Find out if you have vulnerabilities that put you at risk
Test your applicationsVULNERABILITY | AFFECTS | TYPE | PUBLISHED |
---|---|---|---|
Out-of-bounds Read | kernel-debuginfo-common-x86_64<0:4.14.352-190.569.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Incorrect Privilege Assignment | kernel-debuginfo-common-x86_64<0:4.14.353-190.569.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Behavioral Problems | perf<0:4.14.355-195.603.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Incorrect Privilege Assignment | kernel-devel<0:4.14.353-190.569.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Out-of-bounds Read | kernel-debuginfo-common-x86_64<0:4.14.238-125.421.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Out-of-bounds Read | kernel-headers<0:4.14.238-125.421.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Incorrect Privilege Assignment | kernel<0:4.14.353-190.569.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Behavioral Problems | kernel-tools-devel<0:4.14.355-195.603.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Use After Free | kernel-debuginfo-common-i686<0:4.14.355-195.603.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Behavioral Problems | kernel-tools<0:4.14.355-195.603.amzn1 | amzn:2018.03 | 18 Mar 2025 |
OS Command Injection | emacs-debuginfo<1:24.3-20.26.amzn1 | amzn:2018.03 | 18 Mar 2025 |
OS Command Injection | emacs<1:24.3-20.26.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Incorrect Privilege Assignment | perf<0:4.14.353-190.569.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Use After Free | kernel<0:4.14.355-195.603.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Use After Free | perf<0:4.14.355-195.603.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Behavioral Problems | kernel-debuginfo-common-x86_64<0:4.14.355-195.603.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Stack-based Buffer Overflow | libxml2-python27<0:2.9.1-6.6.45.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Use After Free | kernel-debuginfo-common-i686<0:4.14.355-195.603.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Out-of-bounds Read | perf-debuginfo<0:4.14.352-190.569.amzn1 | amzn:2018.03 | 18 Mar 2025 |
CVE-2022-49349 | kernel-debuginfo-common-i686<0:4.14.285-147.501.amzn1 | amzn:2018.03 | 18 Mar 2025 |
CVE-2022-49349 | kernel-debuginfo-common-x86_64<0:4.14.285-147.501.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Use After Free | kernel-tools-devel<0:4.14.355-195.603.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Out-of-bounds Read | perf<0:4.14.352-190.569.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Use After Free | libxml2-static<0:2.9.1-6.6.45.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Stack-based Buffer Overflow | libxml2<0:2.9.1-6.6.45.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Out-of-bounds Read | kernel-debuginfo-common-i686<0:4.14.352-190.569.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Stack-based Buffer Overflow | libxml2-devel<0:2.9.1-6.6.45.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Use After Free | kernel-tools<0:4.14.355-195.603.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Out-of-bounds Read | kernel-debuginfo<0:4.14.352-190.569.amzn1 | amzn:2018.03 | 18 Mar 2025 |
Use After Free | perf-debuginfo<0:4.14.355-195.603.amzn1 | amzn:2018.03 | 18 Mar 2025 |