Information Exposure
| |
Misinterpretation of Input
| |
Missing Release of Resource after Effective Lifetime
| |
ALAS2-2024-2490
| |
Information Exposure
| |
Missing Encryption of Sensitive Data
| |
External Control of File Name or Path
| |
Out-of-Bounds
| |
Allocation of Resources Without Limits or Throttling
| |
Expected Behavior Violation
| |
Use After Free
| |
Improper Certificate Validation
| |
Integer Overflow or Wraparound
| |
Authentication Bypass by Primary Weakness
| |
Special Element Injection
| |
Double Free
| |
Authentication Bypass by Primary Weakness
| |
Directory Traversal
| |
Authentication Bypass by Primary Weakness
| |
Allocation of Resources Without Limits or Throttling
| |
Cleartext Transmission of Sensitive Information
| |
Cleartext Transmission of Sensitive Information
| |
Use After Free
| |
Cleartext Transmission of Sensitive Information
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Expected Behavior Violation
| |
Double Free
| |
Cleartext Transmission of Sensitive Information
| |
Stack-based Buffer Overflow
| |
Allocation of Resources Without Limits or Throttling
| |
Improper Preservation of Permissions
| |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
| |
Improper Validation of Syntactic Correctness of Input
| |
Allocation of Resources Without Limits or Throttling
| |
Improper Certificate Validation
| |
Insufficiently Protected Credentials
| |
Improper Authentication
| |
Information Exposure
| |
Insufficiently Protected Credentials
| |
Insufficient Verification of Data Authenticity
| |
Double Free
| |
Cleartext Transmission of Sensitive Information
| |
Use of Incorrectly-Resolved Name or Reference
| |
Use of Uninitialized Resource
| |
Insufficiently Protected Credentials
| |
Improper Validation of Integrity Check Value
| |
Missing Initialization of Resource
| |
Uncontrolled Recursion
| |
Untrusted Pointer Dereference
| |
Improper Certificate Validation
| |
Information Exposure
| |
Information Exposure
| |
Use of Uninitialized Resource
| |
Arbitrary Code Injection
| |
Buffer Overflow
| |
Double Free
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Information Exposure
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Information Exposure
| |
Out-of-bounds Read
| |