Improper Certificate Validation | |
Improper Certificate Validation | |
Credential Exposure | |
Multiple Releases of Same Resource or Handle | |
Integer Overflow to Buffer Overflow | |
Information Exposure | |
Comparison Using Wrong Factors | |
Improper Certificate Validation | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Free of Memory not on the Heap | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Authentication Bypass by Spoofing | |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
Improper Check for Certificate Revocation | |
Information Exposure | |
Missing Encryption of Sensitive Data | |
External Control of File Name or Path | |
Heap-based Buffer Overflow | |
Allocation of Resources Without Limits or Throttling | |
Time-of-check Time-of-use (TOCTOU) Race Condition | |
Improper Synchronization | |
Improper Certificate Validation | |
Expected Behavior Violation | |
Use After Free | |
Double Free | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass | |
Directory Traversal | |
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) | |
Allocation of Resources Without Limits or Throttling | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Use After Free | |
Cleartext Transmission of Sensitive Information | |
Stack-based Buffer Overflow | |
Cleartext Transmission of Sensitive Information | |
Double Free | |
Expected Behavior Violation | |
Improper Validation of Syntactic Correctness of Input | |
Improper Preservation of Permissions | |
Denial of Service (DoS) | |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
Denial of Service (DoS) | |
Improper Authentication | |
Cleartext Transmission of Sensitive Information | |
Infinite loop | |
Inappropriate Encoding for Output Context | |
Information Exposure | |
Information Exposure | |
Improper Authentication | |
Insufficiently Protected Credentials | |
Open Redirect | |
Improper Validation | |
Resources Downloaded over Insecure Protocol | |
Insufficiently Protected Credentials | |
Use of Uninitialized Resource | |
Double Free | |
Improper Certificate Validation | |
Use After Free | |
Information Exposure | |
Insufficient Verification of Data Authenticity | |
Missing Initialization of Resource | |
Race Condition | |