CVE-2023-28746
| |
CVE-2024-2193
| |
CVE-2023-46839
| |
Out-of-Bounds
| |
CVE-2023-46835
| |
CVE-2023-46836
| |
CVE-2023-34327
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
CVE-2023-34328
| |
CVE-2023-34326
| |
Improper Check for Dropped Privileges
| |
Out-of-Bounds
| |
Divide By Zero
| |
Improper Locking
| |
Use After Free
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2022-42331
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2022-23824
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Memory Leak
| |
Memory Leak
| |
Release of Invalid Pointer or Reference
| |
Memory Leak
| |
Memory Leak
| |
Uncontrolled Recursion
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Memory Leak
| |
Incorrect Conversion between Numeric Types
| |
Improper Handling of Exceptional Conditions
| |
Improper Resource Shutdown or Release
| |
Improper Resource Shutdown or Release
| |
CVE-2022-33745
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Exposure of Resource to Wrong Sphere
| |
Information Exposure
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Information Exposure
| |
Memory Leak
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
CVE-2022-26364
| |
CVE-2022-26363
| |
Race Condition
| |
Improper Locking
| |
CVE-2022-26361
| |
CVE-2022-26358
| |
Race Condition
| |
CVE-2022-26359
| |
CVE-2022-26360
| |
Incomplete Cleanup
| |
Integer Underflow
| |
Improper Handling of Exceptional Conditions
| |
CVE-2021-28704
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2021-28707
| |
Improper Handling of Exceptional Conditions
| |
CVE-2021-28703
| |
CVE-2021-28708
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
CVE-2021-28699
| |
CVE-2021-28695
| |
Improper Authentication
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Incorrect Authorization
| |
Exposure of Resource to Wrong Sphere
|
<4.11.4+107-gef32c7afa2-1
|
CVE-2021-28690
|
<4.11.4+107-gef32c7afa2-1
|
Information Exposure
|
<4.11.4+107-gef32c7afa2-1
|
Improper Privilege Management
|
<4.11.4+107-gef32c7afa2-1
|
Out-of-Bounds
| |
Improper Privilege Management
| |
CVE-2021-26933
| |
NULL Pointer Dereference
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Uncontrolled Recursion
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Untrusted Search Path
| |
Information Exposure
| |
Incorrect Permission Assignment for Critical Resource
| |
Information Exposure
| |
Out-of-Bounds
| |
Improper Privilege Management
| |
Race Condition
| |
Insufficient Verification of Data Authenticity
| |
Memory Leak
| |
Race Condition
| |
Improper Handling of Exceptional Conditions
| |
Resource Exhaustion
| |
Out-of-Bounds
| |
Race Condition
| |
Out-of-Bounds
| |
Arbitrary Code Injection
| |
Improper Privilege Management
| |
Improper Input Validation
|
<4.11.4+24-gddaaccbbab-1~deb10u1
|
Race Condition
|
<4.11.4+24-gddaaccbbab-1~deb10u1
|
Improper Handling of Exceptional Conditions
|
<4.11.4+24-gddaaccbbab-1~deb10u1
|
Improper Input Validation
|
<4.11.4+24-gddaaccbbab-1~deb10u1
|
Resource Exhaustion
|
<4.11.4+24-gddaaccbbab-1~deb10u1
|
Missing Authorization
|
<4.11.4+24-gddaaccbbab-1~deb10u1
|
Improper Handling of Exceptional Conditions
|
<4.11.4+24-gddaaccbbab-1~deb10u1
|
Information Exposure
|
<4.11.4+24-gddaaccbbab-1~deb10u1
|
Out-of-Bounds
|
<4.11.4+24-gddaaccbbab-1~deb10u1
|
CVE-2020-11742
|
<4.11.4+24-gddaaccbbab-1~deb10u1
|
Improper Input Validation
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Memory Leak
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Loop with Unreachable Exit Condition ('Infinite Loop')
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Race Condition
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Out-of-Bounds
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Incorrect Calculation
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Improper Input Validation
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
CVE-2019-11135
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Improper Input Validation
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Race Condition
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Incorrect Permission Assignment for Critical Resource
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Use of Externally-Controlled Format String
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
OS Command Injection
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Off-by-one Error
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Improper Privilege Management
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Improper Input Validation
| |
Race Condition
| |
Improper Input Validation
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Improper Input Validation
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
|
<4.11.3+24-g14b62ab3e5-1~deb10u1
|
Improper Input Validation
| |
Race Condition
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Information Exposure
| |
CVE-2019-11091
| |
Information Exposure
| |
Information Exposure
| |
Incomplete Cleanup
| |
Reachable Assertion
| |
Information Exposure
| |
Improper Input Validation
| |
CVE-2018-19965
| |
CVE-2018-19964
| |
Interpretation Conflict
| |
NULL Pointer Dereference
| |
Incorrect Authorization
|
<4.11.1~pre.20180911.5acdd26fdc+dfsg-2
|
Resource Exhaustion
|
<4.11.1~pre.20180911.5acdd26fdc+dfsg-2
|
Resource Exhaustion
|
<4.11.1~pre.20180911.5acdd26fdc+dfsg-2
|
CVE-2018-3646
|
<4.11.1~pre.20180911.5acdd26fdc+dfsg-2
|
Information Exposure
|
<4.11.1~pre.20180911.5acdd26fdc+dfsg-2
|
Information Exposure
|
<4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9
|
CVE-2018-12891
|
<4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9
|
CVE-2018-12893
|
<4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9
|
Out-of-bounds Read
| |
Out-of-Bounds
| |
Information Exposure
|
<4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u8
|
Information Exposure
|
<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7
|
CVE-2018-10982
|
<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
|
Loop with Unreachable Exit Condition ('Infinite Loop')
|
<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
|
Race Condition
|
<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
|
Information Exposure
|
<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
|
Out-of-bounds Write
|
<4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
|
CVE-2018-7541
|
<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
|
Resource Exhaustion
|
<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
|
NULL Pointer Dereference
|
<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
|
Information Exposure
|
<4.11.1~pre+1.733450b39b-1
|
Information Exposure
|
<4.11.1~pre+1.733450b39b-1
|
Out-of-Bounds
|
<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
|
Improper Input Validation
|
<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
|
CVE-2017-17566
|
<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
|
Error Handling
|
<4.8.3+comet2+shim4.10.0+comet3-1+deb9u5
|
Use After Free
| |
Information Exposure
| |
Improper Check for Unusual or Exceptional Conditions
| |
Out-of-Bounds
| |
CVE-2017-15594
| |
Exposure of Resource to Wrong Sphere
| |
Improper Input Validation
| |
Information Exposure
| |
Missing Release of Resource after Effective Lifetime
| |
Resource Exhaustion
| |
CVE-2017-15590
| |
Race Condition
| |
Resource Exhaustion
| |
Missing Release of Resource after Effective Lifetime
| |
CVE-2017-14319
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Race Condition
| |
Incorrect Calculation
| |
Buffer Overflow
| |
Race Condition
| |
Information Exposure
| |
Race Condition
| |
Improper Input Validation
| |
Out-of-Bounds
| |
CVE-2017-10912
| |
Race Condition
| |
Resource Exhaustion
| |
CVE-2017-10919
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Information Exposure
| |
CVE-2017-10913
| |
Out-of-Bounds
| |
CVE-2017-8903
| |
Incorrect Calculation
| |
CVE-2017-8904
| |
Information Exposure
| |
Improper Validation of Array Index
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Incorrect Calculation
| |
Information Exposure
| |
Access Restriction Bypass
| |
Information Exposure
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Race Condition
| |
Improper Input Validation
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Race Condition
| |
Out-of-Bounds
| |
Use After Free
| |
Access Restriction Bypass
| |
Improper Access Control
| |
Improper Input Validation
| |
Improper Access Control
| |
Access Restriction Bypass
| |
CVE-2016-5242
| |
Resource Exhaustion
| |
Access Restriction Bypass
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Access Restriction Bypass
| |
Out-of-Bounds
| |
Improper Access Control
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
CVE-2016-2271
| |
Improper Input Validation
| |
Code
| |
Improper Input Validation
| |
Security Features
| |
Resource Management Errors
| |
Improper Data Handling
| |
Code
| |
Security Features
| |
Security Features
| |
Resource Management Errors
| |
Resource Management Errors
| |
Access Restriction Bypass
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Out-of-Bounds
| |
Improper Data Handling
| |
Code
| |
Access Restriction Bypass
| |
Out-of-Bounds
| |
Information Exposure
| |
Access Restriction Bypass
| |
Out-of-Bounds
| |
Access Restriction Bypass
| |
Resource Management Errors
| |
Out-of-bounds Write
| |
CVE-2015-4163
| |
Resource Management Errors
| |
Incorrect Authorization
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Out-of-Bounds
| |
Information Exposure
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Code
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Information Exposure
| |
Information Exposure
| |
Resource Management Errors
| |
Resource Management Errors
| |
CVE-2015-0361
| |
Code
| |
Code
| |
Code
| |
Code
| |
Improper Input Validation
| |
Code
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Access Restriction Bypass
| |
Race Condition
| |
Resource Management Errors
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Resource Management Errors
| |
Resource Management Errors
| |
Out-of-Bounds
| |
CVE-2014-3968
| |
CVE-2014-3967
| |
Access Restriction Bypass
| |
Numeric Errors
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Resource Management Errors
| |
Resource Management Errors
| |
Access Restriction Bypass
| |
Resource Management Errors
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Improper Input Validation
| |
CVE-2013-4369
| |
Information Exposure
| |
Resource Management Errors
| |
Out-of-Bounds
| |
Access Restriction Bypass
| |
Buffer Overflow
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Access Restriction Bypass
| |
Information Exposure
| |
Resource Management Errors
| |
Numeric Errors
| |
Numeric Errors
| |
CVE-2013-2196
| |
Improper Input Validation
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Access Restriction Bypass
| |
CVE-2013-0153
| |
Configuration
| |
Buffer Overflow
| |
CVE-2012-5515
| |
Configuration
| |
Improper Input Validation
| |
CVE-2012-5514
| |
Resource Management Errors
| |
Resource Management Errors
| |
CVE-2012-5510
| |
Out-of-Bounds
| |
Access Restriction Bypass
| |
CVE-2012-2934
|
<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
|
CVE-2012-0218
|
<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
|
Improper Input Validation
| |
Resource Management Errors
| |
Improper Input Validation
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Configuration
| |
Numeric Errors
| |
Improper Input Validation
| |
Information Exposure
| |
Improper Input Validation
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Access Restriction Bypass
| |
Configuration
| |
CVE-2012-4536
| |
Resource Management Errors
| |
Resource Management Errors
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-Bounds
|
<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
|
Out-of-Bounds
|
<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
|
Resource Management Errors
| |
Numeric Errors
| |
Access Restriction Bypass
| |
CVE-2010-4255
| |
Resource Management Errors
| |