Improper Output Neutralization for Logs | |
Improper Validation of Syntactic Correctness of Input | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Improper Validation of Syntactic Correctness of Input | |
Heap-based Buffer Overflow | |
Insufficient Granularity of Access Control | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Null Byte Interaction Error (Poison Null Byte) | |
Improper Input Validation | |
Unchecked Return Value | |
Out-of-Bounds | |
XML External Entity (XXE) Injection | |
Unchecked Return Value | |
Resource Exhaustion | |
Allocation of Resources Without Limits or Throttling | |
Reversible One-Way Hash | |
Integer Overflow to Buffer Overflow | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Improper Input Validation | |
Uncontrolled Recursion | |
Out-of-Bounds | |