Out-of-bounds Write
| |
Improper Output Neutralization for Logs
| |
Integer Overflow or Wraparound
| |
Reliance on Reverse DNS Resolution for a Security-Critical Action
| |
Information Exposure Through Log Files
| |
CVE-2024-20925
| |
CVE-2024-20923
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
CVE-2024-20922
| |
Covert Timing Channel
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Improper Certificate Validation
| |
Allocation of Resources Without Limits or Throttling
| |
Out-of-bounds Read
| |
Small Space of Random Values
| |
Out-of-bounds Read
| |
Directory Traversal
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
CVE-2023-22043
| |
Directory Traversal
| |
Improper Neutralization of Null Byte or NUL Character
| |
Improper Neutralization of Null Byte or NUL Character
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improperly Implemented Security Check for Standard
| |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
| |
Information Exposure
| |
Reliance on File Name or Extension of Externally-Supplied File
| |
Deserialization of Untrusted Data
| |
Resource Exhaustion
| |
Allocation of Resources Without Limits or Throttling
| |
Resource Exhaustion
| |
Buffer Overflow
| |
Integer Coercion Error
| |
Authentication Bypass
| |
Use of Insufficiently Random Values
| |
Integer Coercion Error
| |
Inconsistency Between Implementation and Documented Design
| |
Improper Access Control
| |
Resource Leak
| |
Improper Use of Validation Framework
| |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
Resource Exhaustion
| |
Improper Verification of Cryptographic Signature
| |
Integer Underflow
| |
Allocation of Resources Without Limits or Throttling
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Improper Authorization
| |
Allocation of Resources Without Limits or Throttling
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Use of Validation Framework
| |
Out-of-bounds Write
| |
Allocation of Resources Without Limits or Throttling
| |
Uncaught Exception
| |
Allocation of Resources Without Limits or Throttling
| |
Deserialization of Untrusted Data
| |
Allocation of Resources Without Limits or Throttling
| |
Improper Use of Validation Framework
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Deserialization of Untrusted Data
| |
Deserialization of Untrusted Data
| |