Missing Synchronization | |
NULL Pointer Dereference | |
User Interface (UI) Misrepresentation of Critical Information | |
Out-of-bounds Read | |
Double Free | |
Race Condition | |
Improper Validation of Specified Quantity in Input | |
Open Redirect | |
Uncontrolled Memory Allocation | |
Improper Check for Unusual or Exceptional Conditions | |
Information Exposure | |
Exposure of System Data to an Unauthorized Control Sphere | |
Information Exposure | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Out-of-Bounds | |
Buffer Overflow | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Buffer Overflow | |
Out-of-Bounds | |
Use After Free | |
Open Redirect | |
Out-of-Bounds | |
Improper Restriction of Rendered UI Layers or Frames | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Use After Free | |
Buffer Overflow | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Use After Free | |
Use of Incorrectly-Resolved Name or Reference | |
Improper Input Validation | |
Improper Resource Shutdown or Release | |
Use After Free | |
Reachable Assertion | |
Double Free | |
Information Exposure | |
User Interface (UI) Misrepresentation of Critical Information | |
Buffer Overflow | |
Resource Exhaustion | |
Allocation of Resources Without Limits or Throttling | |
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | |
Information Exposure | |
Double Free | |
Product UI does not Warn User of Unsafe Actions | |
Cross-site Scripting (XSS) | |
Improper Validation of Integrity Check Value | |
User Interface (UI) Misrepresentation of Critical Information | |
Buffer Overflow | |
Incomplete Filtering of Special Elements | |
Buffer Overflow | |
Out-of-bounds Read | |
Insufficient Compartmentalization | |
Arbitrary Code Injection | |
Buffer Overflow | |
User Interface (UI) Misrepresentation of Critical Information | |
Origin Validation Error | |
Use After Free | |
Buffer Overflow | |
Information Exposure | |
Insufficient Granularity of Access Control | |
Heap-based Buffer Overflow | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-Bounds | |
Inclusion of Functionality from Untrusted Control Sphere | |
Inclusion of Functionality from Untrusted Control Sphere | |
Improper Encoding or Escaping of Output | |
Out-of-Bounds | |
Improper Validation of Unsafe Equivalence in Input | |
CVE-2025-48068 | |
Race Condition | |