Missing Report of Error Condition | [3.2.0,3.2.4)[3.3.1,3.3.2)[3.4.0,3.4.1) |
Covert Timing Channel | |
Out-of-bounds Write | [1.0.2u,1.1.0l)[1.1.1q,3.0.16)[3.1.0,3.1.8)[3.2.0,3.2.4)[3.3.1,3.3.3) |
Type Confusion | [3.0.5,3.0.15)[3.1.0,3.1.7)[3.2.0,3.2.3)[3.3.1,3.3.2) |
Information Exposure | [3.0.5,3.0.15)[3.1.0,3.1.7)[3.2.0,3.2.3)[3.3.1,3.3.2) |
Use After Free | [1.1.1q,3.0.14)[3.1.0,3.1.6)[3.2.0,3.2.2) |
Uncontrolled Resource Consumption | [3.0.5,3.0.14)[3.1.0,3.1.6)[3.2.0,3.2.2) |
Uncontrolled Resource Consumption ('Resource Exhaustion') | [3.0.5,3.0.14)[3.1.0,3.1.6)[3.2.0,3.2.2) |
Observable Timing Discrepancy | |
NULL Pointer Dereference | [1.0.2u,1.1.0l)[1.1.1q,3.0.13)[3.1.0,3.1.5)[3.2.0,3.2.1) |
Resource Exhaustion | [3.0.5,3.0.13)[3.1.0,3.1.5)[3.2.0,3.2.1) |
Use of a Broken or Risky Cryptographic Algorithm | [3.0.5,3.0.13)[3.1.0,3.1.5)[3.2.0,3.2.1) |
Denial of Service (DoS) | |
Missing Cryptographic Step | [3.0.5,3.0.12)[3.1.0,3.1.4) |
Denial of Service (DoS) | [1.1.1q,1.1.1w)[3.0.5,3.0.11)[3.1.0,3.1.3) |
Denial of Service (DoS) | [1.0.2u,1.1.1v)[3.0.9,3.0.10)[3.1.0,3.1.2) |
Denial of Service (DoS) | [1.0.2u,1.1.1v)[3.0.9,3.0.10)[3.1.0,3.1.2) |
Insufficient Verification of Data Authenticity | [3.0.9,3.0.10)[3.1.0,3.1.2) |
Denial of Service (DoS) | [1.0.2u,1.1.0l)[1.1.1q,1.1.1u)[3.0.5,3.0.9)[3.1.0,3.1.1) |
Buffer Over-read | [3.0.5,3.0.9)[3.1.0,3.1.1) |
Improper Certificate Validation | [1.1.0l,1.1.1u)[3.0.5,3.0.9)[3.1.0,3.1.1) |
Improper Certificate Validation | [1.1.0l,1.1.1u)[3.0.5,3.0.9)[3.1.0,3.1.1) |
Denial of Service (DoS) | [1.0.2u,1.1.1u)[3.0.5,3.0.9)[3.1.0,3.1.1) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [1.1.1q,1.1.1t)[3.0.5,3.0.8) |
Denial of Service (DoS) | |
Timing Attack | [1.0.2u,1.1.0l)[1.1.1q,1.1.1t)[3.0.5,3.0.8) |
Access of Resource Using Incompatible Type ('Type Confusion') | [1.0.2u,1.1.0l)[1.1.1q,1.1.1t)[3.0.5,3.0.8) |
Use After Free | [1.0.2u,1.1.0l)[1.1.1q,1.1.1t)[3.0.5,3.0.8) |
Denial of Service (DoS) | |
Buffer Overflow | |
Buffer Overflow | |
Cryptographic Issues | |
Arbitrary Command Injection | |
Infinite loop | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Use After Free | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2004-0975 | |
Information Exposure | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-bounds Read | |
Improper Input Validation | |
Use of a Risky Cryptographic Algorithm | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Resource Management Errors | |
Denial of Service (DoS) | |
User Enumeration | |
Resource Management Errors | |
Improper Access Control | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Timing Attack | |
Denial of Service (DoS) | |
Cryptographic Issues | |
Race Condition | |
User Enumeration | |
Cryptographic Issues | |
Cryptographic Issues | |
Resource Management Errors | |
Buffer Overflow | |
Cryptographic Issues | |
Information Exposure | |
Improper Authentication | |
NULL Pointer Dereference | |
Insecure Encryption | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Improper Authentication | |
Integer Overflow or Wraparound | |
Insecure Defaults | |
CVE-2000-0535 | |
Improper Authentication | |
Resource Management Errors | |
CVE-2003-0147 | |