16-rc1)
  • H
Denial of Service (DoS)

[,v5.15-rc4)
  • M
NULL Pointer Dereference

[,5.17-rc1)
  • H
Use After Free

[,5.16-rc8)
  • M
Denial of Service (DoS)

[,5.15 rc6)
  • H
Out-of-Bounds

[,v5.17-rc8)
  • H
Race Condition

[,5.15-rc1)
  • M
Out-of-Bounds

[,v5.14)
  • H
Heap-based Buffer Overflow

[,v5.17-rc1)
  • H
Race Condition

[,v5.15-rc4)
  • H
Use After Free

[,5.18-rc1)
  • H
Use After Free

[,5.14.15-100.fc33)
  • M
Denial of Service (DoS)

[,5.15-rc6)
  • H
Use of Insufficiently Random Values

[,5.15-rc1)
  • H
Denial of Service (DoS)

[,5.14.16)
  • M
Information Exposure

[,5.17-rc4)
  • M
Incomplete Cleanup

[5.17-rc1,5.17-rc5)
  • H
Integer Overflow or Wraparound

[,5.17-rc1)
  • M
Information Exposure

[,5.15-rc3)
  • M
Information Exposure

[,5.15-rc1)
  • H
Out-of-bounds Write

[,5.16-rc2)
  • H
Use After Free

[,5.17-rc4)
  • M
Race Condition

[,5.15-rc5)
  • H
Denial of Service (DoS)

[,5.15)
  • H
Denial of Service (DoS)

[,5.17-rc2)
  • L
Use After Free

[,5.18-rc5)
  • H
Improper Access Control

[0,)
  • H
Use After Free

[,5.19.rc1)
  • M
Information Exposure

[,5.18-rc6)
  • M
Access Restriction Bypass

[,5.17.2)
  • M
Use of Uninitialized Variable

[,5.18-rc5)
  • M
Use After Free

[5.0.10-rc1,5.18-rc2)
  • H
Privilege Escalation

[,5.16)
  • M
Information Exposure

[,v5.17)
  • C
Double Free

[,5.16.12)
  • H
Use After Free

[,5.18-rc2)
  • H
Use After Free

[,5.17.1)
  • M
Denial of Service (DoS)

[,5.18-rc1)
  • C
Double Free

[,v5.18-rc1)
  • C
Double Free

[,v5.18-rc1)
  • C
Double Free

[,v5.18-rc1)
  • M
Information Exposure

[,5.17)
  • H
Buffer Overflow

[,5.16.15)
  • H
Denial of Service (DoS)

[,v5.17-rc7)
  • H
Buffer Overflow

[,5.15.3)
  • M
Improper Input Validation

[,v5.17-rc6)
  • M
Session Fixation

[,5.16.11)
  • H
Out-of-bounds Write

[5.4-rc1,)
  • M
Information Exposure

[,v5.17-rc4)
  • H
NULL Pointer Dereference

[,5.16.3)
  • M
Access Restriction Bypass

[,2.6.27.22)
  • H
Double Free

[,4.10.16)
  • H
Integer Underflow

[,2.6.33.14)
  • M
Information Exposure

[,4.6.1)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Out-of-Bounds

[,4.13.8)
  • M
Information Exposure

[,2.6.12.4)
  • M
Out-of-bounds Read

[,4.13.12)
  • M
NULL Pointer Dereference

[,4.14.14)
  • M
Access Restriction Bypass

[,2.4.29)[2.6.0,2.6.12)
  • L
Missing Initialization of Resource

[,2.6.36)
  • H
Buffer Overflow

[,5.3.10)
  • L
Missing Initialization of Resource

[,2.6.37)
  • H
Information Exposure

[2.6.11,2.6.23]
  • H
Denial of Service (DoS)

[,2.6.19]
  • H
Access Restriction Bypass

[,3.10]
  • M
Denial of Service (DoS)

[,2.6.0]
  • M
Improper Data Handling

[,4.4.9)
  • H
Improper Input Validation

[,3.0)
  • H
Denial of Service (DoS)

[,2.6.13.1)
  • M
Out-of-bounds Write

[4.0.0,4.16.1)
  • H
Privilege Escalation

[3.0,4.0)
  • M
Access Restriction Bypass

[,2.6.28.6)
  • M
Information Exposure

[,3.10]
  • H
CVE-2005-0750

[2.4.6,2.6.11]
  • H
Race Condition

[,4.4.0)
  • M
Security Features

[,4.18.1)
  • H
Information Exposure

[,5.7.8)
  • M
Race Condition

[,3.13.4)
  • H
Access Restriction Bypass

[,4.13.11)
  • M
Out-of-Bounds

[,4.8.7)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Integer Overflow or Wraparound

[,4.14.9)
  • M
Out-of-Bounds

[,3.9)
  • H
Integer Underflow

[,2.6.36.2)
  • M
Code

[,3.17.4)
  • M
Denial of Service (DoS)

[,3.2.14)
  • M
Resource Management Errors

[,2.6.14)
  • H
Use After Free

[,4.3.3)
  • H
Out-of-bounds Read

[,5.1.12)
  • H
Denial of Service (DoS)

[,3.7.9)
  • H
Out-of-bounds Write

[4.16,)
  • M
Access Restriction Bypass

[,5.10.0)
  • M
Access Restriction Bypass

[,3.8.4)
  • M
Out-of-bounds Read

[,4.13.10)
  • M
Out-of-Bounds

[,3.3.1)
  • M
Race Condition

[,4.9.12)
  • M
Information Exposure

[3.10,3.18]
  • H
Resource Management Errors

[,3.7.10)
  • L
Race Condition

[,2.6.27.24)[2.6.29.0,2.6.29.4)[2.6.0,2.6.30)
  • H
Out-of-Bounds

[2.6.30,2.6.30.1]
  • H
NULL Pointer Dereference

[,5.1.7)
  • H
Use After Free

[,4.14.4)
  • M
Authentication Bypass

[,2.6.12)
  • M
NULL Pointer Dereference

[,4.13.11)
  • M
Denial of Service (DoS)

[,2.6.36]
  • M
Information Exposure

[3.10,3.18]
  • L
Information Exposure

[,3.6)
  • M
Improper Input Validation

[,3.7)
  • M
Race Condition

[,4.14.3)
  • M
Denial of Service (DoS)

[,2.4.26)[2.6.0,2.6.6)
  • M
Denial of Service (DoS)

[,2.6.9]
  • M
Denial of Service (DoS)

[,2.6.17)
  • H
Improper Input Validation

[,4.11)
  • M
Information Exposure

[3.10,3.18]
  • M
Out-of-Bounds

[,2.6.22)
  • M
Resource Management Errors

[,2.6.38)
  • L
Timing Attack

[,2.4.34.1)
  • H
Access Restriction Bypass

[,3.18]
  • M
Race Condition

[,4.5.6)
  • M
NULL Pointer Dereference

[,3.14.1)
  • H
Out-of-bounds Write

[0,)
  • M
Improper Input Validation

[,2.6.39.2)
  • H
Out-of-Bounds

[,2.6.39.1)
  • M
Information Exposure

[,4.10.10)
  • M
Out-of-bounds Read

[3.10.0,3.10.91)
  • H
Improper Input Validation

[,3.8.4)
  • H
NULL Pointer Dereference

[,3.2.10)
  • H
Privilege Escalation

[5.5,5.10.13)
  • H
Security Features

[,4.14.5)
  • H
Improper Input Validation

[,4.13)
  • H
Access Restriction Bypass

[2.6.30,5.14)
  • M
Incorrect Authorization

[,5.12.2)
  • M
Information Exposure

[2.4.0,2.4.35.3)[2.6.0,2.6.24)
  • H
Access Restriction Bypass

[,4.4)
  • H
Denial of Service (DoS)

[,3.5.4)
  • H
Out-of-bounds Read

[,4.11.8)
  • H
Double Free

[,4.9.12)
  • M
Use After Free

[,5.2.9)
  • M
Information Exposure

[,4.6.1)
  • M
CVE-2007-1497

[,2.6.21)
  • M
CVE-2009-0834

[,2.6.28.8)
  • M
Improper Input Validation

[,2.6.38.3)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Resource Management Errors

[,3.3.6)
  • M
Resource Management Errors

[,3.10.4)
  • M
Denial of Service (DoS)

[,5.6.11)
  • M
Access Restriction Bypass

[,2.6]
  • M
Cryptographic Issues

[,3.8.3)
  • M
Denial of Service (DoS)

[,2.6.39)
  • M
Information Exposure

[,2.6.15)
  • H
Improper Input Validation

[,4.14.8)
  • M
Improper Input Validation

[,5.4.17)
  • H
Information Exposure

[,5.2.14)
  • H
Improper Initialization

[,4.17)
  • M
Out-of-Bounds

[,2.6.31]
  • M
Access Restriction Bypass

[2.6.12,2.6.14.4]
  • H
NULL Pointer Dereference

[,5.7.10)
  • M
Cryptographic Issues

[,4.3)
  • M
Information Exposure

[,4.9.10)
  • H
Error Handling

[,4.9.9)
  • M
NULL Pointer Dereference

[,4.17.4)
  • M
Improper Input Validation

[,2.6.24)
  • M
Resource Management Errors

[,2.6.39)
  • H
Improper Input Validation

[,3.11.1)
  • M
Denial of Service (DoS)

[2.6.18.0,2.6.20.1]
  • H
Buffer Overflow

[2.6_test9_cvs,2.6.10]
  • M
Information Exposure

[,3.11)
  • H
CVE-2005-0839

[,2.6.11)
  • C
Out-of-bounds Write

[0,)
  • L
Information Exposure

[,3.14)
  • H
Out-of-bounds Read

[,4.20.2)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Privilege Escalation

[,2.6.36.2)
  • H
Integer Overflow or Wraparound

[,5.14.9)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Denial of Service (DoS)

[,2.6.28.9)
  • M
NULL Pointer Dereference

[3.12,3.15]
  • M
NULL Pointer Dereference

[,5.1)
  • M
Out-of-Bounds

[,4.18.7)
  • H
Improper Input Validation

[,2.6.38.5)
  • H
Out-of-Bounds

[,2.6.31.1)
  • M
NULL Pointer Dereference

[,4.1.34)
  • M
Out-of-bounds Read

[,5.9.7)
  • M
Information Exposure

[2.4.0,2.5.0]
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Information Exposure

[,4.11.8)
  • M
Information Exposure

[2.6.29,2.6.32]
  • H
Out-of-bounds Read

[,5.2.3)
  • L
Use of Uninitialized Resource

[,5.8.4)
  • M
Resource Management Errors

[,3.18)
  • L
Use After Free

[3.0,3.13.7)
  • H
Denial of Service (DoS)

[,4.3.3)
  • M
Access Restriction Bypass

[,3.7.4)
  • L
Access Restriction Bypass

[,3.3.7)
  • H
Double Free

[,2.6.36)
  • H
Improper Input Validation

[,3.12.6)
  • H
Improper Access Control

[,3.10]
  • H
Resource Management Errors

[,2.6.34)
  • M
Out-of-Bounds

[,3.4.5)
  • C
Out-of-bounds Read

[,4.8.8)
  • H
Access Restriction Bypass

[,3.18]
  • H
Use After Free

[,5.2)
  • M
Information Exposure

[3.10,3.18]
  • C
Improper Input Validation

[,3.18]
  • M
Denial of Service (DoS)

[,3.10)
  • M
Out-of-Bounds

[,3.16.2)
  • M
Denial of Service (DoS)

[1.3.0,2.0]
  • M
Access Restriction Bypass

[,3.11.5)
  • M
Resource Management Errors

[,4.11.2)
  • H
Use After Free

[,4.7.1)
  • H
Use After Free

[,4.13.6)
  • M
Authentication Bypass

[,2.0.36)
  • H
Use After Free

[,4.12.10)
  • H
Improper Access Control

[3.10,3.18]
  • M
NULL Pointer Dereference

[,5.2.14)
  • M
Denial of Service (DoS)

[,5.6.13)
  • M
NULL Pointer Dereference

[,5.0.14)
  • M
Out-of-Bounds

[,2.6.36.2)
  • M
Denial of Service (DoS)

[,4.9.4)
  • M
Information Exposure

[,4.6.1)
  • M
Use After Free

[,3.15.2)
  • C
NULL Pointer Dereference

[,2.6.34)
  • H
Access Restriction Bypass

[,2.6.27)
  • M
Access Restriction Bypass

[,3.18.3)
  • H
Access Restriction Bypass

[,3.18]
  • M
Memory Leak

[,5.9.1)
  • H
Incorrect Calculation

[0,rc1)
  • M
Denial of Service (DoS)

[,5.5.4)
  • M
Denial of Service (DoS)

[,3.17.2)
  • M
Information Exposure

[,2.6.39)
  • M
Use After Free

[,5.4.16)
  • M
Memory Leak

[,5.3.12)
  • L
Missing Initialization of Resource

[,2.6.36)
  • M
Denial of Service (DoS)

[,2.6.38)
  • M
Resource Management Errors

[,3.10.2)
  • M
Race Condition

[,4.9.3)
  • H
Out-of-Bounds

[,5.2.10)
  • C
Buffer Overflow

[,5.3)
  • M
Information Exposure

[2.4.1,2.4.20]
  • H
Improper Input Validation

[,2.6.27)
  • M
Missing Initialization of Resource

[,2.6.36)
  • H
Use After Free

[,5.10.12)
  • M
Error Handling

[,4.9)
  • H
NULL Pointer Dereference

[0,)
  • C
Improper Input Validation

[,3.13.7)
  • H
Integer Overflow or Wraparound

[,2.6.36.1)
  • M
Out-of-Bounds

[,2.6.26)
  • M
CVE-2021-29264

[,5.11.11)
  • M
Resource Management Errors

[,4.4.0)
  • M
Denial of Service (DoS)

[,2.6.39)
  • M
Denial of Service (DoS)

[,5.11.9)
  • L
Resource Management Errors

[2.6_test9_cvs,2.6.19]
  • H
Symlink Attack

[,3.15.8)
  • H
Improper Input Validation

[,4.10.12)
  • M
Improper Input Validation

[,3.8.9)
  • H
Memory Leak

[,5.3.8)
  • M
Improper Input Validation

[0,4.19-rc4)
  • M
Resource Management Errors

[,2.6.32]
  • H
Arbitrary Code Execution

[,2.6.8.1]
  • H
Denial of Service (DoS)

[,5.3.3)
  • M
Divide By Zero

[,2.6.38)
  • M
Race Condition

[,5.6.8)
  • H
NULL Pointer Dereference

[,2.6.30.1)
  • H
Access Restriction Bypass

[,3.18]
  • H
Improper Access Control

[,3.18]
  • H
Denial of Service (DoS)

[,2.4.20)
  • M
NULL Pointer Dereference

[,2.6.33.3)
  • M
Race Condition

[,3.12.2)
  • M
Information Exposure

[0,)
  • H
Resource Management Errors

[,2.6.27.22)
  • M
Resource Management Errors

[3.10,3.18]
  • H
Access Restriction Bypass

[,2.6.32.1)
  • H
Use After Free

[,4.8.14)
  • M
Memory Leak

[,5.3.10)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Improper Input Validation

[,5.6.13)
  • M
NULL Pointer Dereference

[,2.6.36)
  • H
Buffer Overflow

[,2.4.23)
  • M
Resource Management Errors

[2.6.26,2.6.26.2]
  • M
Information Exposure

[,2.6.30.1)
  • M
Code

[,3.19.6)
  • H
Improper Input Validation

[,4.9.13)
  • H
Memory Leak

[,5.3.9)
  • H
Improper Input Validation

[,4.7]
  • M
Use After Free

[,5.5)
  • M
Out-of-Bounds

[,4.1.4)
  • M
Information Exposure

[,4.14.1)
  • M
Use After Free

[,5.3.12)
  • H
Improper Access Control

[,4.13.4)
  • M
Denial of Service (DoS)

[0,2.6.20-1.2948.fc6)
  • H
Use After Free

[,5.0.10)
  • H
Improper Data Handling

[,4.11.2)
  • M
Resource Management Errors

[,3.17.4)
  • H
Race Condition

[,3.15.4)
  • H
Out-of-Bounds

[,2.6.27)
  • L
Resource Management Errors

[,3.8.4)
  • H
Race Condition

[,4.10.2)
  • M
Improper Input Validation

[,5.3)
  • M
Denial of Service (DoS)

[3.2,3.25]
  • M
Denial of Service (DoS)

[2.4.23_ow2,2.6.15]
  • M
Out-of-Bounds

[0,)
  • M
Denial of Service (DoS)

[,3.2.2)
  • M
Denial of Service (DoS)

[,4.0.5)
  • M
CVE-2005-4351

[,2.6.16)
  • M
Denial of Service (DoS)

[,2.4.26)
  • H
NULL Pointer Dereference

[,5.2.9)
  • M
Information Exposure

[,4.20.6)
  • M
Denial of Service (DoS)

[0,)
  • M
Race Condition

[3.0.0,3.19.8][4.0.0,5.0)
  • M
Denial of Service (DoS)

[,5.8.14)
  • H
Buffer Overflow

[,3.13.6)
  • M
Denial of Service (DoS)

[,4.3.5)
  • H
Race Condition

[,4.6.6)
  • H
Arbitrary Code Execution

[2.4.23_ow2,2.6.12]
  • M
Out-of-Bounds

[,3.3.2)
  • M
Resource Management Errors

[,4.14.2)
  • M
Denial of Service (DoS)

[,2.6.32.1)
  • H
Memory Leak

[,5.3)
  • C
Use After Free

[,5.0.9)
  • H
Denial of Service (DoS)

[,5.0.10)
  • M
Improper Input Validation

[,2.6.28.5)
  • M
Information Exposure

[,4.7.5)
  • M
NULL Pointer Dereference

[,5.2.8)
  • H
Access Restriction Bypass

[,2.6.31.1)
  • H
Buffer Overflow

[,4.13)
  • M
Buffer Overflow

[2.6.10,2.6.11_rc1_bk6]
  • H
Out-of-Bounds

[,4.10.5)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Denial of Service (DoS)

[2.0,2.3.0]
  • M
Denial of Service (DoS)

[,2.2.0]
  • M
Denial of Service (DoS)

[,3.12.4)
  • M
NULL Pointer Dereference

[,4.13.12)
  • M
Out-of-Bounds

[,3.11.1)
  • M
Denial of Service (DoS)

[,2.6.39)
  • H
Improper Input Validation

[,3.18]
  • H
CVE-2021-42252

[,5.14.6)
  • M
Resource Management Errors

[,3.10)
  • M
NULL Pointer Dereference

[,2.6.39)
  • M
Improper Input Validation

[,2.6.33.4)
  • M
Race Condition

[,5.11.7)
  • M
Access Restriction Bypass

[,4.7.4)
  • M
Information Exposure

[,3.9.1)
  • M
Access Restriction Bypass

[,2.6.10)
  • H
CVE-2001-1572

[2.4.1,2.4.11]
  • H
Insecure Randomness

[,5.10.0)
  • M
Information Exposure

[,5.1.2)
  • H
Access Restriction Bypass

[,3.10]
  • H
Use After Free

[,5.9.14)
  • M
Denial of Service (DoS)

[,2.4.1)
  • H
Denial of Service (DoS)

[,2.4.21)[2.4.0,2.4.24)
  • M
Information Exposure

[,2.4.19)
  • C
CVE-2009-4538

[,2.6.32.4)
  • H
Out-of-Bounds

[,4.14.9)
  • M
NULL Pointer Dereference

[,4.14.1)
  • M
NULL Pointer Dereference

[,5.1)
  • M
Use After Free

[,4.18)
  • H
Access Restriction Bypass

[,3.10]
  • H
Access Restriction Bypass

[,4.6.4)
  • C
Out-of-Bounds

[,3.18]
  • H
Buffer Overflow

[,2.6.37)
  • M
Denial of Service (DoS)

[,2.4.25)
  • M
Denial of Service (DoS)

[2.6.39,5.10.17)
  • M
Race Condition

[,3.17.3)
  • H
Improper Access Control

[,3.10]
  • L
Information Exposure

[,3.6)
  • M
Information Exposure

[,4.19.3)
  • M
Improper Input Validation

[,3.19.1)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Resource Management Errors

[0,4.13-rc5)
  • H
Out-of-bounds Write

[,5.7.5)
  • M
Integer Overflow or Wraparound

[,4.17.4)
  • H
Improper Action Name Cleanup

[3.2,4.9.135)[4.9.136,4.14.78)[4.14.79,4.18.16)[4.18.17,4.19)
  • M
Memory Leak

[,5.3.12)
  • H
Buffer Overflow

[,5.11.9)
  • M
Race Condition

[,3.4.5)
  • M
Resource Management Errors

[,2.6.38.5)
  • H
Resource Management Errors

[,2.6.31.1)
  • H
Access Restriction Bypass

[,4.18)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Information Exposure

[3.10,3.18]
  • M
NULL Pointer Dereference

[,2.6.39)
  • H
Resource Management Errors

[,2.6.25.19)[2.6.26.0,2.6.26.7)[2.6.27.0,2.6.27.3)
  • M
CVE-2001-1391

[,2.2.20)
  • M
Information Exposure

[,2.6.31)
  • H
Access Restriction Bypass

[,2.6.31.5)
  • H
Out-of-bounds Read

[,4.18.2)
  • M
Memory Leak

[,5.3.8)
  • H
Resource Management Errors

[,4)
  • M
Buffer Overflow

[2.4.23_ow2,2.6.5]
  • M
Denial of Service (DoS)

[,5.14)
  • C
Out-of-Bounds

[,4.5.3)
  • M
Information Exposure

[,4.14.15)
  • M
Access Restriction Bypass

[2.4.0,2.5.31]
  • M
Denial of Service (DoS)

[,5.11)
  • H
Privilege Escalation

[,3.15.8)
  • H
Improper Input Validation

[,2.6.31)
  • M
Improper Input Validation

[,3.12.4)
  • H
Improper Access Control

[3.10,3.18]
  • L
Information Exposure

[,5.3.11)
  • M
Integer Overflow or Wraparound

[,3.15.2)
  • M
Integer Overflow or Wraparound

[,3.15.2)
  • M
Access Restriction Bypass

[2.6.16,2.6.16.6]
  • M
Access Restriction Bypass

[,2.6.25.3)
  • M
Access Restriction Bypass

[,3.5.7)
  • M
Improper Input Validation

[,3.8.5)
  • M
Denial of Service (DoS)

[,2.6.13.1)
  • H
Improper Authentication

[,2.4.20)
  • H
Out-of-Bounds

[,2.6.0]
  • M
Information Exposure

[0,)
  • H
Race Condition

[,4.9.13)
  • M
Improper Input Validation

[,4.6)
  • M
Error Handling

[,4.10.10)
  • H
Denial of Service (DoS)

[,2.6.18)
  • H
Race Condition

[2.6.0,2.6.24.6)
  • H
Improper Input Validation

[,3.4.5)
  • C
Buffer Overflow

[,2.4.0]
  • M
Out-of-Bounds

[,4.18)
  • M
Denial of Service (DoS)

[,3.15.2)
  • M
Access Restriction Bypass

[,2.6.36.1)
  • H
Out-of-Bounds

[,4.10.12)
  • M
Resource Management Errors

[,3.18.1)
  • H
CVE-1999-0138

[1.2.0,2.0]
  • M
Memory Leak

[,5.3.12)
  • M
CVE-2004-0003

[,2.4.23)
  • M
CVE-2020-26541

[,5.8.14)
  • H
Denial of Service (DoS)

[,4.6.1)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
CVE-2000-0289

[2.2.10,2.2.14]
  • M
Denial of Service (DoS)

[,2.4.23)
  • H
Race Condition

[,4.20)
  • M
Out-of-Bounds

[,2.6.23)
  • M
Denial of Service (DoS)

[,4.5)
  • H
Access Restriction Bypass

[,3.18]
  • M
NULL Pointer Dereference

[,5.6.1)
  • M
Off-by-one Error

[,5.11.8)
  • H
Denial of Service (DoS)

[2.4.23_ow2,2.6.7]
  • M
Improper Input Validation

[,3.16.2)
  • M
Out-of-Bounds

[,4.17.6)
  • M
Out-of-bounds Write

[,5.8)
  • C
Double Free

[,5.2.10)
  • M
Improper Input Validation

[,3.12.4)
  • H
Privilege Escalation

[5.10,5.14.7)
  • M
Buffer Overflow

[,2.6.13)
  • L
Information Exposure

[,3.6)
  • H
Access Restriction Bypass

[,3.10]
  • H
Out-of-Bounds

[,4.12)
  • M
Denial of Service (DoS)

[,4.6.4)
  • M
Access Restriction Bypass

[2.6_test9_cvs,2.6.15]
  • H
Access Restriction Bypass

[,4.1)
  • M
Information Exposure

[,2.6.17)
  • M
Denial of Service (DoS)

[,5.2.3)
  • H
Information Exposure

[,3.18]
  • M
Race Condition

[,2.6.16)
  • H
Access Restriction Bypass

[,4.5.3)
  • C
Integer Overflow or Wraparound

[,3.18]
  • M
Resource Management Errors

[,3.14.2)
  • H
Use After Free

[,4.14.91)[4.15.0,4.19.13)
  • M
Denial of Service (DoS)

[,2.6.25)
  • M
Use After Free

[,5.6.8)
  • M
Denial of Service (DoS)

[,3.18.2)
  • M
Out-of-bounds Read

[0,)
  • M
CVE-2008-0001

[,2.6.23)
  • M
Denial of Service (DoS)

[,2.6.30.2)
  • M
Access Restriction Bypass

[2.2.0,2.4.17]
  • H
Unchecked Return Value

[,5.10.2)
  • H
CVE-2021-26934

[4.18,5.10.17)
  • M
Information Exposure

[,2.6.36)
  • L
Use After Free

[3.0,3.13.7)
  • M
Use of Uninitialized Resource

[,5.4.7)
  • M
Resource Management Errors

[,3.7.3)
  • M
CVE-2001-1397

[,2.2.20)
  • H
Access Restriction Bypass

[,4.7.7)
  • H
Out-of-Bounds

[,3.18]
  • M
Information Exposure

[,3.1.1)
  • M
Information Exposure

[,5.8.0)
  • L
Out-of-Bounds

[,3.2.1)
  • M
Out-of-Bounds

[,3.4.33)
  • M
Information Exposure

[,2.6.38)
  • M
Out-of-Bounds

[,3.12.2)
  • M
Race Condition

[,2.6.18]
  • M
Out-of-bounds Write

[,4.9.110)
  • H
Out-of-bounds Write

[,5.3)
  • H
Security Features

[,4.14.5)
  • M
Resource Management Errors

[,2.6.39)
  • H
Use After Free

[,4.9)
  • M
CVE-2002-0429

[,2.4.18]
  • H
Improper Input Validation

[,2.6.8.1]
  • H
Out-of-Bounds

[,3.4.100)
  • M
Denial of Service (DoS)

[,2.6.30)
  • M
Memory Leak

[,5.3.12)
  • M
Code

[,4.1.6)
  • M
Out-of-bounds Read

[,4.4.33)
  • H
CVE-2001-1390

[,2.2.20)
  • M
Denial of Service (DoS)

[2.6_test9_cvs,2.6.13.4]
  • M
Improper Input Validation

[,2.6.37)
  • H
Access Restriction Bypass

[,5.4.2)
  • M
Information Exposure

[,2.6.21.3)
  • H
Out-of-Bounds

[,3.9.5)
  • M
Denial of Service (DoS)

[,3.17.1)
  • M
NULL Pointer Dereference

[,4.14.7)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Security Features

[,4.5.3)
  • H
Out-of-Bounds

[,2.6]
  • H
Access Restriction Bypass

[,3.19.1)
  • M
Out-of-Bounds

[,3.11.8)
  • M
Cross-site Scripting (XSS)

[0,)
  • M
Information Exposure

[4.3,5.3.11)
  • M
Cryptographic Issues

[,2.6.17)
  • M
Resource Management Errors

[,4.15.8)
  • H
Access Restriction Bypass

[,3.10]
  • M
Denial of Service (DoS)

[,2.6.26.1)
  • L
Information Exposure

[,3.6)
  • H
Access Restriction Bypass

[3.10,3.18]
  • L
Integer Overflow or Wraparound

[,4.17.4)
  • H
Access Restriction Bypass

[,3.10]
  • H
NULL Pointer Dereference

[,4.8.7)
  • L
Denial of Service (DoS)

[,2.6.36.1)
  • L
Access Restriction Bypass

[,2.6.37)
  • M
CVE-2001-1395

[,2.2.20)
  • M
Divide By Zero

[,4.12)
  • M
Denial of Service (DoS)

[2.6.8.1,2.6.10]
  • H
Improper Input Validation

(5.2,)
  • H
Improper Input Validation

[2.6.0,2.6.5]
  • M
Access Restriction Bypass

[,3.19.2)
  • H
Use After Free

[,4.10.15)
  • M
Denial of Service (DoS)

[,5.11.8)
  • M
Out-of-bounds Read

[,4.9.9)
  • H
Resource Management Errors

[2.6.0,2.6.17]
  • M
Resource Management Errors

[,3.17.4)
  • M
Resource Management Errors

[,2.6.0]
  • H
Improper Access Control

[,3.10]
  • H
NULL Pointer Dereference

[0,)
  • M
Information Exposure

[,2.6.39)
  • M
NULL Pointer Dereference

[,5.11)
  • M
Denial of Service (DoS)

[,4.5)
  • H
Resource Management Errors

[,3.18.2)
  • M
Improper Initialization

[3.11,5.10.19)
  • M
Information Exposure

[,2.6.36.2)
  • M
NULL Pointer Dereference

[,3.1)
  • M
Improper Input Validation

[,3.10.5)
  • H
Out-of-bounds Write

[3.0,4.0)
  • H
Race Condition

[2.6.38,4.14.1)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
NULL Pointer Dereference

[,4.13.4)
  • M
Out-of-bounds Write

[,2.6.36.2)
  • M
Out-of-Bounds

[,3.6.2)
  • H
Out-of-Bounds

[4.5.1,5.6.19)
  • M
Resource Management Errors

[,2.6.25)
  • H
Use After Free

[0,5.10-rc5)
  • M
User Enumeration

[,5.11.8)
  • H
Improper Initialization

[,2.6.39)
  • M
NULL Pointer Dereference

[,5.9.14)
  • M
Information Exposure

[,3.10]
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Out-of-Bounds

[,4.14.9)
  • M
Denial of Service (DoS)

[,2.6.25)
  • H
Security Features

[,4.2.0)
  • H
Access Restriction Bypass

[,4.8]
  • M
Missing Initialization of Resource

[2.6.25,5.12.11)
  • M
Resource Management Errors

[2.4.23_ow2,2.4.32]
  • M
Resource Management Errors

[,4.10.13)
  • M
Resource Management Errors

[,2.6.15)
  • C
Denial of Service (DoS)

[2.4.23_ow2,2.6.9]
  • H
Out-of-bounds Write

[,2.6.38)
  • H
Access Restriction Bypass

[,3.10.102)
  • M
Denial of Service (DoS)

[,2.6.14.2)
  • M
Information Exposure

[,3.10]
  • M
Code

[,3.18.8)
  • M
Cryptographic Issues

[,3.8.3)
  • M
Resource Management Errors

[,3.3.6)
  • H
Improper Input Validation

[,4.19.14)
  • H
Privilege Escalation

[3.0,4.0)
  • M
Denial of Service (DoS)

[,2.2.0]
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Information Exposure

[,2.6.36.2)
  • M
Access Restriction Bypass

[,2.6.39)
  • M
Directory Traversal

[,5.6)
  • M
Denial of Service (DoS)

[2.0,2.2.0]
  • C
Buffer Overflow

[3.0,4.0)
  • M
Information Exposure

[,4.7.1)
  • M
Denial of Service (DoS)

[,2.6.21)
  • L
Denial of Service (DoS)

[2.4.0,2.4.21]
  • H
NULL Pointer Dereference

[,5.0.7)
  • M
Race Condition

[,2.6.29)
  • H
Access Restriction Bypass

[,3.11.8)
  • M
Out-of-Bounds

[,5.5.8)
  • M
Improper Input Validation

[,3.12.4)
  • M
Denial of Service (DoS)

[2.6.15,2.6.17]
  • M
Information Exposure

[3.10,3.18]
  • M
Memory Leak

[,5.0.6)
  • M
Information Exposure

[,3.10]
  • H
Use After Free

[,5.12)
  • M
User Enumeration

[,5.5)
  • M
Information Exposure

[,3.18]
  • H
Memory Leak

[,5.3.9)
  • H
Out-of-Bounds

[,4.10.12)
  • H
Access Restriction Bypass

[,3.18]
  • H
Out-of-bounds Read

[,4.11.2)
  • M
Resource Management Errors

[,4.7.1)
  • H
Out-of-bounds Read

[,3.17.3)
  • M
NULL Pointer Dereference

[,4.13.7)
  • H
Use After Free

[,5.11.14)
  • M
Race Condition

[,4.18.12)
  • H
Out-of-Bounds

[,4.14.9)
  • M
Information Exposure

[,4.1.6)
  • M
Out-of-bounds Read

[,4.14.8)
  • H
Race Condition

[,3.14.4)
  • M
Double Free

[,5.13.5)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Out-of-Bounds

[,2.6.26.4)
  • C
CVE-2002-1573

[,2.4.20)
  • M
Out-of-Bounds

[,4.2.3)
  • M
User Enumeration

[,5.12.13)
  • H
Access Restriction Bypass

[,3.18]
  • H
Race Condition

[,4.13.6)
  • M
Improper Data Handling

[,4.17)
  • M
NULL Pointer Dereference

[,2.6.39)
  • H
Use After Free

[4.14,4.14.166)[4.19,4.19.97)[5.0,5.2.1)
  • H
Denial of Service (DoS)

[,2.6.32.1)
  • M
Information Exposure

[,3.18]
  • M
Denial of Service (DoS)

[,3.8.5)
  • M
NULL Pointer Dereference

[,5.7)
  • M
Denial of Service (DoS)

[,2.2.11)
  • M
Denial of Service (DoS)

[,2.6.18]
  • L
Improper Access Control

[,4.14.6)
  • L
Missing Initialization of Resource

[,2.6.36)
  • M
Denial of Service (DoS)

[3.10.1,3.11)[4.18.1,4.19)
  • H
Privilege Escalation

[,2.6.22)
  • M
Denial of Service (DoS)

[,4.8)
  • H
Out-of-Bounds

[,4.13)
  • C
Buffer Overflow

[,2.6.26.1)
  • H
Resource Management Errors

[,3.16.3)
  • M
Denial of Service (DoS)

[,2.4.22)
  • M
Cross-site Scripting (XSS)

[,3.4.16)
  • M
Improper Input Validation

[,3.7.9)
  • M
Integer Overflow or Wraparound

[,3.1.8)
  • M
Resource Management Errors

[,2.6.32]
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Buffer Overflow

[,2.6.11)
  • M
Resource Management Errors

[,2.6.27.19)[2.6.28.0,2.6.28.7)
  • H
Use After Free

[5.5.0,5.12.2)
  • H
Denial of Service (DoS)

[,2.6.8.1)
  • H
Use After Free

[3.0,4.0)
  • M
Improper Input Validation

[,3.9.10)
  • M
Resource Management Errors

[,2.6.15)
  • M
Information Exposure

[,3.18]
  • M
Integer Overflow or Wraparound

[,4.12.4)
  • M
Denial of Service (DoS)

[,2.6.0]
  • H
Out-of-Bounds

[,4.9.11)
  • M
Improper Access Control

[,4.8.10)
  • H
Access Restriction Bypass

[,3.10]
  • H
Access Restriction Bypass

[,3.18]
  • M
Out-of-Bounds

[,3.11.1)
  • H
Improper Validation of Array Index

[,2.6.38.1)
  • M
Information Exposure

[,4.14.2)
  • M
CVE-2001-0317

[2.2.0,2.4.0]
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Denial of Service (DoS)

[,4.5)
  • M
Out-of-bounds Write

[,3.13.10)
  • H
Out-of-Bounds

[,3.16.4)
  • M
NULL Pointer Dereference

[,2.6.12.5)
  • H
Use After Free

[,4.11.2)
  • H
Race Condition

[,4.10.3)
  • H
Access Restriction Bypass

[,3.18]
  • H
Resource Management Errors

[,4.9.11)
  • M
NULL Pointer Dereference

[,3.1)
  • M
Use After Free

[,4.14.11)
  • M
Denial of Service (DoS)

[,2.6.9]
  • H
Use After Free

[,4.5.2)
  • M
Information Exposure

[2.6.10,2.6.11_rc1_bk6]
  • H
Denial of Service (DoS)

[,2.6.34)
  • C
Security Bypass

[,4.4.61)
  • H
Out-of-Bounds

[,3.17.3)
  • M
Information Exposure

[3.10,3.18]
  • M
Denial of Service (DoS)

[2.6.11_rc1_bk6,2.6.17]
  • M
Denial of Service (DoS)

[,2.6.8)
  • M
Information Exposure

[,5.2.9)
  • M
CVE-2010-1088

[2.6.18,2.6.34]
  • H
Out-of-bounds Read

[,5.0.10)
  • M
Out-of-bounds Read

[,4.13.6)
  • H
Access Restriction Bypass

[,3.3.4)
  • H
Race Condition

[,5.10.13)
  • M
Race Condition

[,3.8.3)
  • M
Denial of Service (DoS)

[,2.6.12.5)
  • H
Improper Input Validation

[,3.7.10)
  • H
Use After Free

[,5.0.19)
  • H
Improper Access Control

[3.10,3.18]
  • C
Use After Free

[,5.0.4)
  • M
Race Condition

[,4.1.2)
  • L
Insecure Default

[,5.3.3)
  • M
Denial of Service (DoS)

[2.6_test9_cvs,2.6.15]
  • H
Improper Input Validation

[,2.6.36)
  • M
CVE-2001-1399

[,2.2.20)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Denial of Service (DoS)

[,4.5)
  • H
Out-of-Bounds

[,2.6.22.17)
  • M
Access Restriction Bypass

[,2.6.34.1)
  • M
Improper Verification of Cryptographic Signature

[,4.11.1)
  • H
Out-of-bounds Read

[,5.8.1)
  • M
NULL Pointer Dereference

[,5.4.2)
  • M
NULL Pointer Dereference

[,4.15.8)
  • M
Resource Management Errors

[,3.9.5)
  • M
Improper Input Validation

[,4.10.6)
  • M
Incorrect Authorization

[,5.7.7)
  • H
CVE-2004-0887

[2.6.0,2.6.10]
  • H
Out-of-Bounds

[,4.6.3)
  • L
Resource Management Errors

[,3.8.4)
  • M
Resource Management Errors

[,2.6.18]
  • H
Access Restriction Bypass

[3.10,3.18]
  • C
Out-of-bounds Read

[,5.2.3)
  • L
Information Exposure

[,2.6.36)
  • M
Information Exposure

[0,)
  • H
CVE-2004-0496

[,2.6.0]
  • M
Information Exposure

[,3.9.1)
  • M
Use After Free

[,5.2.6)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Code

[,3.17.4)
  • L
Missing Initialization of Resource

[,2.6.37)
  • M
Out-of-bounds Read

[,5.6.19)
  • M
Improper Input Validation

[,2.6.8.1)
  • M
Denial of Service (DoS)

[,4.5)
  • M
Out-of-bounds Read

[,4.13.8)
  • M
Denial of Service (DoS)

[,2.6.13)
  • M
Denial of Service (DoS)

[,2.4.0]
  • C
Out-of-bounds Write

[5.0,5.0.12)
  • H
Access Restriction Bypass

[,3.10]
  • H
Integer Overflow or Wraparound

[2.6.0,3.0.0)[3.10.0,3.11)[4.14.0,4.14.55)
  • M
Denial of Service (DoS)

[,2.2.20)
  • H
Privilege Escalation

[,3.17.5)
  • M
Improper Access Control

[,4.4)
  • H
Improper Input Validation

[3.14.54,3.18.22]
  • M
Denial of Service (DoS)

[,4.2.4)
  • M
Resource Management Errors

[,4.2.6)
  • M
Use After Free

[,2.6.25.10)
  • C
Out-of-bounds Write

[3.0,4.18)
  • H
CVE-2006-0096

[,2.4.29)[2.6.0,2.6.11)
  • M
Denial of Service (DoS)

[,2.6.37)
  • H
Use After Free

[0,)
  • M
NULL Pointer Dereference

[0,)
  • M
Information Exposure

[3.10,3.18]
  • H
Access Restriction Bypass

[,3.11.8)
  • C
Out-of-bounds Write

[0,)
  • H
Cross-site Scripting (XSS)

[0,)
  • M
Denial of Service (DoS)

[,2.6.18)
  • M
Improper Input Validation

[,3.19.2)
  • M
Use After Free

[,5.2.10)
  • C
Out-of-Bounds

[,2.4.36.6)[2.6.25.0,2.6.25.5)
  • M
Buffer Overflow

[,2.6.37.2)
  • H
Out-of-Bounds

[,2.6.39.2)
  • H
Out-of-bounds Write

[,5.13.9)
  • H
Race Condition

[4.3,4.4.179)[4.9,4.9.169)[4.14,4.14.112)[4.19,4.19.35)[5.0,5.0.8)
  • M
Denial of Service (DoS)

[,2.6.37)
  • M
Information Exposure

[,4.19.1)
  • M
Denial of Service (DoS)

[2.6.17,2.6.26.2]
  • M
Information Exposure

[,4.8.12)
  • M
Out-of-Bounds

[,3.7.4)
  • H
Out-of-Bounds

[,4.5.3)
  • M
Improper Input Validation

[,2.6.39)
  • H
Integer Overflow or Wraparound

[,2.6.27.53)[2.6.32,2.6.32.21)[2.6.34,2.6.34.6)[2.6.35,2.6.35.4)
  • M
Out-of-bounds Read

[,4.14.8)
  • M
Out-of-bounds Read

[,3.14.4)
  • M
Cryptographic Issues

[,3.8.3)
  • M
NULL Pointer Dereference

[,3.10.1)
  • H
Buffer Overflow

[,2.6.35)
  • H
Out-of-Bounds

[,5.1.15)
  • H
Resource Management Errors

[,4.14.13)
  • H
Out-of-bounds Write

[,4.8.6)
  • H
Access Restriction Bypass

[,3.18]
  • M
Denial of Service (DoS)

[2.4.23_ow2,2.6.10]
  • M
Denial of Service (DoS)

[,2.6.28.1)
  • M
Memory Leak

[,5.3.12)
  • M
NULL Pointer Dereference

[,4.19.3)
  • H
Memory Leak

[0,)
  • M
Denial of Service (DoS)

[,2.6.38)
  • H
Out-of-Bounds

[,4.0)
  • L
Denial of Service (DoS)

[,3.6.9)
  • M
Improper Input Validation

[,3.2.102)[3.3,4.1.51)[4.3,4.9.87)[4.10,4.14.25)[4.15,4.15.8)
  • M
Information Exposure

[,3.9.1)
  • H
Improper Input Validation

[,3.10.8)
  • H
Denial of Service (DoS)

[,4.0.6)
  • M
Information Exposure

[,5.8.9)
  • H
NULL Pointer Dereference

[,2.6.19)
  • L
Denial of Service (DoS)

[,2.6.0]
  • M
Out-of-Bounds

[,4.13)
  • H
Information Exposure

[2.4.23_ow2,2.6.9]
  • H
Code

[,3.18.8)
  • M
Information Exposure

[,4.13.4)
  • M
Denial of Service (DoS)

[,4.5)
  • M
Information Exposure

[,3.6.5)
  • H
Denial of Service (DoS)

[,2.6.21)
  • H
Memory Leak

[,5.3.10)
  • H
Access Restriction Bypass

[,3.18]
  • H
Use After Free

[,5.7)
  • M
Resource Management Errors

[,2.6.31.6)
  • H
Out-of-bounds Write

[,4.16.13)
  • H
Out-of-bounds Read

[,4.8.12)
  • M
Out-of-bounds Read

[,4.3]
  • M
Out-of-Bounds

[,3.11.1)
  • C
Out-of-Bounds

[,2.6.27.5)
  • M
Denial of Service (DoS)

[,4.13)
  • M
Information Exposure

[,3.10]
  • M
Improper Input Validation

[,2.6.27.19)[2.6.28.0,2.6.28.7)
  • M
NULL Pointer Dereference

[,4.13.14)
  • M
CVE-2007-0958

[0,RHSA-2007-0488)
  • H
Out-of-Bounds

[,4.10.13)
  • H
Improper Input Validation

[,3.17.3)
  • M
User Enumeration

[,5.13.8)
  • M
Resource Management Errors

[,2.6.8.1]
  • H
Use After Free

[,4.12.10)
  • M
Use After Free

[,5.3.11)
  • M
Denial of Service (DoS)

[2.4.10,2.4.19]
  • H
Use After Free

[5.11,5.12.9)
  • M
Buffer Overflow

[,2.6.25.15)
  • M
Denial of Service (DoS)

[,2.6.38)
  • M
Double Free

[,5.1.8)
  • C
Buffer Overflow

[,5.3.3)
  • H
Improper Input Validation

[3.0,4.0)
  • M
Out-of-Bounds

[,3.18.2)
  • M
Information Exposure

[,2.6.9]
  • M
Improper Input Validation

[,4.13.3)
  • M
Information Exposure

[3.10,3.18]
  • L
Information Exposure

[,4.5.5)
  • M
Memory Leak

[,5.3.12)
  • H
Out-of-bounds Write

[,5.12)
  • H
Denial of Service (DoS)

[,2.6.14]
  • M
Race Condition

[,4.7.1)
  • H
Out-of-Bounds

[,2.6.18.6)
  • H
Access Restriction Bypass

[,3.8.11)
  • M
Information Exposure

[,4.15.8)
  • M
Information Exposure

[,4.11.5)
  • M
Information Exposure

[,4.12.10)
  • M
Information Exposure

[,5.2.15)
  • H
Race Condition

[,4.9.7)
  • H
Information Exposure

(3.2,4.15)
  • H
Out-of-bounds Read

[5.10,5.10.37)[5.11,5.11.21)[5.12,5.12.4)
  • M
Use After Free

[,5.4.2)
  • M
Memory Leak

[,5.3.4)
  • M
Improper Input Validation

[,4.8.12)
  • H
Improper Input Validation

[,5.8.14)
  • H
Out-of-bounds Write

[,4.11)
  • H
Memory Leak

[,5.3.12)
  • H
Out-of-Bounds

[,2.6.36)
  • M
Resource Management Errors

[2.6.17.10,2.6.18]
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Improper Initialization

[,2.6.36)
  • H
Out-of-bounds Read

[,5.11.4)
  • M
Denial of Service (DoS)

[,2.6.16]
  • H
Use After Free

[,5.8.2)
  • M
Out-of-Bounds

[4.1.0,4.1.49)[4.4.0,4.4.107)[4.9.0,4.9.71)[4.14.0,4.14.8)
  • M
Information Exposure

[,3.9.1)
  • L
Access Restriction Bypass

[,3.19.2)
  • M
Resource Management Errors

[,2.6.39)
  • M
CVE-2007-2480

[,2.6.22)
  • H
Improper Input Validation

[,2.6.39)
  • M
Information Exposure

[,2.6.26)
  • H
NULL Pointer Dereference

[,2.6.21)
  • H
Out-of-bounds Write

[2.6.19,4.4.267)[4.5,4.9.267)[4.10,4.14.231)[4.15,4.19.188)[4.20,5.4.113)[5.5,5.10.31)[5.11,5.12)
  • M
Race Condition

[,5.2.10)
  • M
Improper Input Validation

[,4.13.12)
  • M
NULL Pointer Dereference

[,4.18)
  • H
Out-of-bounds Write

[0,)
  • H
Remote Code Execution (RCE)

[2.2.0,2.4.10]
  • M
Information Exposure

[,2.4.0]
  • H
Out-of-Bounds

[,2.6.23]
  • H
NULL Pointer Dereference

[4.4.0,4.4.195)
  • H
Out-of-bounds Write

[0,)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Access Restriction Bypass

[,3.10]
  • M
Access Restriction Bypass

[,2.6.23]
  • H
Privilege Escalation

[3.0.0,3.19.8][4.0.0,5.0)
  • H
Improper Access Control

[3.10,3.18]
  • M
Denial of Service (DoS)

[,3.18.2)
  • M
Information Exposure

[,3.10]
  • H
Race Condition

[,4.5)
  • M
Information Exposure

[,3.18]
  • M
Denial of Service (DoS)

[,4.1.4)
  • H
Information Exposure

[,4.15.1)
  • M
Race Condition

[,4.4)
  • M
Information Exposure

[,4.18.11)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Out-of-bounds Write

[,4.14.15)
  • M
Information Exposure

[,4.15.5)
  • M
Improper Input Validation

[2.4.0,2.4.35)[2.6.0,2.6.21)
  • L
Information Exposure

[,2.6.22)
  • H
Arbitrary Code Execution

[0,RHSA-2007-0014)
  • M
Improper Input Validation

[,5.11.11)
  • H
NULL Pointer Dereference

[,5.2.9)
  • H
Out-of-bounds Write

[,4.12)
  • H
Use After Free

[4.19,5.5)
  • H
Access Restriction Bypass

[,4.5.3)
  • H
NULL Pointer Dereference

[,3.18)
  • M
NULL Pointer Dereference

[,3.15)
  • M
Access Restriction Bypass

[2.6.25,2.6.25.12]
  • M
Out-of-Bounds

[,5.5)
  • M
Denial of Service (DoS)

[,2.6.14)
  • M
Buffer Overflow

[,3.1)
  • H
Access Restriction Bypass

[,3.18]
  • L
Information Exposure

[,3.6)
  • M
Improper Input Validation

[,3.13.7)
  • H
NULL Pointer Dereference

[,2.6.21)
  • M
Access Restriction Bypass

[,2.6.18]
  • L
CVE-2007-3848

[,2.4.35.1)
  • H
Improper Validation of Array Index

[4.19,4.19.25)[4.20,4.20.12)
  • M
Memory Leak

[,5.7.7)
  • H
NULL Pointer Dereference

[,2.6.35)
  • M
Denial of Service (DoS)

[,2.6.34)
  • L
Missing Initialization of Resource

[,5.14)
  • H
Race Condition

[,3.4.5)
  • M
Information Exposure

[,3.10]
  • M
Race Condition

[,2.6.32.1)
  • H
Use After Free

[0,5.7-rc6)
  • M
Out-of-Bounds

[,3.11.1)
  • L
Information Exposure

[,5.4.92)
  • M
Race Condition

[2.6.0,3.0.0)
  • H
Use After Free

[,5.3.11)
  • M
Denial of Service (DoS)

[2.6.0,2.6.18]
  • L
Missing Initialization of Resource

[,2.6.36)
  • H
Access Restriction Bypass

[,3.18]
  • M
Denial of Service (DoS)

[,5.13.4)
  • H
Integer Overflow or Wraparound

[,5.3.14)
  • H
Out-of-Bounds

[,4.10.2)
  • H
NULL Pointer Dereference

[,2.6.39)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Out-of-Bounds

[4.9,4.10.12]
  • L
Information Exposure

[,3.6)
  • M
Information Exposure

[,4.14.15)
  • M
Denial of Service (DoS)

[,5.9.2)
  • M
Denial of Service (DoS)

[,2.6.10)
  • M
Information Exposure

[,3.9.1)
  • M
Information Exposure

[2.4.23_ow2,2.6.8]
  • M
Resource Management Errors

[,2.6.39.2)
  • M
Information Exposure

[,2.4.0]
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[,2.2.20)
  • M
Denial of Service (DoS)

[,4.5)
  • M
Denial of Service (DoS)

[,5.3.9)
  • M
NULL Pointer Dereference

[,4.11.3)
  • L
Information Exposure

[,3.0)
  • M
Denial of Service (DoS)

[,4.16.4)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Arbitrary Code Execution

[,3.0.69)
  • M
Cryptographic Issues

[,3.8.1)
  • L
Race Condition

[,3.4.16)
  • L
Access of Uninitialized Pointer

[,5.13.3)
  • M
Denial of Service (DoS)

[,4.4)
  • M
Resource Management Errors

[,2.6.0]
  • M
Information Exposure

[,3.9.1)
  • H
Out-of-Bounds

[,4.14.9)
  • H
Out-of-bounds Write

[,5.13.13)
  • M
CVE-1999-1341

[2.2.0,2.2.14)[2.3.0,2.3.18)
  • L
Denial of Service (DoS)

[,2.6.28.1)
  • M
Information Exposure

[,4.11.5)
  • H
Access Restriction Bypass

[3.10,3.18]
  • C
Out-of-bounds Write

[,4.14.12)
  • M
Denial of Service (DoS)

[,2.6.10)
  • L
Information Exposure

[,4.3.3)
  • M
Divide By Zero

[,2.6.37)
  • M
Denial of Service (DoS)

[,2.6.11)
  • H
CVE-2006-3626

[2.6.16,2.6.17.4]
  • M
Out-of-bounds Write

[,4.19.14)
  • M
Information Exposure

[,4.12.10)
  • H
NULL Pointer Dereference

[,2.6.35)
  • H
Out-of-Bounds

[,4.8.14)
  • H
Access Restriction Bypass

[,4.3.6]
  • M
Information Exposure

[,3.13.5)
  • M
Race Condition

[,2.6.32.6)
  • L
Denial of Service (DoS)

[2.6_test9_cvs,2.6.15.4]
  • M
Out-of-bounds Read

[,4.5.3)
  • M
Use After Free

[,5.8)
  • M
Information Exposure

[,3.9.1)
  • H
Improper Access Control

[,4.6.1)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Double Free

[,4.10.1)
  • M
Improper Input Validation

[,4.18.1)
  • H
Access Restriction Bypass

[,3.10.13)
  • M
Out-of-bounds Read

[,5.11.16)
  • M
Resource Management Errors

[,2.6.27.1)
  • C
Out-of-Bounds

[,3.1)
  • L
Race Condition

[,3.15.2)
  • M
Information Exposure

[,2.4.26)
  • M
Resource Management Errors

[,3.12.1)
  • M
Denial of Service (DoS)

[,2.6.14)
  • H
Improper Input Validation

[,2.6.39)
  • M
Code

[,3.12.18)
  • H
Access Restriction Bypass

[,3.10]
  • H
Race Condition

[,2.6.29.1)
  • M
CVE-2005-0204

[,2.6.9)
  • C
Out-of-Bounds

[,2.6.34.1)
  • M
Out-of-bounds Write

[,5.12)
  • M
Buffer Overflow

[2.2.16,3.0.0)
  • M
Race Condition

[,3.17.1)
  • H
Resource Management Errors

[,2.6.21)
  • M
Incorrect Calculation

[,2.6.34)
  • H
NULL Pointer Dereference

[0,)
  • H
Out-of-Bounds

[,4.13.6)
  • L
Resource Management Errors

[,2.6.27.9)
  • H
Privilege Escalation

[3.0,4.0)
  • H
Resource Management Errors

[,2.6.23)
  • M
Denial of Service (DoS)

[4.18,5.6.13)
  • M
Denial of Service (DoS)

[2.6.11,2.6.14]
  • M
Access Restriction Bypass

[,3.12.2)
  • M
Information Exposure

[3.10,3.18]
  • L
Memory Leak

[,5.3.4)
  • M
Denial of Service (DoS)

[2.4.0,2.6.20)
  • M
Access Restriction Bypass

[,2.6.36)
  • M
NULL Pointer Dereference

[,5.0.9)
  • L
Access Restriction Bypass

[,3.8.6)
  • M
Denial of Service (DoS)

[2.6.10,2.6.14]
  • C
Integer Overflow or Wraparound

[3.0,4.0)
  • M
Out-of-Bounds

[,4.13.12)
  • M
Use After Free

[,5.3.6)
  • L
Insecure Default

[,5.3.3)
  • M
Access Restriction Bypass

[,2.6.36.2)
  • H
Race Condition

[0,)
  • H
Denial of Service (DoS)

[,3.8.9)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
CVE-2021-26930

[3.11,5.10.17)
  • M
Information Exposure

[3.10,3.18]
  • M
CVE-2006-1052

[2.6_test9_cvs,2.6.17]
  • H
Improper Input Validation

[,2.6.32.4)
  • M
Memory Leak

[,5.6)
  • H
Out-of-Bounds

[,3.16.4)
  • M
NULL Pointer Dereference

[,4.16.4)
  • C
Out-of-Bounds

[4.4,4.4.195)[4.9,4.9.197)[4.14,4.14.142)[4.19,4.19.70)[5.2,5.2.12)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Memory Leak

[,5.3.12)
  • M
Information Exposure

[,4.12.10)
  • H
Race Condition

[,4.20.8)
  • M
Access Restriction Bypass

[,2.6.32.4)
  • H
Race Condition

[,5.7.11)
  • M
Out-of-Bounds

[,3.11.8)
  • H
Integer Overflow or Wraparound

[,4.9.7)
  • H
Out-of-bounds Write

[0,)
  • H
Denial of Service (DoS)

[,3.16.7)
  • M
Information Exposure

[4.8,4.18)
  • M
Resource Management Errors

[,2.6.28.1)
  • H
Integer Overflow or Wraparound

[3.0,4.0)
  • M
NULL Pointer Dereference

[,4.16)
  • H
Denial of Service (DoS)

[2.6.24_rc1,2.6.26.3]
  • H
Integer Overflow or Wraparound

[4.9.0,4.9.72)
  • M
Out-of-Bounds

[,3.11.8)
  • M
Use After Free

[3.0,3.19.8][4.0,4.0.4)
  • M
Denial of Service (DoS)

[,2.6.35]
  • M
Cross-site Scripting (XSS)

[,2.6.27.22)[2.6.28.0,2.6.28.10)
  • C
Out-of-Bounds

[,3.18]
  • M
Out-of-bounds Read

[,4.11.6)
  • M
Improper Input Validation

[,3.4.5)
  • M
Access Restriction Bypass

[0,)
  • M
Denial of Service (DoS)

[,3.17.1)
  • M
Denial of Service (DoS)

[,2.6.39.4)
  • M
Information Exposure

[,2.4.37.6)[2.6.0,2.6.13)
  • M
Information Exposure

[3.10,3.18]
  • M
Race Condition

[,4.3)
  • M
Memory Leak

[,5.3.12)
  • M
Information Exposure

[3.0,3.7.9]
  • H
Race Condition

[,3.15.2)
  • H
Memory Leak

[,5.3.11)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Resource Management Errors

[,4.9.9)
  • L
Denial of Service (DoS)

[2.6_test9_cvs,2.6.11.7]
  • M
Denial of Service (DoS)

[2.4.20,2.4.21]
  • H
NULL Pointer Dereference

[,2.6.25.10)
  • M
Race Condition

[,2.6.0)
  • M
NULL Pointer Dereference

[,4.15.9)
  • H
Out-of-bounds Write

[3.0.0,3.18.2)
  • H
Denial of Service (DoS)

[,2.6.16.18)
  • M
Information Exposure

[,3.9.1)
  • M
Improper Input Validation

[,4.10.8)
  • M
Denial of Service (DoS)

[,3.0)
  • M
Improper Input Validation

[,4.3.5)
  • M
Divide By Zero

[,5.2.3)
  • M
Denial of Service (DoS)

[,2.6.27.13)[2.6.28,2.6.28.2)
  • M
Resource Management Errors

[,2.6.8.1]
  • M
NULL Pointer Dereference

[,2.6.37)
  • M
Memory Leak

[,5.11.3)
  • M
Access Restriction Bypass

[,2.6.27)
  • M
Denial of Service (DoS)

[2.0,2.1]
  • H
Out-of-Bounds

[,4.5.3)
  • M
Buffer Overflow

[,5.2.10)
  • M
Denial of Service (DoS)

[,2.6.31.2)
  • M
Unauthorized File Access

[3.0,4.0)
  • M
NULL Pointer Dereference

(2.6.16,2.6.33.1)
  • H
Race Condition

[3.0,4.0)
  • M
Access Restriction Bypass

[,3.14.8)
  • H
Improper Access Control

[,3.10]
  • M
Access Restriction Bypass

[,2.6.9]
  • M
Information Exposure

[3.10,3.18]
  • M
Release of Invalid Pointer or Reference

[,5.9.14)
  • H
Improper Input Validation

[,2.6.22)
  • M
Race Condition

[,5.4.7)
  • M
Out-of-bounds Read

[,4.6)
  • H
Resource Management Errors

[,4.0.6)
  • M
Cryptographic Issues

[,3.11.2)
  • M
Denial of Service (DoS)

[,2.6.32.8)
  • M
Information Exposure

[,3.10]
  • M
Resource Management Errors

[,4.17)
  • M
Information Exposure

[,3.18]
  • H
Integer Overflow or Wraparound

[3.4,4.15.1)
  • L
CVE-2005-0937

[2.6_test9_cvs,2.6.11.6]
  • M
Cross-site Scripting (XSS)

[,2.6.15]
  • M
Race Condition

[0,5.10-rc1)
  • H
Out-of-bounds Write

[,5.11.7)
  • M
Resource Management Errors

[,2.6.28.4)
  • H
Race Condition

[,3.18.9)
  • H
Race Condition

[,5.12)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Use After Free

[,4.14)
  • M
Error Handling

[,5.1.6)
  • M
Buffer Overflow

[,5.8.8)
  • M
Access Restriction Bypass

[,3.2.2)
  • M
Out-of-Bounds

[,2.6.37)
  • H
Integer Overflow or Wraparound

[,4.9.10)
  • M
Information Exposure

[,4.9.5)
  • H
Use After Free

[,4.17)
  • H
Use After Free

[4.18,4.19.18)[4.20,4.20.5)
  • M
CVE-2006-1242

[,2.6.16)
  • H
Improper Access Control

[,3.5.5)
  • M
Race Condition

[,2.6.39.3)
  • M
Denial of Service (DoS)

[3.2,5.10.17)
  • H
Out-of-bounds Read

[,5.4.101)[5.5.0,5.10.19)[5.11,5.11.2)
  • M
NULL Pointer Dereference

[2.6.0,2.6.30)
  • M
CVE-2002-0704

[2.4.4,2.4.19]
  • M
Access Restriction Bypass

[,2.6.28.6)
  • M
Denial of Service (DoS)

[,3.2.24)
  • M
Information Exposure

[,3.10]
  • M
Arbitrary Code Execution

[,2.3.20]
  • L
Denial of Service (DoS)

[,2.6.9)
  • M
Denial of Service (DoS)

[,3.3)
  • M
Access Restriction Bypass

[,2.6.22)
  • H
Access Restriction Bypass

[,3.18]
  • M
CVE-2002-1976

[2.2.0,2.4.19]
  • H
Access Restriction Bypass

[,3.15.10)
  • H
Race Condition

[,4.12.5)
  • M
Resource Management Errors

[,4.4.9)
  • H
Privilege Escalation

[,3.16.2)
  • H
Privilege Escalation

[3.0.0,3.19.8][4.0.0,5.0)
  • M
Information Exposure

[,3.9.1)
  • M
Memory Leak

[,5.3.5)
  • H
Denial of Service (DoS)

[,3.8.9)
  • H
Out-of-bounds Write

[,5.3)
  • H
Access Restriction Bypass

[,3.18]
  • H
NULL Pointer Dereference

[,4.13]
  • M
Race Condition

[0,)
  • C
Out-of-bounds Write

[,2.6.39)
  • M
Denial of Service (DoS)

[,4.3.3)
  • M
Improper Input Validation

[,2.6.22)
  • M
NULL Pointer Dereference

[,4.3.6)
  • M
Denial of Service (DoS)

[,3.1)
  • M
Improper Input Validation

[,4.10.2)
  • M
NULL Pointer Dereference

[,4.15)
  • H
Out-of-bounds Write

[3.0.0,3.19.8][4.0.0,5.0)
  • M
Denial of Service (DoS)

[,2.6.12]
  • H
Access Restriction Bypass

[,4.0)
  • M
Race Condition

[,4.3.3)
  • M
Race Condition

[,2.6.34)
  • M
NULL Pointer Dereference

[,4.18)
  • M
Information Exposure

[,3.18]
  • H
Access Restriction Bypass

[,4.0)
  • M
Denial of Service (DoS)

[,2.6.12)
  • H
Access Restriction Bypass

[,3.18]
  • M
Denial of Service (DoS)

[,2.6.21)
  • H
Access Restriction Bypass

[,3.10]
  • C
Improper Input Validation

[,4.3)
  • H
Denial of Service (DoS)

[2.6.14,2.6.14.3]
  • M
Information Exposure

[,2.6.36)
  • M
Information Exposure

[,3.14.6)
  • H
Access Restriction Bypass

[,3.18]
  • M
Access Restriction Bypass

[2.6.10,2.6.13]
  • H
Denial of Service (DoS)

[,4.3.5)
  • M
Resource Management Errors

[,2.6.18]
  • M
Improper Input Validation

[,2.6]
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Improper Input Validation

[,2.6.39)
  • M
Denial of Service (DoS)

[,3.0)
  • L
Improper Authentication

[,3.2.30)
  • M
Resource Management Errors

[,4.1.5)
  • M
NULL Pointer Dereference

[,5.0.11)
  • M
Denial of Service (DoS)

[2.6.0,2.6.18.3]
  • H
NULL Pointer Dereference

[3.0.0,4.0)
  • H
Out-of-bounds Write

[,5.11.4)
  • M
Denial of Service (DoS)

[,2.4.12)
  • H
Code

[,3.16)
  • H
Improper Access Control

[3.10,3.18]
  • M
Access Restriction Bypass

[,2.4.36.5)[2.6.25.0,2.6.25.3)
  • H
Access Restriction Bypass

[,3.18]
  • H
Use After Free

[,5.5.3)
  • H
Out-of-Bounds

[,2.6.28.1)
  • M
Improper Input Validation

[,2.6.29.1)
  • M
Access Restriction Bypass

[,2.6.29.4)
  • M
Improper Initialization

[,5.4)
  • H
Out-of-bounds Read

[4.14,4.14.75)[4.15,4.15.18][4.16,4.16.18][4.17,4.17.9][4.18,4.18.13)
  • M
Race Condition

[,3.0)
  • H
Information Exposure

[,4.10.11)
  • H
Remote Code Execution (RCE)

[2.6.17,2.6.24.1]
  • H
Denial of Service (DoS)

[,2.6.39)
  • H
Denial of Service (DoS)

[,3.17.3)
  • M
Out-of-bounds Read

[,4.13.12)
  • H
Out-of-Bounds

[,4.12.3)
  • C
Out-of-bounds Read

[,5.2.10)
  • M
Denial of Service (DoS)

[,3.17.3)
  • M
NULL Pointer Dereference

[,2.6.38)
  • H
Use After Free

[,4.10.7)
  • H
Integer Overflow or Wraparound

[,4.17.4)
  • H
Integer Overflow or Wraparound

[,2.6.36.1)
  • C
Access Restriction Bypass

[,4.8.13)
  • M
Integer Overflow or Wraparound

[,2.6.36.2)
  • M
Resource Management Errors

[,2.6.20)
  • H
Use After Free

[,4.18.7)
  • M
Use After Free

[,4.16.7)
  • M
Denial of Service (DoS)

[,4.5.0]
  • H
Out-of-bounds Read

[0,)
  • H
Access Restriction Bypass

[,2.6.28)
  • H
Denial of Service (DoS)

[4.7,4.9.191)[4.14,4.14.141)[4.19,4.19.69)[5.2,5.2.11)
  • H
Race Condition

[,4.19.1)
  • M
Memory Leak

[,2.6.36)
  • H
CVE-2013-0311

[,3.7)
  • M
Information Exposure

[,3.9.1)
  • M
Denial of Service (DoS)

[2.4.0,2.4.33.1)[2.6.0,2.6.17.9)
  • M
Denial of Service (DoS)

[0,)
  • H
Use After Free

[,4.13)
  • H
Denial of Service (DoS)

[,4.13.5)
  • H
Improper Access Control

[,3.10]
  • H
Improper Input Validation

[,2.6.34.1)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Improper Input Validation

[,3.7.10)
  • L
Information Exposure

[,2.6.37)
  • H
Improper Access Control

[,3.18]
  • M
Buffer Overflow

[,2.4.20)
  • M
CVE-2004-0997

[,2.4.17)
  • M
Denial of Service (DoS)

[,2.6.27.5)
  • M
Out-of-bounds Write

[,4.17.4)
  • M
Resource Management Errors

[2.6.14,2.6.15]
  • M
Access Restriction Bypass

[,2.6.22)
  • M
NULL Pointer Dereference

[,4.2)
  • M
Brute Force

[,5.11.11)
  • H
Denial of Service (DoS)

[4.9,4.18)
  • M
Denial of Service (DoS)

[,3.4.19)
  • M
Denial of Service (DoS)

[,2.2.20)
  • M
CVE-1999-0401

[,2.2.1]
  • M
Use After Free

[,5.3.7)
  • M
Race Condition

[,4.5.0)
  • M
Denial of Service (DoS)

[,2.6.10]
  • M
Race Condition

[,3.17.4)
  • H
Resource Management Errors

[,4.11.9)
  • M
Information Exposure

[,4.7.1)
  • M
Arbitrary Code Execution

[2.4.0,2.6.0]
  • C
Use After Free

[,4.9.36)[4.0,4.11)
  • H
Incorrect Authorization

[4.15,4.19.2)
  • M
Information Exposure

[,3.10]
  • H
Improper Input Validation

[,3.13.2)
  • H
Denial of Service (DoS)

[,2.6.38.5)
  • M
Out-of-Bounds

[,5.4.2)
  • H
Denial of Service (DoS)

[,3.5.7)
  • M
Access Restriction Bypass

[,3.18.10)
  • M
Out-of-Bounds

[,3.2.47)
  • H
Use After Free

[,5.6.5)
  • M
Denial of Service (DoS)

[,2.6.22)
  • H
Resource Management Errors

[,3.8.5)
  • H
Memory Leak

[,5.3.11)
  • M
NULL Pointer Dereference

[,5.8)
  • M
CVE-2004-2135

[2.4.23_ow2,2.6.12]
  • H
Access Restriction Bypass

[,3.19)
  • H
Resource Management Errors

[,2.6.25.1)
  • H
Arbitrary Code Execution

[2.4.23_ow2,2.4.25]
  • M
Denial of Service (DoS)

[,2.6.11.1)
  • H
Improper Input Validation

[,4.8.13)
  • H
Use After Free

[,4.9.190)[4.14.0,4.14.139)
  • M
Improper Input Validation

[,2.6.27.19)[2.6.28.0,2.6.28.7)
  • M
Denial of Service (DoS)

[,2.6.33.1)
  • L
CVE-2007-2453

[0,RHBA-2007-0959)
  • M
Information Exposure

[,4.6.7)
  • M
Code

[,3.18.2)
  • M
Denial of Service (DoS)

[,2.6.16)
  • M
Resource Management Errors

[,3.16.3)
  • H
Use After Free

[,4.11.10)
  • H
Resource Management Errors

[,4.9.6)
  • H
Out-of-Bounds

[,2.6.30.4)
  • M
Denial of Service (DoS)

[,2.6.16.21)
  • C
Security Features

[,3.18]
  • L
Information Exposure

[,4.3.3)
  • M
NULL Pointer Dereference

[,4.8.15)
  • H
Denial of Service (DoS)

[,1.2.11)
  • H
Resource Management Errors

[,3.11.2)
  • M
Access Restriction Bypass

[,4.17.2)
  • H
Use After Free

[,3.14.2)
  • H
Use After Free

[,5.3.18)
  • M
Resource Management Errors

[,2.6.16)
  • H
Memory Leak

[,5.3.12)
  • H
NULL Pointer Dereference

[3.0,4.20.1)
  • M
Improper Input Validation

[,3.13.5)
  • C
Access Restriction Bypass

[3.10,3.18]
  • H
Time of Check Time of Use (TOCTOU)

[,5.8.3)
  • M
Use After Free

[,5.13.6)
  • M
Buffer Overflow

[2.6.0,2.6.11]
  • M
Denial of Service (DoS)

[,4.9.9)
  • H
Race Condition

[,2.6.37]
  • H
Double Free

[2.6.0,3.0.0)
  • H
Use After Free

[,4.20.6)
  • H
Out-of-Bounds

[,3.2.24)
  • H
Access Restriction Bypass

[,3.10]
  • M
CVE-2004-2136

[,2.6.0]
  • M
Use After Free

[,5.0.10)
  • M
NULL Pointer Dereference

[,4.18)
  • H
Privilege Escalation

[3.0,4.0)
  • M
Out-of-Bounds

[,2.6.39)
  • M
CVE-2002-0510

[2.4.0,2.4.18]
  • H
CVE-1999-1018

[,2.2.11)
  • M
Resource Management Errors

[,4.9.13)
  • M
Out-of-bounds Write

[,4.18)
  • H
Resource Management Errors

[,2.6.17)
  • H
Improper Validation of Array Index

[,2.6.31.7)
  • M
Denial of Service (DoS)

[,2.6.0]
  • H
Out-of-Bounds

[2.6.11_rc1_bk6,2.6.20]
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Information Exposure

[,4.5.3)
  • M
Race Condition

[,3.13.7)
  • H
Improper Access Control

[3.10,3.18]
  • M
Denial of Service (DoS)

[2.6.9,2.6.17]
  • H
Resource Management Errors

[,3.5.4)
  • M
Denial of Service (DoS)

[2.4.1,2.4.19]
  • H
Integer Overflow or Wraparound

[,2.6.37)
  • M
Denial of Service (DoS)

[2.4.23_ow2,2.6.7]
  • H
Access Restriction Bypass

[3.10,3.18]
  • L
Information Exposure

[2.6.33,2.6.34]
  • M
Denial of Service (DoS)

[,4.5)
  • M
Resource Management Errors

[,3.11.7)
  • H
Use After Free

[0,)
  • C
Out-of-Bounds

[,4.1.4)
  • M
Access Restriction Bypass

[,4.9.6)
  • M
CVE-2021-38198

[,5.12.11)
  • M
Out-of-bounds Write

[3.13,5.4)
  • H
Out-of-bounds Read

[,5.12.12)
  • H
Buffer Overflow

[2.6.34,3.16.74)[4.4,4.4.193)[4.9,4.9.193)[4.14,4.14.144)[4.19,4.19.73)[5.2,5.2.15)
  • M
Insertion of Sensitive Information into Log File

[,4.9.5)
  • M
Use After Free

[,4.13.8)
  • H
Improper Input Validation

[,2.6.28.1)
  • H
Out-of-Bounds

[,3.8.4)
  • H
Privilege Escalation

[3.16,3.16.71)[4.4,4.4.185)[4.9,4.9.185)[4.10,4.14.133)[4.19,4.19.58)[5.1,5.1.17)
  • M
Information Exposure

[,2.6.27)
  • H
Integer Overflow or Wraparound

[,2.6.36.2)
  • M
Race Condition

[,4.5.4)
  • M
Denial of Service (DoS)

[,2.6.28.10)
  • H
Out-of-Bounds

[,4.9.11)
  • H
Out-of-Bounds

[,2.6.24)
  • H
Improper Input Validation

[,2.6.33)
  • M
Information Exposure

[,4.3.4)
  • M
Denial of Service (DoS)

[,3.14.5)
  • H
Race Condition

[,4.2.4)
  • H
Resource Management Errors

[,2.6.33.1)
  • H
Resource Management Errors

[2.6.21,2.6.24]
  • M
Information Exposure

[,5.4.1)
  • M
Resource Management Errors

[,2.6.28.2)
  • M
Information Exposure

[,3.10]
  • M
Resource Management Errors

[,2.6.12.5)
  • M
Out-of-Bounds

[,4.15.8)
  • M
Information Exposure

[,2.4.22]
  • M
Memory Leak

[,5.3.4)
  • M
Resource Management Errors

[,2.6.25)
  • L
Information Exposure

[,2.6.39)
  • H
Denial of Service (DoS)

[,3.4.1)
  • H
Information Exposure

[,4.5.5)
  • M
Resource Management Errors

[2.6.10,2.6.13]
  • M
Denial of Service (DoS)

[,2.6.0]
  • H
Use After Free

[,5.0.10)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Information Exposure

[3.0,3.10.0]
  • H
Security Features

[,4.2.4)
  • H
Out-of-Bounds

[,4.11.6)
  • M
Buffer Overflow

[,2.6.19)
  • M
Access Restriction Bypass

[2.0,2.0.39]
  • M
Information Exposure

[,2.6.35)
  • H
Access Restriction Bypass

[,2.6.31.7)
  • M
Use After Free

[4.19,4.19.64)[5.2,5.3)
  • H
Access Restriction Bypass

[,3.10]
  • H
Use After Free

[0,)
  • M
Memory Leak

[,5.1.13)
  • M
Resource Management Errors

[,2.6.31.1)
  • H
Denial of Service (DoS)

[2.6.0,2.6.33)
  • L
CVE-2011-1019

[,2.6.38)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Privilege Escalation

[,3.16.2)
  • M
Out-of-bounds Read

[,5.8.10)
  • H
Out-of-Bounds

[,4.10.7)
  • M
Information Exposure

[,3.13.3)
  • M
NULL Pointer Dereference

[,4.5)
  • H
Access Restriction Bypass

[,3.18]
  • H
Information Exposure

[,4.5.5)
  • M
Denial of Service (DoS)

[,2.6.23)
  • H
Out-of-bounds Read

[0,)
  • H
Race Condition

[,5.0.8)
  • M
Information Exposure

[,2.6]
  • M
Out-of-bounds Write

[,4.17.4)
  • M
Resource Management Errors

[,2.6.22)
  • M
Arbitrary Code Execution

[,2.6.13.1)
  • M
Improper Input Validation

[,4.4)
  • M
Resource Management Errors

[,2.6.18]
  • H
Out-of-Bounds

[2.4.4,2.6.30.4]
  • M
Improper Input Validation

[,2.6.27.19)[2.6.28.0,2.6.28.7)
  • M
CVE-2002-0499

[2.2.0,2.4.18]
  • M
Incorrect Calculation

[,4.9.10)
  • H
Out-of-bounds Write

[,4.17.6)
  • H
Race Condition

[,5.3.10)
  • M
Information Exposure

[,3.18]
  • M
Information Exposure

[,4.5)
  • H
Resource Management Errors

[,2.6.14)
  • H
Out-of-Bounds

[,4.9.11)
  • M
Denial of Service (DoS)

[2.4.23_ow2,2.4.30]
  • M
Out-of-bounds Write

[,4.17.6)
  • H
Use After Free

[,5.10)
  • M
Race Condition

[,5.11.9)
  • M
Denial of Service (DoS)

[,2.6.31.5)
  • H
Race Condition

[,4.4.133)[4.5,4.9.103)[4.10,4.14.44)[4.15,4.16.12)
  • H
Use After Free

[,5.0.5)
  • H
Out-of-Bounds

[,4.8.3)
  • M
Information Exposure

[,3.12.4)
  • M
Memory Leak

[,5.3.12)
  • H
Access Restriction Bypass

[,3.10]
  • M
NULL Pointer Dereference

[,4.15.16)
  • H
Access Restriction Bypass

[,4.11.5]
  • M
Access Restriction Bypass

[,5.2.15)
  • M
NULL Pointer Dereference

[,5.6.1)
  • H
NULL Pointer Dereference

[,3.13.7)
  • M
Off-by-one Error

[,3.0)
  • L
Information Exposure

[,3.7.6)
  • M
Denial of Service (DoS)

[,3.11.1)
  • H
Access Restriction Bypass

[,3.10]
  • H
Access Restriction Bypass

[,3.10]
  • M
Improper Handling of Exceptional Conditions

[,5.3.4)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Out-of-Bounds

[,3.16.2)
  • M
Information Exposure

[,3.10]
  • L
Incorrect Type Conversion or Cast

[,4.14.11)
  • M
NULL Pointer Dereference

[,4.16)
  • M
Resource Management Errors

[3.10,3.18]
  • M
Race Condition

[2.6.11.1,2.6.33.1)
  • L
Information Exposure

[,3.6)
  • H
Access Restriction Bypass

[,4.5.3)
  • M
Denial of Service (DoS)

[,2.6.31.1)
  • H
Integer Underflow

[,3.0)
  • M
Race Condition

[,2.4.35.1)
  • M
Information Exposure

[,2.4.0]
  • M
Information Exposure

[,3.7.2)
  • M
Privilege Escalation

[,5.4)
  • L
Information Exposure

[,2.6.37)
  • L
Information Exposure

[,5.7.12)
  • M
NULL Pointer Dereference

[,5.12.13)
  • M
Information Exposure

[3.10,3.18]
  • M
Memory Leak

[,5.3.10)
  • M
Out-of-Bounds

[,4.8.3)
  • M
Improper Input Validation

[,4.4)
  • M
Resource Management Errors

[,2.6.32.8)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Denial of Service (DoS)

[2.6.0,2.6.18]
  • M
Denial of Service (DoS)

[,2.6.36)
  • M
Symlink Attack

[,2.6.0]
  • M
Security Features

[,3.17.1)
  • H
Out-of-Bounds

[,4.14.9)
  • H
Access Restriction Bypass

[,3.18]
  • M
Information Exposure

[3.10,3.18]
  • M
Denial of Service (DoS)

[,2.6.33)
  • L
Information Exposure

[,5.0.15)
  • M
Use After Free

[,5.0)
  • M
Information Exposure

[,3.18]
  • M
Out-of-bounds Read

[,4.13.6)
  • M
Cross-site Scripting (XSS)

[,390]
  • M
CVE-2006-2071

[2.4.23_ow2,2.6.16]
  • H
Access Restriction Bypass

[,4.18)
  • H
Denial of Service (DoS)

[,2.6.35)
  • M
Improper Input Validation

[,3.12.4)
  • H
Access Restriction Bypass

[,3.18]
  • H
Buffer Overflow

[,2.6.0]
  • H
Improper Input Validation

[3.9,4.18.1)
  • M
Improper Input Validation

[,4.13.4)
  • M
Improper Input Validation

[,3.4.1)
  • M
Resource Management Errors

[,3.8.9)
  • H
Out-of-Bounds

[,4.8.12)
  • M
Denial of Service (DoS)

[,2.6.31]
  • H
Access Restriction Bypass

[,3.10]
  • H
Out-of-Bounds

[,4.10.12)
  • L
Memory Leak

[,5.3.12)
  • H
Out-of-bounds Write

[,2.6.36.2)
  • M
Race Condition

[,4.7.1)
  • M
Information Exposure

[,4.12.11)
  • H
Race Condition

[,3.18.3)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Resource Management Errors

[2.4.0,2.4.36.5)[2.6.0,2.6.25.3)
  • M
Out-of-bounds Write

[,5.4.12)
  • H
Out-of-bounds Write

[,5.9.0)
  • M
Information Exposure

[,2.6.13.1)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Improper Access Control

[3.10,3.18]
  • M
Denial of Service (DoS)

[,4.19.9)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Denial of Service (DoS)

[,2.6.34)
  • M
Resource Management Errors

[,4.2.4)
  • M
Improper Input Validation

[,3.14.1)
  • H
Information Exposure

[,2.6.35)
  • M
Out-of-Bounds

[,3.13.7)
  • M
Information Exposure

[,4.16.9)
  • M
Out-of-Bounds

[,2.6.38.1)
  • H
Improper Access Control

[,3.10]
  • M
Information Exposure

[,2.6.23)
  • M
Buffer Overflow

[,2.6.11)
  • H
Denial of Service (DoS)

[,4.5.5)
  • M
Denial of Service (DoS)

[,5.8)
  • M
Denial of Service (DoS)

[,3.2.2)
  • M
Information Exposure

[,5.1.2)
  • L
Information Exposure

[,3.12.8)
  • H
CVE-2017-5669

[,4.11)
  • H
Out-of-Bounds

[2.6.2,2.6.21.1]
  • M
NULL Pointer Dereference

[,4.18)
  • H
Access Restriction Bypass

[,4.1.6)
  • H
Race Condition

[,2.6.34)
  • M
Access Restriction Bypass

[,4.3.3)
  • M
Directory Traversal

[2.6.16_rc7,2.6.16.8]
  • M
Denial of Service (DoS)

[2.2.1,2.2.23]
  • M
Buffer Overflow

[2.4.23_ow2,2.6.5]
  • H
Insecure Default

[5.5,5.7.10)
  • M
Race Condition

[,2.6.26)
  • M
Information Exposure

[,3.11.8)
  • M
Use After Free

[,5.2.1)
  • H
Memory Leak

[,5.3.12)
  • H
Use After Free

[,5.11.9)
  • M
Access Restriction Bypass

[,2.6.27)
  • M
Improper Input Validation

[,2.6.25)
  • H
Use After Free

[,4.18.9)
  • M
Improper Input Validation

[,3.12.2)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Resource Management Errors

[,4.14.4)
  • H
Use After Free

[,5.12.4)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Access Restriction Bypass

[,3.10]
  • H
NULL Pointer Dereference

[2.6.12.1,4.14.130)[4.19,4.19.56)[5.1,5.1.15)
  • M
Use After Free

[3.13,)
  • H
Denial of Service (DoS)

[4.4,4.4.182)[4.9,4.9.182)[4.14,4.14.127)[4.19,4.19.52)[5.1,5.1.11)
  • M
Out-of-Bounds

[,4.17)
  • H
Denial of Service (DoS)

[,3.6.1)
  • M
Denial of Service (DoS)

[,3.11.7)
  • H
CVE-2020-29534

[5.1,5.8.18)[5.9.0,5.9.3)
  • M
Race Condition

[,4.15)
  • H
Resource Management Errors

[,4.8.3)
  • M
Denial of Service (DoS)

[,2.4.29)
  • M
Denial of Service (DoS)

[,3.8.1)
  • L
Use of Uninitialized Resource

[0,)
  • M
Information Exposure

[,3.9.1)
  • H
Use After Free

[,4.8)
  • M
Access Restriction Bypass

[,3.18.5)
  • M
Denial of Service (DoS)

[,3.16.2)
  • H
Denial of Service (DoS)

[,2.6.6)
  • H
Access Restriction Bypass

[,3.18]
  • H
Denial of Service (DoS)

[,4.4.182)[4.5,4.9.182)[4.10,4.14.127)[4.15,4.19.52)[4.20,5.1.11)
  • M
Improper Handling of Exceptional Conditions

[,5.6.19)
  • M
Out-of-bounds Write

[0,)
  • M
Denial of Service (DoS)

[,3.19.1)
  • H
Access Restriction Bypass

[,3.10]
  • H
Denial of Service (DoS)

[2.6.20,2.6.20.2]
  • L
Denial of Service (DoS)

[,2.4.32)[2.6.0,2.6.13)
  • M
Information Exposure

[,3.14.4)
  • H
Improper Access Control

[3.10,3.18]
  • M
Information Exposure

[,4.14.16)
  • M
Information Exposure

[,3.18]
  • C
Out-of-Bounds

[,2.6.20)
  • M
Out-of-bounds Read

[,4.19.9)
  • M
Denial of Service (DoS)

[,3.12.6)
  • M
Information Exposure

[,4.13)
  • M
Denial of Service (DoS)

[,2.6.34)
  • M
Resource Management Errors

[,3.9.5)
  • M
Information Exposure

[,4.6.2)
  • L
Improper Input Validation

[,2.6.38)
  • M
NULL Pointer Dereference

[,4.16.4)
  • M
CVE-2001-1396

[,2.2.20)
  • M
Information Exposure

[,3.9.1)
  • M
Resource Management Errors

[,2.6.36)
  • M
Out-of-Bounds

[,4.6.7)
  • M
Race Condition

[,2.6.37)
  • M
Arbitrary Code Execution

[,2.2.19]
  • M
Denial of Service (DoS)

[,2.6.11]
  • H
Improper Input Validation

[5.4,5.4.72)[5.8.0,5.8.16)[5.9.0,5.9.14)
  • M
Improper Access Control

[,4.6.4)
  • M
Buffer Overflow

[,5.10.5)
  • M
NULL Pointer Dereference

[,5.11.12)
  • M
Cryptographic Issues

[3.0,3.7.9]
  • M
Access Restriction Bypass

[,2.6.13.1)
  • M
Race Condition

[,4.8)
  • M
Denial of Service (DoS)

[,2.2.18)
  • M
Denial of Service (DoS)

[,2.6.10)
  • H
Improper Access Control

[,4.9.10)
  • H
Out-of-Bounds

[,2.6.17)
  • H
Integer Overflow or Wraparound

[,4.11)
  • L
Insecure Default

[,5.3.3)
  • H
Race Condition

[,4.13.8)
  • C
Out-of-Bounds

[,2.6.27.1)
  • M
Denial of Service (DoS)

[,2.6.12.5)
  • H
Denial of Service (DoS)

[,2.6.11.6)
  • M
Buffer Overflow

[2.4.23_ow2,2.4.27]
  • M
Improper Initialization

[,2.6.35)
  • M
Code

[,4.0.6)
  • M
NULL Pointer Dereference

[,3.1)
  • H
Access Restriction Bypass

[,3.18.53)
  • M
Resource Management Errors

[2.6.0,2.6.13]
  • L
Insecure Default

[,5.3.3)
  • M
Race Condition

[,3.18.5)
  • M
Denial of Service (DoS)

[,2.6.24)
  • H
Out-of-Bounds

[,4.10.7)
  • M
NULL Pointer Dereference

[,4.17.4)
  • H
Out-of-Bounds

[,2.6.28.1)
  • M
NULL Pointer Dereference

[,5.3.14)
  • M
Out-of-bounds Write

[,2.6.33)
  • H
Denial of Service (DoS)

[,4.10.10)
  • M
Improper Input Validation

[3.14,3.14.1]
  • H
Privilege Escalation

[,2.6.36)
  • H
Out-of-Bounds

[,2.6.33)
  • H
Information Exposure

[,4.11.10)
  • H
Out-of-Bounds

[,4.0.6)
  • H
Out-of-Bounds

[,3.16.2)
  • H
Out-of-Bounds

[3.0,4.0)
  • H
Race Condition

[,4.8.13)
  • M
Denial of Service (DoS)

[2.4.23_ow2,2.6.12]
  • M
Memory Leak

[2.3.36,2.6.39)
  • M
Use After Free

[,4.13.12)
  • M
Use After Free

[,5.3.11)
  • M
Out-of-Bounds

[,5.8.15)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
CVE-2010-4648

[,2.6.37)
  • H
Race Condition

[,4.12)
  • H
Race Condition

[,5.5.11)
  • H
Out-of-bounds Read

[,4.12.4)
  • M
Buffer Overflow

[,5.9.0)
  • M
Information Exposure

[4.4.0,4.4.114)[4.9.0,4.9.79)[4.14.0,4.14.8)
  • H
Out-of-Bounds

[,3.11.8)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Denial of Service (DoS)

[,3.9.6)
  • H
Denial of Service (DoS)

[,2.6.17.1)
  • M
Integer Overflow or Wraparound

[,3.1.9)
  • M
Denial of Service (DoS)

[,2.2.4)
  • M
Out-of-Bounds

[,3.11.7)
  • H
Improper Input Validation

[,4.17.7)
  • M
Information Exposure

[,5.8.0)
  • M
Improper Initialization

[,5.12)
  • M
Denial of Service (DoS)

[,2.6.15)
  • H
Denial of Service (DoS)

[,2.6.34)
  • H
NULL Pointer Dereference

[,3.17.3)
  • H
Denial of Service (DoS)

[2.6_test9_cvs,2.6.17.4]
  • H
Out-of-bounds Write

[,2.6.36.2)
  • H
Resource Management Errors

[,2.6.30.1)
  • H
Access Restriction Bypass

[,3.18]
  • H
Out-of-Bounds

[,4.5.6)
  • M
Denial of Service (DoS)

[,2.6.16.21)
  • C
Out-of-bounds Write

[3.0,4.18)
  • M
Information Exposure

[,5.11.11)
  • M
Improper Input Validation

[,2.6.39)
  • M
Denial of Service (DoS)

[,3.11.5)
  • M
Improper Input Validation

[,2.6.38)
  • H
Cryptographic Issues

[,2.6.30)
  • M
Denial of Service (DoS)

[0,RHSA-2007-0672)
  • H
Out-of-bounds Write

[3.0.0,3.19.8][4.0.0,5.0)
  • M
Information Exposure

[,3.9.1)
  • M
Memory Leak

[2.6.0,5.0)
  • M
Race Condition

[4.4.0,4.4.221)[4.9.0,4.9.221)[4.14,4.14.178)[4.19,4.19.119)[5.0,5.3)
  • M
Information Exposure

[2.4.0,2.4.22]
  • H
Out-of-Bounds

[,5.9.0)
  • H
Race Condition

[,5.6.8)
  • M
Improper Access Control

[,4.10.9)
  • H
Denial of Service (DoS)

[,4.6.1)
  • M
Denial of Service (DoS)

[,4.8.16)
  • H
Denial of Service (DoS)

[,2.6.30.3)
  • H
Integer Overflow or Wraparound

[,4.6.1)
  • M
NULL Pointer Dereference

[,4.13)
  • L
Information Exposure

[,4.14.9)
  • H
Improper Access Control

[,3.10]
  • M
Information Exposure

[,4.4.2)
  • M
Out-of-bounds Write

[2.2.3,5.9.0)
  • M
Integer Underflow

[,4.10.4)
  • M
Information Exposure

[,2.6.39)
  • M
Out-of-Bounds

[,3.11.1)
  • H
Denial of Service (DoS)

[2.6.0,2.6.12]
  • H
Access Restriction Bypass

[3.10,3.18]
  • C
Use After Free

[4.19,4.19.38)[5.0,5.0.5)
  • M
Resource Management Errors

[,4.10.4)
  • M
Use After Free

[0,)
  • M
Memory Leak

[,5.3.12)
  • H
Out-of-Bounds

[,3.12.2)
  • M
Information Exposure

[,5.8.0)
  • H
Information Exposure

[,4.5.5)
  • H
Information Exposure

[,4.6.4)
  • M
NULL Pointer Dereference

[4.9,4.9.162)[4.14,4.14.105)[4.19,4.19.27)[4.20,4.20.14)
  • M
Resources Downloaded over Insecure Protocol

[,4.19.14)
  • H
Access Restriction Bypass

[,4.12.1)
  • M
Improper Input Validation

[,3.13.4)
  • M
Access Restriction Bypass

[,2.6.34)
  • H
Access Restriction Bypass

[,3.8.3)
  • M
Denial of Service (DoS)

[,4.15.10)
  • M
Information Exposure

[,4.14.5)
  • M
Access Restriction Bypass

[,3.8.6)
  • H
Out-of-Bounds

[,4.17.2)
  • H
Memory Leak

[,5.3.8)
  • H
Resource Management Errors

[,2.6.33.1)
  • M
Information Exposure

[3.10,3.18]
  • M
Incorrect Authorization

[,4.19.7)
  • M
Denial of Service (DoS)

[,3.10]
  • M
Information Exposure

[,3.1)
  • H
Denial of Service (DoS)

[,3.2.30)
  • M
Authentication Bypass

[,2.6.39)
  • H
Access Restriction Bypass

[,3.10]
  • M
Improper Input Validation

[,2.6.29.1)
  • M
Information Exposure

[,3.18.2)
  • H
Memory Leak

[5.1,5.3.9)
  • H
Improper Input Validation

[,4.6.4)
  • H
Use After Free

[,4.12.9)
  • M
Out-of-Bounds

[,3.8.6)
  • M
NULL Pointer Dereference

[,4.13.5)
  • H
Denial of Service (DoS)

[,2.6.31.4)
  • M
NULL Pointer Dereference

[,5.1.8)
  • H
Access Restriction Bypass

[,3.18]
  • H
Improper Input Validation

[,2.6.28)
  • M
Resource Management Errors

[,3.10.6)
  • M
Denial of Service (DoS)

[,2.6.15.6)
  • M
Information Exposure

[,4.7.1)
  • M
Denial of Service (DoS)

[,2.6.21_rc4]
  • M
CVE-2004-0949

[2.4.23_ow2,2.6.9]
  • M
Improper Input Validation

[,3.4.10)
  • H
Information Exposure

[,4.9.4)
  • M
Out-of-Bounds

[,4.13)
  • M
Information Exposure

[3.10,3.18]
  • M
Information Exposure

[,3.10]
  • M
Denial of Service (DoS)

[,3.15.2)
  • H
Resource Management Errors

[,2.6.23)
  • M
Access Restriction Bypass

[,3.18.5)
  • M
Denial of Service (DoS)

[,2.6.20)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Out-of-Bounds

[,2.6.28.1)
  • M
NULL Pointer Dereference

[,4.15.16)
  • M
Improper Input Validation

[,3.15.2)
  • H
Race Condition

[,2.6.28.1)
  • H
Access Restriction Bypass

[,3.10]
  • M
Denial of Service (DoS)

[2.6.0,2.6.18]
  • L
Race Condition

[,2.6.34.1)
  • M
Out-of-Bounds

[2.6.0,2.6.21]
  • M
Denial of Service (DoS)

[,3.1.8)
  • M
Denial of Service (DoS)

[,2.6.37)
  • M
Resource Management Errors

[,2.6.23)
  • H
Out-of-Bounds

[,2.6.30)
  • H
Out-of-bounds Write

[,5.12.8)
  • M
Denial of Service (DoS)

[,3.1)
  • M
Remote Code Execution (RCE)

[,5.10)
  • H
Integer Overflow or Wraparound

[,3.1.5)
  • M
Integer Overflow or Wraparound

[,4.11)
  • M
Insecure Encryption

[,5.1.7)
  • M
Denial of Service (DoS)

[,5.4.7)
  • H
Divide By Zero

[,3.2.1)
  • M
Resource Management Errors

[,2.6.22.6)
  • M
Denial of Service (DoS)

[,2.6.10)
  • M
Denial of Service (DoS)

[,3.1.1)
  • M
Denial of Service (DoS)

[,2.6.23)
  • H
Access Restriction Bypass

[,3.10]
  • M
Out-of-Bounds

[,2.6.29.4)
  • M
Resource Management Errors

[,2.6.34.1)
  • H
Race Condition

[,2.6.32)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Resource Management Errors

[,3.4.2)
  • H
Access Restriction Bypass

[,3.4]
  • M
Cross-site Scripting (XSS)

[,2.6.28.9)
  • M
Denial of Service (DoS)

[,2.6.0]
  • M
Race Condition

[,4.17.3)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Out-of-Bounds

[,4.10.4)
  • H
NULL Pointer Dereference

[0,)
  • H
NULL Pointer Dereference

[,2.6.36)
  • M
Integer Overflow or Wraparound

[,2.6.38.4)
  • M
Information Exposure

[,3.9.1)
  • H
CVE-2001-1398

[,2.2.20)
  • H
Denial of Service (DoS)

[0,4.9.5)
  • M
Denial of Service (DoS)

[,3.0)
  • M
Access Restriction Bypass

[,2.6.31.1)
  • M
Denial of Service (DoS)

[,4.0.5)
  • M
Denial of Service (DoS)

[,2.6.39.3)
  • L
Information Exposure

[,3.6)
  • M
Information Exposure

[,3.9.1)
  • M
Denial of Service (DoS)

[,2.6.37)
  • M
NULL Pointer Dereference

[,5.1.13)
  • M
NULL Pointer Dereference

[,3.12.8)
  • M
Resource Management Errors

[,2.6.28]
  • H
Denial of Service (DoS)

[,2.6)
  • M
Resource Management Errors

[,2.6.38.1)
  • M
Use After Free

[,5.9)
  • M
NULL Pointer Dereference

[,4.8.1)
  • M
Denial of Service (DoS)

[,2.6.11]
  • H
Out-of-bounds Write

[5.7,5.10.37)[5.11,5.11.21)[5.12,5.12.4)
  • M
NULL Pointer Dereference

[,5.1.8)
  • M
Information Exposure

[,3.9.1)
  • M
Out-of-Bounds

[,3.9.10)
  • M
Resource Management Errors

[,2.6.16.8)
  • H
Denial of Service (DoS)

[,5.0.4)
  • M
NULL Pointer Dereference

[,5.3.14)
  • H
Insecure Encryption

[4.1,4.20.10)[5.0,5.0.8)
  • H
Integer Overflow or Wraparound

[,4.8.12)
  • C
CVE-2006-1523

[,2.6.16]
  • M
Resource Management Errors

[,4.13)
  • M
Information Exposure

[,4.13.5)
  • H
Access Restriction Bypass

[,4.6.3)
  • M
Denial of Service (DoS)

[,5.9.0)
  • H
Access Restriction Bypass

[,4.11.6)
  • H
Integer Overflow or Wraparound

[3.0,4.0)
  • M
Race Condition

[,4.4)
  • H
Denial of Service (DoS)

[,3.1)
  • M
Use After Free

[,5.1.6)
  • M
Information Exposure

[,3.18]
  • M
Improper Input Validation

[,3.12.4)
  • H
Out-of-bounds Write

[,4.12.4)
  • H
Out-of-Bounds

[,4.0.6)
  • M
Access Restriction Bypass

[,2.6.39.4)
  • M
Denial of Service (DoS)

[,2.4.29)
  • M
Buffer Overflow

[,5.11.9)
  • M
Divide By Zero

[,4.13.12)
  • M
Information Exposure

[3.10,3.18]
  • M
Denial of Service (DoS)

[,3.12.6)
  • M
Resource Management Errors

[,3.16.2)
  • L
Denial of Service (DoS)

[,2.6.21)
  • M
Access Restriction Bypass

[,2.6.29.1)
  • M
Code

[,3.18.8)
  • H
Use After Free

[,5.1.6)
  • M
Divide By Zero

[,4.17.4)
  • L
CVE-2014-8134

[,3.18.1)
  • M
NULL Pointer Dereference

[,2.6.38)
  • L
Information Exposure

[,4.3.3)
  • H
Memory Leak

[,5.3.5)
  • H
Access Restriction Bypass

[,4.12)
  • H
CVE-2010-1162

[,2.6.34.1)
  • M
Improper Input Validation

[,2.6.39)
  • H
Out-of-Bounds

[,5.13.4)
  • M
Integer Overflow or Wraparound

[,4.12.11)
  • M
Resource Management Errors

[,5.2.3)
  • M
Information Exposure

[3.10,3.18]
  • M
Out-of-Bounds

[,3.2)
  • M
NULL Pointer Dereference

[,5.2.3)
  • M
Denial of Service (DoS)

[,2.6.23)
  • M
Denial of Service (DoS)

[2.6_test9_cvs,2.6.7]
  • H
Out-of-Bounds

[,2.6.8.1)
  • H
Race Condition

[,5.0.10)
  • H
Out-of-bounds Read

[,4.10.7)
  • M
Out-of-bounds Read

[,4.17.4)
  • H
Integer Overflow or Wraparound

[,5.7.2)
  • M
Denial of Service (DoS)

[,4.4.9)
  • M
Access Restriction Bypass

[2.6_test9_cvs,2.6.12]
  • H
NULL Pointer Dereference

[0,)
  • H
Memory Leak

[,5.0.1)
  • H
CVE-2010-2537

[,2.6.35)
  • M
Divide By Zero

[,4.13.12)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Denial of Service (DoS)

[2.1,2.3.0]
  • M
Resource Management Errors

[,2.6.32.1)
  • M
Denial of Service (DoS)

[,3.12.1)
  • H
Denial of Service (DoS)

[,2.6.23.10)
  • M
NULL Pointer Dereference

[,4.13.12)
  • M
Improper Access Control

[,4.8.7)
  • H
Remote Code Execution (RCE)

[,2.6.27.52)
  • M
Improper Input Validation

[,4.13)
  • H
NULL Pointer Dereference

[,2.6.38)
  • H
Access Restriction Bypass

[3.10,3.18]
  • C
Out-of-Bounds

[3.18.0,4.12.8]
  • M
Denial of Service (DoS)

[,2.6.9]
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Improper Input Validation

[,4.8.11)
  • M
Information Exposure

[0,5.13)
  • M
NULL Pointer Dereference

[,4.13.2)
  • H
Access Restriction Bypass

[4.4.22,4.4.28]
  • H
Arbitrary Code Execution

[2.2.7,2.6.10]
  • M
Out-of-Bounds

[2.6.18,2.6.33]
  • M
Out-of-Bounds

[,2.6.28.5)
  • L
Race Condition

[,5.7.3)
  • H
Denial of Service (DoS)

[,3.16.3)
  • M
Resource Management Errors

[,2.6.18)
  • M
Resource Management Errors

[,4.4.9)
  • M
Out-of-Bounds

[2.6.28-rc1,2.6.31-rc10]
  • M
Information Exposure

[3.10,3.18]
  • M
Race Condition

[4.16,)
  • M
Denial of Service (DoS)

[0,)
  • M
Improper Input Validation

[,2.6.39.4)
  • M
Race Condition

[,3.14.6)
  • H
Race Condition

[,4.14.14)
  • H
Access Restriction Bypass

[,3.10]
  • H
Out-of-Bounds

[,2.6.39)
  • M
Insecure Randomness

[,4.16.1)
  • M
Use After Free

[,3.15.2)
  • H
Double Free

[,4.4.0)
  • H
Integer Overflow or Wraparound

[,2.6.33.7)
  • H
Denial of Service (DoS)

[,2.6.16)
  • M
Information Exposure

[,4.18.6)
  • H
Improper Authentication

[,2.6.31.2)
  • M
Denial of Service (DoS)

[,4.4.2)
  • M
Information Exposure

[,3.0.35)
  • H
Out-of-Bounds

[,2.6.16.17)
  • M
Resource Management Errors

[,2.6.27.9)
  • H
Improper Input Validation

[,3.5.5)
  • M
Improper Input Validation

[,2.6.31.1)
  • M
NULL Pointer Dereference

[,4.18)
  • M
Denial of Service (DoS)

[,5.11.4)
  • M
Race Condition

[,5.9.4)
  • H
Access Restriction Bypass

[,3.10]
  • M
Information Exposure

[,3.18]
  • M
Information Exposure

[,3.18]
  • M
NULL Pointer Dereference

[4.1.0,4.1.49)[4.4.0,4.4.107)[4.9.0,4.9.71)[4.14.0,4.14.8)
  • H
Access Restriction Bypass

[,4.1.6)
  • H
Improper Input Validation

[,4.15)
  • M
Denial of Service (DoS)

[,2.6.0]
  • M
Denial of Service (DoS)

[4.18,)
  • M
Information Exposure

[,3.14.5)
  • M
Integer Overflow or Wraparound

[2.6.0,4.1.0)
  • M
Memory Leak

[2.4.0,2.5.0)[2.6.0,2.6.31.1)
  • M
NULL Pointer Dereference

[,3.2.10)
  • H
Double Free

[,4.11)
  • M
CVE-2003-0476

[,2.4.0]
  • M
Integer Overflow or Wraparound

[,2.6.25.9)
  • H
Out-of-Bounds

[,2.6.24)
  • C
Improper Data Handling

[,4.5.2)
  • M
Use After Free

[,5.2.3)
  • H
Improper Authentication

[,2.6.26)
  • L
Denial of Service (DoS)

[2.4.23_ow2,2.6.2]
  • H
Denial of Service (DoS)

[,3.11.8)
  • M
Denial of Service (DoS)

[,2.6.0]
  • M
Denial of Service (DoS)

[2.2.12,2.3.99]
  • M
Denial of Service (DoS)

[,4.4)
  • M
Memory Leak

[,5.0.3)
  • H
NULL Pointer Dereference

[,4.20.15)
  • M
NULL Pointer Dereference

[,5.0.6)
  • H
CVE-1999-1166

[,2.0.37]
  • M
Improper Input Validation

[2.6.22,2.6.24]
  • M
NULL Pointer Dereference

[,3.15.10)
  • H
Out-of-Bounds

[,3.4.5)
  • H
Improper Check for Unusual or Exceptional Conditions

[2.6.32,4.15)
  • H
Integer Underflow

[0,)
  • H
Use After Free

[,5.11.12)
  • M
Denial of Service (DoS)

[0,RHSA-2006-0493)
  • M
Resource Management Errors

[,4.4)
  • M
Information Exposure

[,5.8.0)
  • M
Information Exposure

[3.10,3.18]
  • M
Privilege Escalation

[,2.6.29.6)
  • H
Buffer Overflow

[,5.12.13)
  • M
Improper Input Validation

[,3.7.6)
  • M
Denial of Service (DoS)

[,2.4.17)
  • M
Out-of-Bounds

[2.6.18,3.8]
  • M
Denial of Service (DoS)

[,2.6.14]
  • M
Denial of Service (DoS)

[,4.2.4)
  • H
CVE-2004-0495

[2.4.18,2.6.7]
  • M
Use After Free

[,5.2.10)
  • L
Information Exposure

[,3.6)
  • H
Use After Free

[,5.6)
  • M
Resource Management Errors

[,2.6.39)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Privilege Escalation

[,5.11.7)
  • M
Resource Management Errors

[,3.18.1)
  • M
Denial of Service (DoS)

[,2.6.29)
  • M
Denial of Service (DoS)

[,3.7.5)
  • H
Use After Free

[,4.14.16)
  • M
Resource Management Errors

[,3.10.4)
  • M
Out-of-bounds Read

[,5.8.15)
  • H
Race Condition

[,5.1.9)
  • M
Denial of Service (DoS)

[,2.6.15)
  • M
Information Exposure

[2.4.0,2.6.0]
  • M
Denial of Service (DoS)

[2.4.0,2.4.5]
  • H
Use After Free

[,5.8.17)
  • C
Denial of Service (DoS)

[,2.6.0]
  • H
Resource Management Errors

[,4.9.6)
  • M
Use After Free

[0,)
  • M
Incorrect Comparison

[,4.18)
  • M
CVE-2004-0415

[2.4.23_ow2,2.6.7]
  • M
Resource Management Errors

[2.6,2.6.28.8]
  • C
Integer Overflow or Wraparound

[4.4,4.4.180)[4.9,4.9.172)[4.14,4.14.115)[4.19,4.19.38)[5.0,5.0.11)
  • M
Out-of-Bounds

[,3.11.1)
  • H
Improper Input Validation

[,2.6.16.17)
  • M
Out-of-Bounds

[5.5,5.5.7)
  • M
Denial of Service (DoS)

[,2.4.31)[2.6.0,2.6.6)
  • M
Use After Free

[,5.2)
  • M
Denial of Service (DoS)

[,2.6.0]
  • M
Information Exposure

[,2.6.31)
  • H
Out-of-Bounds

[,4.8.12)
  • H
Race Condition

[,3.7.5)
  • H
Improper Input Validation

[,4.4]
  • M
Denial of Service (DoS)

[,2.6.39)
  • H
Improper Verification of Cryptographic Signature

[4.15,5.12.14)
  • M
Race Condition

[,5.13)
  • H
Access Restriction Bypass

[,3.18]
  • M
Denial of Service (DoS)

[,4.0.3)
  • H
Improper Access Control

[,3.10]
  • M
Denial of Service (DoS)

[,2.4.20]
  • H
Insecure Default

[0,)
  • M
Denial of Service (DoS)

[,2.6.11.12)
  • M
Information Exposure

[,2.6.11.7)
  • H
Out-of-bounds Write

[2.6.32,4.13.2)
  • M
Missing Initialization of Resource

[,2.6.37)
  • H
Out-of-Bounds

[,2.6.32)
  • M
Improper Input Validation

[,2.6.31.2)
  • M
Information Exposure

[,4.4.33)
  • M
Information Exposure

[,5.3.10)
  • H
Resource Management Errors

[,3.16.3)
  • M
NULL Pointer Dereference

[,5.0.9)
  • M
NULL Pointer Dereference

[3.1,3.2)[4.3.0,4.4.0)
  • M
Out-of-bounds Read

[4.1.0,4.1.49)[4.4.0,4.4.108)[4.9.0,4.9.72)[4.14.0,4.14.9)
  • H
Denial of Service (DoS)

[,2.6.12.1)
  • H
Race Condition

[,3.19.6)
  • M
Access Restriction Bypass

[,3.12.2)
  • M
Cryptographic Issues

[,3.13.7)
  • M
NULL Pointer Dereference

[,5.2)
  • M
NULL Pointer Dereference

[,5.11.3)
  • M
Information Exposure

[3.10,3.18]
  • M
Denial of Service (DoS)

[,2.6.34)
  • M
Denial of Service (DoS)

[2.6.8.1,2.6.10]
  • M
Out-of-bounds Write

[,4.14.6)
  • H
Race Condition

[,4.6.3)
  • M
Denial of Service (DoS)

[,3.3.5)
  • M
Improper Action Name Cleanup

[,5.10.6)
  • M
Resource Management Errors

[,2.6.33.2)
  • H
Access Restriction Bypass

[,4.11.5]
  • M
Improper Input Validation

[,2.6.23)
  • M
Out-of-Bounds

[,4.13.5)
  • H
Out-of-Bounds

[,3.13.6)
  • H
Denial of Service (DoS)

[3.0.0,4.0)
  • M
Improper Input Validation

[,3.12.4)
  • H
Arbitrary Command Injection

[,5.11.13)
  • H
Access Restriction Bypass

[,3.18]
  • H
Out-of-Bounds

[,3.16.2)
  • M
Information Exposure

[,2.6.30.5)
  • M
Security Features

[,4.18.1)
  • M
Use After Free

[4.13,4.16.12)
  • H
Access Restriction Bypass

[,3.18.1)
  • H
Race Condition

[,4.14.7)
  • M
Information Exposure

[,2.6.39.3)
  • M
Denial of Service (DoS)

[,2.6.16)
  • M
Information Exposure

[,2.6.38)
  • M
Insecure Default

[,5.8.2)
  • H
Integer Overflow or Wraparound

[,4.10.7)
  • M
Information Exposure

[3.10,3.18]
  • H
Out-of-bounds Read

[,5.3.14)
  • M
Denial of Service (DoS)

[,4.5)
  • M
Denial of Service (DoS)

[2.6.0,2.6.23)
  • M
Denial of Service (DoS)

[,2.2.20)
  • M
Denial of Service (DoS)

[,4.19.19)[4.20.0,4.20.6)
  • M
Use After Free

[,4.13.8)
  • M
Access Restriction Bypass

[,2.6.34.1)
  • M
Out-of-Bounds

[,4.6.1)
  • M
Information Exposure

[,3.10]
  • H
Access Restriction Bypass

[,2.6.32.1)
  • M
Access Restriction Bypass

[,3.3.4)
  • H
Out-of-bounds Write

[5.8,5.10.37)[5.11,5.11.21)[5.12,5.12.4)
  • M
Integer Overflow or Wraparound

[,3.14.4)
  • M
Use After Free

[,4.14.11)
  • H
Directory Traversal

[0,)
  • M
Information Exposure

[,2.6.36)
  • L
Access Restriction Bypass

[,2.6.33)
  • M
CVE-2006-0557

[,2.6.17)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Out-of-Bounds

[,3.17.4)
  • H
Improper Access Control

[3.10,3.18]
  • M
Denial of Service (DoS)

[,2.6.33)
  • M
Denial of Service (DoS)

[,2.6.20.13)[2.6.21,2.6.21.4)
  • L
Information Exposure

[,2.6.36.2)
  • M
Information Exposure

[,4.0.3)
  • M
Race Condition

[,2.6.16]
  • H
Improper Access Control

[3.10,3.18]
  • M
Resource Management Errors

[,2.6.18]
  • M
Use After Free

[,4.13.4)
  • M
Memory Leak

[,5.3.11)
  • H
Denial of Service (DoS)

[2.0.0,2.0.39][2.1.0,2.2.0)
  • H
Out-of-bounds Write

[,5.13.6)
  • M
Use After Free

[,5.9.14)
  • H
Out-of-Bounds

[,2.6.32.1)
  • C
Denial of Service (DoS)

[,4.10.14)
  • M
Use of Uninitialized Resource

[,5.1.3)
  • M
Denial of Service (DoS)

[0,RHSA-2007-0774)
  • M
Resource Management Errors

[,3.16.4)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Use After Free

[0,)
  • C
Buffer Overflow

[,2.4.20)
  • H
Denial of Service (DoS)

[,3.7.5)
  • C
Double Free

[,4.7)
  • H
Access Restriction Bypass

[,2.6.39.4)
  • M
Improper Input Validation

[,4.8.12)
  • M
Improper Authorization

[,4.8.3)
  • M
Resource Management Errors

[,2.6.24]
  • M
Insertion of Sensitive Information into Log File

[,4.15.1)
  • H
Out-of-bounds Write

[0,)
  • H
Out-of-Bounds

[,3.1)
  • M
Race Condition

[,4.4)
  • H
Out-of-Bounds

[,3.16.3)
  • M
Use After Free

[,5.5.3)
  • L
User Enumeration

[,5.12.2)
  • H
Improper Access Control

[4.4.111,4.4.120)[4.9.76,4.9.86)[4.14.8,4.14.24)[4.15.1,4.15.8)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Information Exposure

[,2.6.39)
  • H
NULL Pointer Dereference

[,4.12.4)
  • M
Resource Management Errors

[,2.6.32.1)
  • M
Arbitrary Code Execution

[,2.0.10)
  • L
Information Exposure

[,2.6.36.2)
  • M
Denial of Service (DoS)

[,3.17.2)
  • M
NULL Pointer Dereference

[0,)
  • M
Information Exposure

[,4.12.9)
  • M
Out-of-Bounds

[,4.13.6)
  • M
Denial of Service (DoS)

[2.6.11_rc1_bk6,2.6.18]
  • H
Denial of Service (DoS)

[,2.6.27)
  • H
Improper Input Validation

[3.0.0,3.16.2)
  • M
Use After Free

[,5.3.7)
  • H
Out-of-bounds Read

[,4.20)
  • M
Denial of Service (DoS)

[,3.6)
  • M
Information Exposure

[3.10,3.18]
  • M
Information Exposure

[,2.6.36)
  • M
Information Exposure

[3.10,3.18]
  • H
Arbitrary Code Execution

[,5.14.7)
  • M
Integer Overflow or Wraparound

[,2.6.36)
  • H
Resource Management Errors

[,2.6.19]
  • M
CVE-2004-1073

[2.4.23_ow2,2.6.9]
  • H
Information Exposure

[2.6_test9_cvs,2.6.16]
  • M
Denial of Service (DoS)

[,2.6.39)
  • M
Code

[,4.0.6)
  • C
Out-of-Bounds

[,4.1.4)
  • M
Denial of Service (DoS)

[2.2.13,2.4.19]
  • M
NULL Pointer Dereference

[,5.12.10)
  • H
Access Restriction Bypass

[,3.12.10)
  • M
Denial of Service (DoS)

[,2.6.10)
  • C
Denial of Service (DoS)

[,4.4.9)
  • M
Cryptographic Issues

[,3.12.1)
  • H
Resource Management Errors

[,2.6.15]
  • M
Information Exposure

[,3.10]
  • H
Access Restriction Bypass

[,3.18)
  • H
Use After Free

[,3.18.53)
  • M
Information Exposure

[0,)
  • M
Out-of-Bounds

[,3.11.5)
  • H
Buffer Overflow

[2.4.0,2.4.24]
  • M
Use After Free

[0,)
  • H
Memory Leak

[,5.3.10)
  • M
Information Exposure

[,3.10]
  • C
Denial of Service (DoS)

[,3.18.8)
  • H
Improper Input Validation

[,3.12.6)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Out-of-bounds Read

[,4.17.4)
  • H
CVE-2005-1264

[2.6_test9_cvs,2.6.9]
  • M
Denial of Service (DoS)

[2.6.17,2.6.18]
  • M
CVE-2005-2801

[,2.6.0]
  • H
Access Restriction Bypass

[,4.9.5)
  • H
Out-of-bounds Read

[,4.10.1)
  • H
Resource Management Errors

[,2.6.23)
  • M
Information Exposure

[,3.18]
  • M
Improper Input Validation

[3.0,3.10.3]
  • M
Denial of Service (DoS)

[2.4.18,2.6.7]
  • M
Out-of-bounds Write

[,5.6.7)
  • H
Use After Free

[,4.19.7)
  • M
Resource Management Errors

[,4.2.4)
  • M
Improper Input Validation

[,2.6.25.9)
  • H
Improper Data Handling

[,3.14.6)
  • H
NULL Pointer Dereference

[0,)
  • M
Information Exposure

[,3.19.3)
  • H
Out-of-bounds Read

[,5.12)
  • M
Memory Leak

[,5.1)
  • M
Access Restriction Bypass

[,2.4.35.3)
  • H
Use of Externally-Controlled Format String

[,3.9.5)
  • H
Denial of Service (DoS)

[,2.6.32.1)
  • M
Cryptographic Issues

[,2.6.32.1)
  • L
Information Exposure

[,3.6)
  • M
Denial of Service (DoS)

[,5.3.18)
  • H
Out-of-bounds Read

[,5.0.19)
  • M
Access Restriction Bypass

[,3.1.10)
  • M
Resource Management Errors

[,2.6.31.1)
  • H
Out-of-bounds Read

[,4.11.8)
  • H
Resource Management Errors

[,3.2.24)
  • M
Authentication Bypass

[,2.6.23)
  • H
Out-of-bounds Write

[,5.5.4)
  • L
Access Restriction Bypass

[,2.6.18]
  • M
Improper Input Validation

[,4.11.4)
  • M
Access Restriction Bypass

[,2.6.39.4)
  • M
NULL Pointer Dereference

[,4.13.11)
  • H
Out-of-Bounds

[,3.3.1)
  • M
Use After Free

[,5.3.9)
  • H
Privilege Escalation

[,2.6.36.2)
  • M
NULL Pointer Dereference

[,2.6.36.2)
  • M
Use After Free

[,5.10)
  • M
Denial of Service (DoS)

[,2.0.34]
  • M
CVE-2010-2066

[,2.6.35)
  • M
Denial of Service (DoS)

[,2.6.39)
  • M
NULL Pointer Dereference

[,5.2.10)
  • H
Integer Overflow or Wraparound

[5.0,5.0.17)
  • M
Denial of Service (DoS)

[,4.5)
  • M
Information Exposure

[,2.6.35.5)
  • H
Access Restriction Bypass

[3.0.0,3.18.67)[4.0.0,5.0)
  • H
Access Restriction Bypass

[,3.19.3)
  • M
Denial of Service (DoS)

[,3.3.2)
  • H
Denial of Service (DoS)

[2.4.23_ow2,2.6.3]
  • H
Race Condition

[,5.13.14)
  • M
NULL Pointer Dereference

[,4.10.16)
  • M
Denial of Service (DoS)

[,2.6.37.3)
  • C
NULL Pointer Dereference

[3.0,4.0)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Denial of Service (DoS)

[,2.6.15)
  • H
Denial of Service (DoS)

[,3.8.4)
  • M
Resource Management Errors

[,2.6.8]
  • M
Denial of Service (DoS)

[,4.2.3)
  • H
Denial of Service (DoS)

[2.6.11_rc1_bk6,2.6.15.5]
  • M
Improper Input Validation

[2.6.16.1,2.6.17]
  • M
Information Exposure

[,3.14.6)
  • L
Improper Input Validation

[,5.3.3)
  • M
Information Exposure

[,3.9.1)
  • H
Improper Input Validation

[,4.1.4)
  • M
Improper Input Validation

[,4.14.9)
  • M
Race Condition

[,5.8.8)
  • M
Denial of Service (DoS)

[,2.6.18]
  • H
Access Restriction Bypass

[,3.7.6)
  • H
Improper Check for Unusual or Exceptional Conditions

[,3.14.4)
  • M
Denial of Service (DoS)

[,3.7.2)
  • M
Denial of Service (DoS)

[,5.9.4)
  • M
Resource Management Errors

[,2.6.9]
  • H
Use After Free

[,4.5.3)
  • H
Access Restriction Bypass

[,3.10]
  • M
Race Condition

[,4.3.4)
  • M
Denial of Service (DoS)

[2.2.1,2.2.20)[2.4.1,2.4.12)
  • M
Information Exposure

[,3.10]
  • H
Denial of Service (DoS)

[,4.4)
  • H
Access Restriction Bypass

[,2.6.17)
  • H
Use After Free

[,4.6)
  • M
CVE-2001-0316

[2.2.0,2.4.0]
  • H
Access Restriction Bypass

[,4.4.0)
  • M
Information Exposure

[,3.18]
  • M
Improper Input Validation

[,3.0)
  • H
Access Restriction Bypass

[,4.3.3)
  • M
Denial of Service (DoS)

[,2.6.32.1)
  • M
Access Restriction Bypass

[,3.8.6)
  • M
Out-of-Bounds

[,4.13.6)
  • M
Denial of Service (DoS)

[,3.12.2)
  • L
CVE-2004-1058

[2.6_test9_cvs,2.6.10]
  • M
NULL Pointer Dereference

[,5.1.17)
  • H
NULL Pointer Dereference

[,2.6.34)
  • C
Improper Input Validation

[3.0,4.0)
  • H
Out-of-Bounds

[,2.6.25.11)
  • M
Information Exposure

[,3.15.2)
  • H
Out-of-bounds Write

[,4.14.14)
  • M
Denial of Service (DoS)

[2.4.23_ow2,2.6.9]
  • H
Operation on a Resource after Expiration or Release

[5.7.0,5.8.7)
  • H
Out-of-bounds Write

[,2.6.37)
  • H
Use After Free

[4.9.0,4.9.233)[4.14,4.14.194)[4.19,4.19.140)
  • H
Access Restriction Bypass

[,3.10]
  • M
Denial of Service (DoS)

[,2.6.15)
  • H
Use After Free

[,4.14.4)
  • H
Improper Access Control

[,3.10]
  • M
Information Exposure

[,4.3.3)
  • M
Improper Input Validation

[,2.6.35.2)
  • M
NULL Pointer Dereference

[,4.13.8)
  • M
CVE-2005-2873

[2.6_test9_cvs,2.6.12]
  • M
Resource Management Errors

[,4.0.6)
  • M
Resource Management Errors

[,4.0.2)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Access Restriction Bypass

[2.4.0,2.4.3]
  • M
Improper Input Validation

[2.6.20,2.6.21]
  • M
Access Restriction Bypass

[,3.8.1)
  • M
Resource Management Errors

[,2.6.15.3)
  • H
Race Condition

[,4.7)
  • H
Access Restriction Bypass

[,4.11.1)
  • M
Out-of-bounds Read

[,4.17.4)
  • L
Information Exposure

[,2.6.37)
  • M
CVE-2021-27363

[,5.11.4)
  • H
Access Restriction Bypass

[,3.10]
  • H
Resource Management Errors

[2.4.23_ow2,2.6.18.8]
  • M
Improper Input Validation

[,2.6.36.2)
  • M
CVE-2005-0180

[2.6_test9_cvs,2.6.12]
  • M
Integer Overflow or Wraparound

[,2.6.36)
  • M
Use After Free

[,2.6.33)
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Missing Initialization of Resource

[2.4.0,2.4.37.6)[2.6.0,2.6.31)
  • M
CVE-2001-0851

[2.0,2.4.0]
  • M
Resource Management Errors

[2.6.0,2.6.18]
  • M
NULL Pointer Dereference

[,4.19.3)
  • H
Race Condition

[2.0.0,4.8.3)
  • H
Type Confusion

[0,)
  • M
Access Restriction Bypass

[,2.6.33.1)
  • M
Access Restriction Bypass

[,2.6.28.1)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Access Restriction Bypass

[,2.6.39)
  • M
Race Condition

[,4.5)
  • M
Information Exposure

[0,kernel-5.4-rc6)
  • H
Access Restriction Bypass

[,3.18]
  • H
Out-of-bounds Write

[2.6.27,3.15.10][3.16,3.16.74)[4.4,4.4.194)[4.9,4.9.194)[4.14,4.14.146)[4.19,4.19.75)[5.2,5.2.17)[5.3,5.3.1)
  • M
Denial of Service (DoS)

[,3.2.2)
  • M
Access Restriction Bypass

[,3.12.8)
  • M
Information Exposure

[,4.13)
  • H
Improper Input Validation

[,5.10.10)
  • H
Out-of-Bounds

[5.5.0,5.5.14)
  • M
Denial of Service (DoS)

[,2.6.23)
  • H
CVE-2004-0077

[2.6_test9_cvs,2.6.2]
  • M
Information Exposure

[,2.6.31.4)
  • M
Memory Leak

[,5.3.12)
  • H
Out-of-Bounds

[,2.6.32]
  • M
Improper Input Validation

[,3.12.4)
  • M
Improper Access Control

[,4.5.5)
  • M
Out-of-bounds Read

[,5.2.3)
  • M
Improper Input Validation

[2.6.8,2.6.14]
  • M
Denial of Service (DoS)

[,2.6.0]
  • M
Buffer Overflow

[,2.6.27)
  • H
Improper Access Control

[,3.10]
  • M
Out-of-Bounds

[,4.4)
  • M
NULL Pointer Dereference

[3.0,4.18.0)[5.0,5.4)
  • M
Resource Management Errors

[,2.6.21)
  • M
Improper Input Validation

[,2.6.29)
  • H
Access Restriction Bypass

[,4.16)
  • M
CVE-1999-1352

[,2.2.0]
  • M
Denial of Service (DoS)

[,3.9.5)
  • H
Denial of Service (DoS)

[,2.6.12.1)
  • H
Access Restriction Bypass

[,2.6.25)
  • H
Out-of-bounds Write

[3.0,4.0)
  • M
Memory Leak

[,5.3.11)
  • H
Access Restriction Bypass

[,3.2.2)
  • H
Denial of Service (DoS)

[2.6.20,2.6.20.2]
  • M
Information Exposure

[,2.6.32.4)
  • H
Out-of-Bounds

[,4.14.9)
  • M
Resource Management Errors

[,2.4.33.7)
  • M
Denial of Service (DoS)

[,2.6.33.1)
  • M
Improper Access Control

[,4.0.2)
  • M
Improper Input Validation

[,2.6.39)
  • H
Directory Traversal

[,4.13.6)
  • H
Out-of-Bounds

[,2.6.23]
  • M
Improper Input Validation

[,3.18.3)
  • M
Access Restriction Bypass

[,4.8)
  • L
Information Exposure

[,2.6.15]
  • H
Out-of-Bounds

[,3.19.3)
  • H
Out-of-Bounds

[,2.6.30.4)
  • H
Denial of Service (DoS)

[2.4.23_ow2,2.6.9]
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
CVE-2004-0228

[,2.6.0]
  • H
Race Condition

[2.6.17,2.6.17.6]
  • H
Out-of-Bounds

[,3.18.1)
  • H
Out-of-Bounds

[,2.6.35.5)
  • M
Denial of Service (DoS)

[0,RHSA-2007-0705)
  • M
NULL Pointer Dereference

[0,)
  • M
Information Exposure

[0,3.14-rc4)
  • M
Information Exposure

[,3.0.44)
  • M
Improper Data Handling

[,4.8.3)
  • M
Off-by-one Error

[,2.6.27)
  • M
Denial of Service (DoS)

[2.6.29.rc2-git1,2.6.30.9]
  • M
Denial of Service (DoS)

[2.6_test9_cvs,2.6.19]
  • L
Denial of Service (DoS)

[,2.4.32)[2.6.0,2.6.13)
  • M
Information Exposure

[,3.11.8)
  • H
Improper Access Control

[,3.10]
  • H
Out-of-Bounds

[,4.14.8)
  • M
Resource Management Errors

[,2.6.32.1)
  • C
Out-of-bounds Write

[,4.17.3)
  • M
Access Restriction Bypass

[,3.0.45)
  • H
Access Restriction Bypass

[,3.10]
  • H
NULL Pointer Dereference

[,4.4.0)
  • H
Improper Input Validation

[,2.6.36)
  • M
Integer Underflow

[,2.6.37)
  • M
Buffer Overflow

[,2.6.39.4)
  • L
Information Exposure

[,3.6)
  • H
Use After Free

[,4.18)
  • H
Out-of-Bounds

[,2.6.36.1)
  • M
Denial of Service (DoS)

[2.4.23_ow2,2.6.10]
  • M
Resource Management Errors

[,4.5.2)
  • M
Improper Input Validation

[,3.11.5)
  • M
Improper Input Validation

[,3.11.1)
  • M
Denial of Service (DoS)

[,2.4.0]
  • M
NULL Pointer Dereference

[,4.15.16)
  • H
Out-of-Bounds

[,4.6.4)
  • M
Improper Input Validation

[,3.12.4)
  • M
Incorrect Authorization

[4.16,)
  • H
Access Restriction Bypass

[,3.0.0)
  • H
Out-of-Bounds

[,2.6.32.1)
  • H
Race Condition

[,5.12.3)
  • L
Resource Management Errors

[,3.8.4)
  • M
Information Exposure

[,2.6.37)
  • H
Use After Free

[4.10,4.14.103)[4.19,4.19.25)[4.20,4.20.12)
  • H
Access Restriction Bypass

[,2.6.33.3)
  • M
Access Restriction Bypass

[,3.17.4)
  • M
Denial of Service (DoS)

[,3.16.35)
  • H
Out-of-Bounds

[,3.7.2)
  • M
Information Exposure

[,2.6.35)
  • M
User Enumeration

[,5.13.8)
  • M
Denial of Service (DoS)

[,2.6.37)
  • H
Memory Leak

[3.17,3.18.137)[4.4,4.4.177)[4.9,4.9.164)[4.14,4.14.107)[4.19,4.19.30)[4.20,4.20.17)[5.0,5.0.3)
  • H
Cross-site Scripting (XSS)

[,2.6.31.1)
  • L
Information Exposure

[,2.6.15.5)
  • H
Privilege Escalation

[,3.14.6)
  • H
Improper Data Handling

[,3.15.1)
  • M
Information Exposure

[,2.6.26)
  • H
Memory Leak

[4.7,4.9.163)[4.14,4.14.106)[4.19,4.19.28)[4.20,4.20.15)[5.0,5.0.1)
  • M
Improper Input Validation

[,4.13.1)
  • H
Improper Access Control

[3.10,3.18]
  • H
Denial of Service (DoS)

[2.4.23_ow2,2.6.9]
  • M
Memory Leak

[,5.8.10)
  • C
Out-of-Bounds

[,2.6.16)
  • M
Race Condition

[,4.6.7)
  • H
Access Restriction Bypass

[,3.10]
  • H
Denial of Service (DoS)

[,4.0.6)
  • L
Resource Management Errors

[,3.11.7)
  • M
Resource Management Errors

[,3.12.4)
  • M
Race Condition

[,3.13.7)
  • H
Improper Data Handling

[,4.11.2)
  • H
Improper Validation of Array Index

[,4.12.4)
  • M
Improper Input Validation

[,4.2.7)
  • H
Integer Overflow or Wraparound

[,4.12)
  • M
Error Handling

[,4.13.12)
  • M
Information Exposure

[,5.6.5)
  • H
NULL Pointer Dereference

[,5.6.1)
  • M
Denial of Service (DoS)

[,3.3.5)
  • H
Denial of Service (DoS)

[,2.6.32.4)
  • M
Improper Input Validation

[,2.6.16.5)
  • M
Denial of Service (DoS)

[2.6_test9_cvs,2.6.10]
  • M
Information Exposure

[,2.6.39)
  • M
Memory Leak

[,5.11.11)
  • M
Information Exposure

[,5.2.9)
  • H
Out-of-bounds Write

[,4.12)
  • M
Information Exposure

[,2.6.37)
  • M
Denial of Service (DoS)

[,2.4.0]
  • M
Information Exposure

[3.10,3.18]
  • H
NULL Pointer Dereference

[,2.6.35.4)
  • H
NULL Pointer Dereference

[,2.6.39.1)
  • M
Improper Input Validation

[,4.11.4)
  • H
CVE-2004-1144

[,2.4.0]
  • H
Improper Input Validation

[,2.6.26)
  • M
Denial of Service (DoS)

[,2.6.0]
  • M
NULL Pointer Dereference

[,2.6.32.4)
  • M
Out-of-Bounds

[,2.6.18]
  • M
Information Exposure

[,4.0.2)
  • H
Use After Free

[,5.1.2)
  • M
Information Exposure

[,4.6.4)
  • H
Double Free

[,4.14.11)
  • H
Use After Free

[,4.19.21)[4.19.22,4.20.8)
  • M
Use After Free

[,5.5.3)
  • H
Out-of-Bounds

[,2.6.37)
  • H
Resource Management Errors

[,4.9.6)
  • H
CVE-2003-0127

[,2.2.25)[2.4.0,2.4.21)
  • M
Information Exposure

[,2.4.34.3)
  • H
Denial of Service (DoS)

[,5.1)
  • M
Denial of Service (DoS)

[,2.6.39.4)
  • M
Information Exposure

[,3.0.45)
  • M
Buffer Overflow

[,5.5.10)
  • L
Information Exposure

[,2.6.27.53)[2.6.32,2.6.32.21)[2.6.34,2.6.34.6)[2.6.35,2.6.35.4)
  • M
Access Restriction Bypass

[,3.8.9)
  • H
Out-of-bounds Write

[,5.3)
  • M
Out-of-Bounds

[,2.6.37)
  • H
Denial of Service (DoS)

[,2.6.36)
  • M
Information Exposure

[,3.11.7)
  • H
Buffer Overflow

[,2.6.39)
  • H
Improper Validation of Array Index

[,4.11.3)
  • H
Access Restriction Bypass

[,4.8.14)
  • H
Out-of-bounds Write

[3.10,3.11)[4.14,4.14.82)[4.18,4.18.20)
  • H
Integer Overflow or Wraparound

[,2.6.38.5)
  • M
Error Handling

[,4.9.7)
  • M
Denial of Service (DoS)

[,2.6.22)
  • M
Denial of Service (DoS)

[,3.18.2)
  • H
Memory Leak

[4.20,5.3.16)[5.4,5.4.3)
  • H
Improper Access Control

[,3.18]
  • H
Access Restriction Bypass

[,3.10]
  • H
Deserialization of Untrusted Data

[2.4.23_ow2,2.4.27]
  • H
Remote Code Execution (RCE)

[,2.6.25.2)
  • M
Access Restriction Bypass

[,3.14.2)
  • M
Improper Data Handling

[,2.6.19)
  • M
Resource Management Errors

[,2.6.19)
  • M
Improper Input Validation

[,3.2.10)
  • M
NULL Pointer Dereference

[,4.18)
  • M
Information Exposure

[,2.5.0)[2.6.0,2.6.32)
  • L
Resource Management Errors

[,3.12.8)
  • M
Integer Overflow or Wraparound

[,5.6.5)
  • M
Denial of Service (DoS)

[,2.6.12.5)
  • H
Improper Authorization

[,3.18]
  • M
Resource Management Errors

[,2.6.20)
  • H
Improper Input Validation

[,2.6.32)
  • M
CVE-2006-5871

[,2.4.34)
  • H
Race Condition

[,3.13.7)
  • H
Improper Input Validation

[,2.6.36)
  • M
Denial of Service (DoS)

[2.6_test9_cvs,2.6.19]
  • M
Race Condition

[,4.4)
  • H
Improper Access Control

[,3.10]
  • H
Denial of Service (DoS)

[,2.6.21)
  • M
Denial of Service (DoS)

[,2.6.36)
  • M
Denial of Service (DoS)

[,2.6.18)
  • M
CVE-2003-0246

[2.4.0,2.5.69]
  • H
Denial of Service (DoS)

[,2.6.38.1)
  • M
Information Exposure

[,3.6)
  • H
Buffer Overflow

[,4.5)
  • M
Improper Data Handling

[,4.6)
  • M
Denial of Service (DoS)

[,4.5.3)
  • H
Access Restriction Bypass

[,3.10]
  • H
Memory Leak

[,5.3.9)
  • H
Out-of-Bounds

[,2.6.31.1)
  • H
Access Restriction Bypass

[,2.4.19)
  • L
Denial of Service (DoS)

[2.6_test9_cvs,2.6.10]
  • M
Denial of Service (DoS)

[,4.5)
  • H
Access Restriction Bypass

[,4.6)
  • M
Denial of Service (DoS)

[2.4.23_ow2,2.6.11]
  • M
Access Restriction Bypass

[,3.3.1)
  • H
Use After Free

[,4.18)
  • M
Use After Free

[,2.6.37)
  • H
Denial of Service (DoS)

[,3.10.1)
  • H
Denial of Service (DoS)

[,2.6.28][2.6.28,2.6.30.1)
  • M
Out-of-bounds Write

[,5.2.3)
  • M
Denial of Service (DoS)

[,5.13.4)
  • H
Arbitrary Code Execution

[2.4.23_ow2,2.6.10]
  • H
Out-of-bounds Write

[,4.8.16)
  • H
Symlink Attack

[0,)
  • M
Improper Input Validation

[,3.11.8)
  • M
Information Exposure

[,4.13.5)
  • M
Denial of Service (DoS)

[2.0,2.0.38]
  • H
Access Restriction Bypass

[3.10,3.18]
  • M
Resource Management Errors

[,3.10.4)
  • H
Use After Free

[,5.3.18)
  • M
Information Exposure

[,2.4.0]
  • M
Information Exposure

[2.6.9,2.6.18]
  • H
Race Condition

[,4.13.10)
  • L
Improper Input Validation

[,3.11.1)
  • M
Race Condition

[,4.17.2)
  • M
Resource Management Errors

[,2.6.37)
  • H
Access Restriction Bypass

(2.0.1,2.0.19)[2.2.0,2.2.19)
  • H
Out-of-bounds Write

[0,)
  • M
Out-of-Bounds

[,4.7.5)
  • M
Denial of Service (DoS)

[,3.17.3)
  • H
Denial of Service (DoS)

[,4.5.3)
  • M
Denial of Service (DoS)

[,2.4.25)
  • M
Resource Management Errors

[,3.9.1)
  • M
Access Restriction Bypass

[,2.6.21)
  • M
Out-of-Bounds

[,4.16.6)
  • H
Integer Overflow or Wraparound

[,4.14.15)
  • M
Memory Leak

[,5.3.10)
  • M
Access Restriction Bypass

[,2.6]
  • C
Out-of-Bounds

[,3.4)
  • H
Denial of Service (DoS)

[,2.6.39)
  • M
Denial of Service (DoS)

[2.4.2,2.4.22]
  • H
Improper Data Handling

[,4.11.2)
  • M
Information Exposure

[3.10,3.18]
  • L
Denial of Service (DoS)

[,2.6.15.5)
  • M
Improper Input Validation

[,3.12.4)
  • M
Directory Traversal

[,2.6.18)
  • M
Out-of-bounds Read

[,5.4.10)
  • H
Use of Externally-Controlled Format String

[,3.9.5)
  • C
Out-of-Bounds

[,4.9.6)
  • H
Improper Input Validation

[,4.18.12)
  • M
NULL Pointer Dereference

[,5.12.13)
  • L
Information Exposure

[,3.6)
  • H
Out-of-Bounds

[,3.8.5)
  • C
Use After Free

[,5.3.10)
  • H
Use After Free

[,4.17.6)
  • H
Improper Input Validation

[4.8,)
  • H
Access Restriction Bypass

[,3.10]
  • M
Information Exposure

[3.10,3.18]
  • H
Out-of-Bounds

[,4.6.5)
  • H
Out-of-Bounds

[,2.6.29.1)
  • M
Denial of Service (DoS)

[,2.6.12.1)
  • M
Divide By Zero

[,4.4)
  • H
Denial of Service (DoS)

[2.6.17,2.6.20]
  • H
Incorrect Authorization

[,2.6.33]
  • H
Access Restriction Bypass

[,4.11.6)
  • M
Denial of Service (DoS)

[,3.14.3)
  • H
Out-of-bounds Read

[3.0,4.0)
  • M
Denial of Service (DoS)

[,3.17.3)
  • M
Improper Input Validation

[2.6.22,2.6.24]
  • M
Memory Leak

[,5.0)
  • C
Denial of Service (DoS)

[,4.4)
  • M
Out-of-Bounds

[,4.1.11)
  • H
Out-of-bounds Read

[,4.11.8)
  • H
NULL Pointer Dereference

[,2.6.35)
  • M
Out-of-bounds Read

[0,)
  • M
Out-of-bounds Read

[,4.15.16)
  • M
Memory Leak

[,5.3.11)
  • M
Privilege Dropping / Lowering Errors

[0,4.17-rc1)
  • M
Use After Free

[,4.7.5)
  • H
Privilege Escalation

[,5.5.4)
  • M
NULL Pointer Dereference

[,4.13.12)
  • H
Directory Traversal

[,5.10.7)
  • H
Privilege Escalation

[,3.15.7)
  • H
Access Restriction Bypass

[,3.18]
  • M
Resource Management Errors

[,2.6.16.23)[2.6.17.0,2.6.17.3)
  • M
Off-by-one Error

[,2.6.36)
  • H
Buffer Overflow

[3.16,5.13.4)
  • H
Denial of Service (DoS)

[,4.2.2)
  • M
Use After Free

[,5.2.6)
  • M
Cryptographic Issues

[,2.4.34.1)
  • L
Information Exposure

[,3.6)
  • H
Access Restriction Bypass

[,3.14.8)
  • L
Race Condition

[,3.18.10)
  • H
Improper Input Validation

[,2.6.38.1)
  • H
Out-of-Bounds

[,3.4.8)
  • M
NULL Pointer Dereference

[,4.13.12)
  • H
Out-of-bounds Read

[4.7,4.13.1)
  • M
Out-of-Bounds

[,3.4.5)
  • M
Denial of Service (DoS)

[,2.6.11.8)[2.6.0,2.6.12)
  • M
Improper Input Validation

[,2.6.35)
  • C
Denial of Service (DoS)

[4.13,4.14.93)[4.19,4.19.15)[4.20,4.20.2)
  • H
Privilege Escalation

[,4.17.5)
  • H
Race Condition

[,4.4)
  • M
NULL Pointer Dereference

[,5.1.8)
  • M
Denial of Service (DoS)

[,3.15.2)
  • L
Information Exposure

[,2.6.36)
  • M
Denial of Service (DoS)

[2.6.0,2.6.18.3]
  • H
Denial of Service (DoS)

[2.6.14,2.6.14.3]
  • M
Improper Data Handling

[,3.18.5)
  • H
Denial of Service (DoS)

[,4.6)
  • C
Out-of-Bounds

[,3.18]
  • M
Denial of Service (DoS)

[2.4.23_ow2,2.6.9]
  • H
Out-of-bounds Read

[,5.13.4)
  • H
Buffer Overflow

[,2.6.38)
  • H
Access Restriction Bypass

[3.10,3.18]
  • H
Improper Input Validation

[,3.8.4)
  • M
Denial of Service (DoS)

[,4.5.4)
  • M
Memory Leak

[,5.1.6)
  • M
NULL Pointer Dereference

[,2.6.37)
  • M
Race Condition

[,5.4.14)
  • M
Denial of Service (DoS)

[2.6.0,2.6.15]
  • H
Access Restriction Bypass

[,3.18]
  • M
Divide By Zero

[,4.11.3)
  • H
Out-of-Bounds

[,4.14.9)
  • H
NULL Pointer Dereference

[0,)
  • L
Denial of Service (DoS)

[,2.6.0]
  • M
Resource Management Errors

[,3.18.2)
  • M
Access Restriction Bypass

[,3.18.2)
  • M
Buffer Access with Incorrect Length Value

[,4.18.0-193.el8)
  • M
Out-of-Bounds

[,3.11.1)
  • H
Memory Leak

[,5.3.12)
  • M
Out-of-Bounds

[,3.11.1)
  • H
Improper Access Control

[,3.10]
  • C
Double Free

[,4.16.4)
  • M
Out-of-Bounds

[,2.6.28.1)
  • M
Resource Management Errors

[,3.7.9)
  • M
Information Exposure

[,2.6.36.1)
  • H
Denial of Service (DoS)

[,2.6.28.1)
  • M
Denial of Service (DoS)

[,2.2.0)
  • C
Denial of Service (DoS)

[,3.1)
  • M
Improper Input Validation

[,2.6.13)
  • H
Out-of-bounds Read

[,5.5.7)
  • M
Denial of Service (DoS)

[,5.11.11)
  • M
Error Handling

[,4.15.10)
  • M
Out-of-bounds Read

[,5.8.10)
  • M
CVE-2019-20811

[,5.0.6)
  • H
Access Restriction Bypass

[,4.0)
  • H
Use After Free

[,5.12.4)
  • M
Memory Leak

[,5.3.12)
  • M
CVE-2020-11669

[,5.2)
  • H
Denial of Service (DoS)

[0,4.1-rc1)
  • M
Race Condition

[,3.7.2)
  • H
Resources Downloaded over Insecure Protocol

[,5.9.0)
  • M
Out-of-bounds Write

[,5.3.9)
  • H
Denial of Service (DoS)

[,2.6.12.6)
  • M
Denial of Service (DoS)

[,2.6.33)
  • M
Out-of-Bounds

[,4.9.1)
  • M
Denial of Service (DoS)

[,5.11.9)
  • H
Race Condition

[,3.10]
  • H
Access Restriction Bypass

[,3.10]
  • H
Integer Overflow or Wraparound

[,4.4.182)[4.5,4.9.182)[4.10,4.14.127)[4.15,4.19.52)[4.20,5.1.11)
  • H
Denial of Service (DoS)

[,3.8.8)
  • M
Information Exposure

[2.6.0,2.6.15]
  • M
Operation on a Resource after Expiration or Release

[0,)
  • H
Improper Input Validation

[,2.6.35.6)
  • M
NULL Pointer Dereference

[,4.4.2)
  • H
Denial of Service (DoS)

[,4.5.5)
  • M
NULL Pointer Dereference

[,2.6.35.5)
  • H
Out-of-Bounds

[,2.6.38)
  • M
NULL Pointer Dereference

[,4.11.5)
  • M
CVE-2004-0497

[,2.0]
  • M
Memory Leak

[,5.3.12)
  • H
Out-of-Bounds

[,4.7.1)
  • M
Race Condition

[,2.6.37.1)
  • M
Resource Management Errors

[0,RHSA-2006-0574)
  • H
Authentication Bypass

[,2.6.35)
  • C
Denial of Service (DoS)

[,2.2.16)
  • H
Memory Leak

[,5.3.4)
  • H
Access Restriction Bypass

[,3.3.2)
  • H
Access Restriction Bypass

[,3.18]
  • H
Out-of-Bounds

[,4.15.12)
  • H
Out-of-bounds Write

[,2.6.37.2)
  • M
Information Exposure

[3.10,3.18]
  • H
CVE-2004-0186

[2.6_test9_cvs,2.6.1]
  • H
Improper Input Validation

[,2.6.26)
  • H
Out-of-Bounds

[,2.6.32.1)
  • M
Insufficient Verification of Data Authenticity

[,5.7)