Improper Encoding or Escaping of Output | |
Resource Exhaustion | |
Arbitrary Code Injection | |
Incorrect Default Permissions | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Protection Mechanism Failure | |
Use of Uninitialized Variable | |
NULL Pointer Dereference | |
Insufficient Protection Against Instruction Skipping Via Fault Injection | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Missing Synchronization | |
NULL Pointer Dereference | |
User Interface (UI) Misrepresentation of Critical Information | |
Out-of-bounds Read | |
Double Free | |
Race Condition | |
Improper Validation of Specified Quantity in Input | |
Open Redirect | |
Uncontrolled Memory Allocation | |
Improper Check for Unusual or Exceptional Conditions | |
Information Exposure | |
Exposure of System Data to an Unauthorized Control Sphere | |
Information Exposure | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Out-of-Bounds | |
Buffer Overflow | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Buffer Overflow | |
Out-of-Bounds | |
Use After Free | |
Open Redirect | |
Out-of-Bounds | |
Improper Restriction of Rendered UI Layers or Frames | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Use After Free | |
Buffer Overflow | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Improper Input Validation | |
Improper Resource Shutdown or Release | |
Use After Free | |
Reachable Assertion | |
Information Exposure | |
User Interface (UI) Misrepresentation of Critical Information | |
Buffer Overflow | |
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | |
Information Exposure | |
Double Free | |
Product UI does not Warn User of Unsafe Actions | |
Cross-site Scripting (XSS) | |
Improper Validation of Integrity Check Value | |
User Interface (UI) Misrepresentation of Critical Information | |
Buffer Overflow | |
Incomplete Filtering of Special Elements | |
Buffer Overflow | |
Out-of-bounds Read | |
Insufficient Compartmentalization | |
Arbitrary Code Injection | |
Buffer Overflow | |
User Interface (UI) Misrepresentation of Critical Information | |
Origin Validation Error | |
Use After Free | |
Buffer Overflow | |
Information Exposure | |
Insufficient Granularity of Access Control | |
Heap-based Buffer Overflow | |
CVE-2025-48068 | |
Race Condition | |