NULL Pointer Dereference | |
Use After Free | |
Reachable Assertion | |
CVE-2022-32089 | |
Use After Free | |
CVE-2022-32084 | |
SQL Injection | |
CVE-2022-27444 | |
Buffer Overflow | |
Use After Free | |
Reachable Assertion | |
Use After Free | |
CVE-2022-27452 | |
SQL Injection | |
Use After Free | |
Use After Free | |
SQL Injection | |
CVE-2022-27451 | |
Use After Free | |
SQL Injection | |
SQL Injection | |
CVE-2022-27446 | |
Use After Free | |
CVE-2022-27449 | |
Use After Free | |
CVE-2022-27445 | |
Use After Free | |
SQL Injection | |
Reachable Assertion | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
CVE-2021-46661 | |
CVE-2021-46659 | |
CVE-2021-46662 | |
Stack-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Use of Externally-Controlled Format String | |
CVE-2021-46665 | |
CVE-2021-46663 | |
Use After Free | |
NULL Pointer Dereference | |
Resource Exhaustion | |
CVE-2021-2372 | |
CVE-2021-2389 | |
CVE-2021-2166 | |
CVE-2021-2154 | |
OS Command Injection | |
CVE-2020-14789 | |
CVE-2020-14812 | |
CVE-2020-14776 | |
CVE-2020-14765 | |
Improper Input Validation | |
CVE-2020-2752 | |
CVE-2020-2760 | |
CVE-2020-2812 | |
CVE-2020-2814 | |
CVE-2020-2574 | |
CVE-2019-2974 | |
CVE-2019-2938 | |
CVE-2019-2737 | |
CVE-2019-2758 | |
CVE-2019-2740 | |
CVE-2019-2739 | |
CVE-2019-2805 | |
CVE-2019-2627 | |
CVE-2019-2628 | |
CVE-2019-2614 | |
CVE-2019-2510 | |
CVE-2019-2537 | |
CVE-2018-3174 | |
CVE-2018-3143 | |
CVE-2018-3185 | |
CVE-2018-3200 | |
CVE-2018-3173 | |
CVE-2018-3251 | |
CVE-2018-3284 | |
CVE-2018-3277 | |
CVE-2018-3156 | |
CVE-2018-3282 | |
CVE-2018-3162 | |
CVE-2018-2819 | |
CVE-2018-2813 | |
CVE-2018-2771 | |
CVE-2018-2781 | |
CVE-2018-2810 | |
CVE-2018-2787 | |
CVE-2018-2784 | |
CVE-2018-2786 | |
CVE-2018-2777 | |
CVE-2018-2761 | |
CVE-2018-2817 | |
CVE-2018-2759 | |
CVE-2018-2755 | |
CVE-2018-2766 | |
CVE-2018-2782 | |
Numeric Errors | |
Use After Free | |
CVE-2017-3238 | |
CVE-2017-3244 | |
Improper Privilege Management | |
CVE-2017-3317 | |
CVE-2017-3312 | |
CVE-2017-3265 | |
Improper Input Validation | |
Information Exposure | |
CVE-2017-3318 | |
CVE-2017-3243 | |
CVE-2017-3291 | |
Link Following | |