Signed to Unsigned Conversion Error | |
Uncontrolled Memory Allocation | |
Improper Handling of Length Parameter Inconsistency | |
Integer Overflow or Wraparound | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Out-of-bounds Read | |
CVE-2024-21140 | |
Improper Input Validation | |
CVE-2024-21131 | |
CVE-2024-21147 | |
Improper Output Neutralization for Logs | |
Integer Overflow or Wraparound | |
Uncontrolled Memory Allocation | |
Out-of-bounds Write | |
Reliance on Reverse DNS Resolution for a Security-Critical Action | |
CVE-2024-20925 | |
Improper Input Validation | |
CVE-2024-20923 | |
Covert Timing Channel | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
CVE-2024-20922 | |
Information Exposure Through Log Files | |
Improper Input Validation | |
Improper Certificate Validation | |
Out-of-bounds Read | |
Allocation of Resources Without Limits or Throttling | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2023-22043 | |
Directory Traversal | |
Small Space of Random Values | |
Directory Traversal | |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
Information Exposure | |
Improper Input Validation | |
Improper Neutralization of Null Byte or NUL Character | |
Improperly Implemented Security Check for Standard | |
Improper Input Validation | |
Improper Neutralization of Null Byte or NUL Character | |
Resource Exhaustion | |
Reliance on File Name or Extension of Externally-Supplied File | |
Deserialization of Untrusted Data | |
Resource Exhaustion | |
Buffer Overflow | |
Authentication Bypass | |
Integer Coercion Error | |
Allocation of Resources Without Limits or Throttling | |
Use of Insufficiently Random Values | |
Resource Leak | |
Integer Coercion Error | |
Improper Access Control | |
Integer Underflow | |
Incorrect Behavior Order: Early Validation | |
Improper Use of Validation Framework | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Resource Exhaustion | |
Integer Underflow | |
Improper Use of Validation Framework | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Incorrect Behavior Order: Early Validation | |
Resource Exhaustion | |
Improper Authorization | |
Uncaught Exception | |
Allocation of Resources Without Limits or Throttling | |
Deserialization of Untrusted Data | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Use of Validation Framework | |
Integer Overflow or Wraparound | |
Improper Cross-boundary Removal of Sensitive Data | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Write | |
Improper Use of Validation Framework | |
Integer Overflow or Wraparound | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Out-of-bounds Write | |
CVE-2021-35567 | |
CVE-2021-35586 | |
CVE-2021-35603 | |
CVE-2021-35565 | |
CVE-2021-35578 | |
CVE-2021-35564 | |
Incorrect Authorization | |
CVE-2021-35588 | |
Incorrect Authorization | |
CVE-2021-35556 | |
Out-of-bounds Read | |
CVE-2021-35561 | |
CVE-2021-2341 | |
CVE-2021-2369 | |
CVE-2021-2388 | |
CVE-2020-14581 | |
CVE-2020-14577 | |
CVE-2020-14583 | |
CVE-2020-14621 | |
CVE-2020-14556 | |
CVE-2020-14593 | |
CVE-2020-14562 | |
CVE-2020-2830 | |
CVE-2020-2803 | |
CVE-2020-2805 | |
Deserialization of Untrusted Data | |
CVE-2020-2800 | |
CVE-2020-2816 | |
CVE-2020-2773 | |
CVE-2020-2755 | |
CVE-2020-2778 | |
CVE-2020-2754 | |
CVE-2020-2767 | |
CVE-2020-2781 | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
CVE-2020-2654 | |
CVE-2020-2655 | |
Divide By Zero | |
CVE-2020-2659 | |
CVE-2020-2593 | |
Improper Handling of Exceptional Conditions | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2020-2590 | |
CVE-2020-2585 | |
Use of Uninitialized Resource | |
CVE-2020-2601 | |
CVE-2019-2977 | |
CVE-2019-2999 | |
CVE-2019-2989 | |
CVE-2019-2987 | |
CVE-2019-2949 | |
CVE-2019-2981 | |
CVE-2019-2988 | |
CVE-2019-2983 | |
CVE-2019-2992 | |
CVE-2019-2975 | |
CVE-2019-2978 | |
CVE-2019-2964 | |
CVE-2019-2945 | |
CVE-2019-2894 | |
CVE-2019-2962 | |
CVE-2019-2958 | |
CVE-2019-2973 | |
CVE-2019-2821 | |
CVE-2019-2816 | |
CVE-2019-2745 | |
Use After Free | |
CVE-2019-2769 | |
CVE-2019-2786 | |
Information Exposure | |
CVE-2019-2762 | |
CVE-2019-2766 | |
CVE-2019-2697 | |
Resource Exhaustion | |
CVE-2019-2698 | |
CVE-2019-2684 | |