libmysqlclient vulnerabilities

  • licenses detected

    • [8.0.25]; [8.0.30]; [8.0.31]; [8.0.34]; [8.1.0]
  • Direct Vulnerabilities

    Known vulnerabilities in the libmysqlclient package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Denial of Service (DoS)

    [8.0.25,8.1.0)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • M
    Access Control Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Access Control Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Access Control Bypass

    [0,)
    • H
    Access Control Bypass

    [0,)
    • H
    Misinterpretation of Input

    [0,)
    • H
    Misinterpretation of Input

    [0,)
    • H
    Misinterpretation of Input

    [0,)
    • M
    Misinterpretation of Input

    [8.0.25,8.1.0)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Control Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Access Control Bypass

    [0,)
    • H
    Access Control Bypass

    [0,)
    • M
    Information Exposure

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • L
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [,8.0.34)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [,8.0.34)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [,8.0.34)
    • L
    Information Exposure

    [,8.0.34)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [8.0.25,8.0.34)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [,8.0.34)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • L
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Information Exposure

    [,8.0.30)
    • M
    Information Exposure

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • H
    Access Control Bypass

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • H
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • L
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Access Restriction Bypass

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • H
    Access Restriction Bypass

    [,8.0.30)
    • M
    Information Exposure

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Resource Exhaustion

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Resource Exhaustion

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Improper Access Control

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Improper Privilege Management

    [0,)
    • M
    Race Condition

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    NULL Pointer Dereference

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [,8.1.0)
    • M
    Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Insufficient Resource Pool

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Improper Resource Shutdown or Release

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • H
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Access Control Bypass

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Improper Resource Shutdown or Release

    [0,)
    • M
    Improper Resource Shutdown or Release

    [,8.1.0)
    • H
    Denial of Service (DoS)

    [,8.1.0)
    • H
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • H
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [,8.1.0)
    • H
    Denial of Service (DoS)

    [,8.1.0)
    • H
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Improper Access Control

    [0,)
    • H
    Improper Resource Shutdown or Release

    [0,)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • H
    Improper Privilege Management

    [,8.1.0)
    • H
    Improper Resource Shutdown or Release

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Improper Resource Shutdown or Release

    [0,)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • L
    Improper Authorization

    [,8.1.0)
    • M
    Improper Privilege Management

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Information Exposure

    [0,)
    • L
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Information Exposure

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Improper Access Control

    [,8.1.0)
    • H
    Improper Access Control

    [,8.1.0)
    • M
    Improper Access Control

    [,8.1.0)
    • H
    Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

    [0,)
    • M
    Improper Access Control

    [0,)
    • M
    Improper Access Control

    [0,)
    • M
    Improper Access Control

    [,8.1.0)
    • M
    Improper Authorization

    [0,)
    • H
    Improper Authorization

    [0,)
    • M
    Improper Authorization

    [0,)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Improper Access Control

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Denial of Service (DoS)

    [,8.1.0)
    • M
    Improper Authorization

    [0,)
    • M
    Improper Authorization

    [0,)
    • M
    Improper Access Control

    [,8.1.0)
    • M
    Resource Exhaustion

    [0,)
    • M
    Resource Exhaustion

    [0,)
    • M
    Resource Exhaustion

    [0,)
    • M
    Resource Exhaustion

    [0,)
    • M
    Resource Exhaustion

    [0,)
    • L
    Access Control Bypass

    [0,)
    • M
    Resource Exhaustion

    [0,)
    • M
    Resource Exhaustion

    [0,)
    • M
    Resource Exhaustion

    [0,)
    • M
    Resource Exhaustion

    [0,)
    • M
    Access Control Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Resource Exhaustion

    [0,)
    • M
    Resource Exhaustion

    [0,)
    • M
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • L
    Information Exposure

    [,8.0.34)
    • L
    Access Restriction Bypass

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • L
    Access Restriction Bypass

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • L
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • M
    Denial of Service (DoS)

    [,8.0.34)
    • M
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [,8.0.31)
    • H
    Authentication Bypass

    [,8.0.30)
    • H
    Denial of Service (DoS)

    [,8.0.30)
    • M
    Improper Certificate Validation

    [,8.0.30)
    • C
    Improper Input Validation

    [,8.0.30)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [8.0.25,8.0.30)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Information Exposure

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • L
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Improper Input Validation

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Improper Input Validation

    [0,)
    • M
    Out-of-bounds Write

    [0,)
    • M
    Improper Input Validation

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Improper Input Validation

    [0,)
    • L
    Access Restriction Bypass

    [0,)
    • H
    Improper Initialization

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Out-of-Bounds

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • L
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [0,)
    • H
    Integer Underflow

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • C
    Use After Free

    [0,)
    • H
    Remote Code Execution (RCE)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    CVE-2012-0494

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Use of Externally-Controlled Format String

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [0,)
    • H
    NULL Pointer Dereference

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • C
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Buffer Overflow

    [0,)
    • M
    Information Exposure

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • L
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Remote Code Execution (RCE)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Arbitrary Code Execution

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Arbitrary Code Execution

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [0,)
    • L
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    NULL Pointer Dereference

    [0,)
    • L
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Cross-site Scripting (XSS)

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Arbitrary Code Execution

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Access Restriction Bypass

    [0,)
    • H
    CVE-2002-1923

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • L
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Arbitrary Code Execution

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • L
    Access Restriction Bypass

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    CVE-2011-2262

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Arbitrary Code Execution

    [0,)
    • H
    Improper Input Validation

    [0,)
    • M
    Cryptographic Issues

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    CVE-2002-1921

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Improper Input Validation

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • L
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)