Out-of-bounds Write
| |
Improper Output Neutralization for Logs
| |
Reliance on Reverse DNS Resolution for a Security-Critical Action
| |
Uncontrolled Memory Allocation
| |
Integer Overflow or Wraparound
| |
CVE-2024-20925
| |
Integer Overflow or Wraparound
| |
CVE-2024-20923
| |
Improper Input Validation
| |
Improper Input Validation
| |
Covert Timing Channel
| |
Improper Input Validation
| |
Information Exposure Through Log Files
| |
CVE-2024-20922
| |
Improper Certificate Validation
| |
Out-of-bounds Read
| |
Allocation of Resources Without Limits or Throttling
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
CVE-2023-22043
| |
Directory Traversal
| |
Small Space of Random Values
| |
Directory Traversal
| |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
| |
Information Exposure
| |
Improper Input Validation
| |
Improper Neutralization of Null Byte or NUL Character
| |
Improperly Implemented Security Check for Standard
| |
Improper Input Validation
| |
Improper Neutralization of Null Byte or NUL Character
| |
Resource Exhaustion
| |
Reliance on File Name or Extension of Externally-Supplied File
| |
Deserialization of Untrusted Data
| |
Resource Exhaustion
| |
Buffer Overflow
| |
Authentication Bypass
| |
Integer Coercion Error
| |
Allocation of Resources Without Limits or Throttling
| |
Use of Insufficiently Random Values
| |
Resource Leak
| |
Integer Coercion Error
| |
Improper Access Control
| |
Integer Underflow
| |
Incorrect Behavior Order: Early Validation
| |
Improper Use of Validation Framework
| |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
Resource Exhaustion
| |
Integer Underflow
| |
Improper Use of Validation Framework
| |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
Incorrect Behavior Order: Early Validation
| |
Resource Exhaustion
| |
Improper Authorization
| |
Uncaught Exception
| |
Allocation of Resources Without Limits or Throttling
| |
Deserialization of Untrusted Data
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Use of Validation Framework
| |
Integer Overflow or Wraparound
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Out-of-bounds Write
| |
Improper Use of Validation Framework
| |
Integer Overflow or Wraparound
| |
Deserialization of Untrusted Data
| |
Deserialization of Untrusted Data
| |
Out-of-bounds Write
| |
CVE-2021-35567
| |
CVE-2021-35586
| |
CVE-2021-35603
| |
CVE-2021-35565
| |
CVE-2021-35578
| |
CVE-2021-35564
| |
Incorrect Authorization
| |
CVE-2021-35588
| |
Incorrect Authorization
| |
CVE-2021-35556
| |
Out-of-bounds Read
| |
CVE-2021-35561
| |
CVE-2021-2341
| |
CVE-2021-2369
| |
CVE-2021-2388
| |
CVE-2020-14581
| |
CVE-2020-14577
| |
CVE-2020-14583
| |
CVE-2020-14621
| |
CVE-2020-14556
| |
CVE-2020-14593
| |
CVE-2020-14562
| |
CVE-2020-2830
| |
CVE-2020-2803
| |
CVE-2020-2805
| |
Deserialization of Untrusted Data
| |
CVE-2020-2800
| |
CVE-2020-2816
| |
CVE-2020-2773
| |
CVE-2020-2755
| |
CVE-2020-2778
| |
CVE-2020-2754
| |
CVE-2020-2767
| |
CVE-2020-2781
| |
Deserialization of Untrusted Data
| |
Deserialization of Untrusted Data
| |
CVE-2020-2654
| |
CVE-2020-2655
| |
Divide By Zero
| |
CVE-2020-2659
| |
CVE-2020-2593
| |
Improper Handling of Exceptional Conditions
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2020-2590
| |
CVE-2020-2585
| |
Use of Uninitialized Resource
| |
CVE-2020-2601
| |
CVE-2019-2977
| |
CVE-2019-2999
| |
CVE-2019-2989
| |
CVE-2019-2987
| |
CVE-2019-2949
| |
CVE-2019-2981
| |
CVE-2019-2988
| |
CVE-2019-2983
| |
CVE-2019-2992
| |
CVE-2019-2975
| |
CVE-2019-2978
| |
CVE-2019-2964
| |
CVE-2019-2945
| |
CVE-2019-2894
| |
CVE-2019-2962
| |
CVE-2019-2958
| |
CVE-2019-2973
| |
CVE-2019-2821
| |
CVE-2019-2816
| |
CVE-2019-2745
| |
Use After Free
| |
CVE-2019-2769
| |
CVE-2019-2786
| |
Information Exposure
| |
CVE-2019-2762
| |
CVE-2019-2766
| |
CVE-2019-2697
| |
Resource Exhaustion
| |
CVE-2019-2698
| |
CVE-2019-2684
| |