CVE-2022-21451 | |
CVE-2022-21427 | |
Out-of-Bounds | |
CVE-2014-6474 | |
CVE-2014-6489 | |
CVE-2017-10384 | |
CVE-2014-0437 | |
CVE-2014-0402 | |
CVE-2014-0412 | |
CVE-2013-5908 | |
CVE-2014-0386 | |
Out-of-Bounds | |
CVE-2014-0401 | |
CVE-2014-0393 | |
CVE-2017-3317 | |
Information Exposure | |
CVE-2017-3456 | |
CVE-2017-3243 | |
CVE-2017-3238 | |
CVE-2017-3244 | |
Improper Input Validation | |
CVE-2017-3318 | |
CVE-2013-2378 | |
CVE-2013-1552 | |
CVE-2013-1548 | |
CVE-2013-2375 | |
CVE-2013-1531 | |
CVE-2013-1555 | |
CVE-2013-2391 | |
CVE-2013-3808 | |
CVE-2013-2392 | |
CVE-2013-1521 | |
CVE-2013-2389 | |
CVE-2013-1544 | |
CVE-2013-1532 | |
CVE-2013-1506 | |
Improper Input Validation | |
CVE-2016-8283 | |
Incorrect Permission Assignment for Critical Resource | |
Race Condition | |
CVE-2016-5612 | |
Race Condition | |
CVE-2016-3492 | |
CVE-2016-5629 | |
CVE-2016-5624 | |
CVE-2016-5626 | |
SQL Injection | |
CVE-2012-0574 | |
CVE-2012-1705 | |
CVE-2012-1702 | |
Stack-based Buffer Overflow | |
CVE-2016-3615 | |
CVE-2012-0572 | |
CVE-2013-0384 | |
CVE-2013-0383 | |
CVE-2013-0389 | |
CVE-2013-0385 | |
CVE-2012-1688 | |
CVE-2012-1689 | |
CVE-2016-5444 | |
CVE-2016-5440 | |
CVE-2016-0643 | |
CVE-2016-0644 | |
CVE-2016-0646 | |
CVE-2016-0641 | |
CVE-2016-0647 | |
CVE-2016-3452 | |
CVE-2016-0666 | |
CVE-2016-3521 | |
CVE-2016-0640 | |
CVE-2016-0649 | |
CVE-2016-0650 | |
CVE-2016-0648 | |
CVE-2016-3477 | |
CVE-2012-1734 | |
CVE-2012-0540 | |
CVE-2012-3197 | |
CVE-2012-3158 | |
CVE-2012-3166 | |
CVE-2012-3167 | |
CVE-2012-1703 | |
CVE-2012-3173 | |
CVE-2012-1690 | |
CVE-2012-3160 | |
CVE-2012-3163 | |
CVE-2012-3180 | |
Resource Management Errors | |
Incorrect Type Conversion or Cast | |
CVE-2012-3150 | |
CVE-2012-3177 | |
CVE-2015-4861 | |
CVE-2015-4913 | |
CVE-2016-0642 | |
CVE-2015-4879 | |
CVE-2015-4870 | |
CVE-2015-4858 | |
CVE-2015-4816 | |
CVE-2016-0651 | |
CVE-2016-3471 | |
CVE-2015-4836 | |
CVE-2015-4826 | |
CVE-2015-4830 | |
CVE-2015-4815 | |
CVE-2015-4792 | |
CVE-2015-4802 | |
Out-of-Bounds | |
CVE-2012-0102 | |
CVE-2012-0101 | |
CVE-2012-0087 | |
CVE-2012-0116 | |
CVE-2012-0492 | |
CVE-2012-0119 | |
CVE-2012-0118 | |
CVE-2012-0120 | |
CVE-2012-0075 | |
CVE-2012-0485 | |
CVE-2012-0490 | |
CVE-2012-0112 | |
CVE-2012-0115 | |
CVE-2011-2262 | |
CVE-2012-0484 | |
CVE-2012-0114 | |
CVE-2012-0583 | |
CVE-2012-0113 | |
CVE-2015-2568 | |
CVE-2015-4864 | |
CVE-2015-2573 | |
CVE-2015-0441 | |
CVE-2015-0505 | |
CVE-2015-0433 | |
CVE-2015-0501 | |
CVE-2015-2571 | |
CVE-2014-6568 | |
CVE-2015-0382 | |
CVE-2015-0374 | |
CVE-2015-0381 | |
Numeric Errors | |
Resource Management Errors | |
CVE-2010-3683 | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2014-6551 | |
CVE-2014-6530 | |
Resource Management Errors | |
CVE-2010-3681 | |
CVE-2010-3840 | |
Resource Management Errors | |
CVE-2010-3839 | |
CVE-2014-6484 | |
CVE-2010-3680 | |
CVE-2014-6555 | |
Resource Management Errors | |
CVE-2010-3838 | |
CVE-2014-6469 | |
CVE-2014-6464 | |
CVE-2014-6520 | |
CVE-2014-2494 | |
CVE-2014-6463 | |
CVE-2014-4260 | |
CVE-2014-4258 | |
CVE-2014-4243 | |
CVE-2014-6507 | |
CVE-2014-4274 | |
CVE-2014-4287 | |
CVE-2014-6505 | |
CVE-2014-4207 | |
CVE-2014-6559 | |
Information Exposure | |
CVE-2013-3839 | |
CVE-2013-3804 | |
CVE-2013-3802 | |
Out-of-Bounds | |
CVE-2014-2419 | |
CVE-2014-2436 | |
CVE-2014-2432 | |
CVE-2014-2438 | |
CVE-2014-2430 | |
CVE-2014-0384 | |
CVE-2014-2431 | |
CVE-2020-2814 | |
CVE-2020-2763 | |
CVE-2020-2812 | |
CVE-2020-2780 | |
CVE-2020-2752 | |
CVE-2020-2579 | |
Resource Exhaustion | |
CVE-2021-2007 | |
Information Exposure | |
CVE-2020-14550 | |
CVE-2020-14559 | |
CVE-2020-14539 | |
CVE-2021-2022 | |
CVE-2019-2922 | |
CVE-2019-2910 | |
CVE-2019-2923 | |
CVE-2019-2974 | |
CVE-2019-2924 | |
CVE-2019-2911 | |
CVE-2019-2730 | |
CVE-2020-14765 | |
CVE-2020-14812 | |
CVE-2018-2761 | |
CVE-2018-2755 | |
CVE-2018-2819 | |
CVE-2018-3133 | |
CVE-2018-3282 | |
CVE-2018-3174 | |
CVE-2018-3123 | |
CVE-2018-3063 | |
CVE-2018-3066 | |
CVE-2018-3058 | |
CVE-2018-2818 | |
CVE-2018-3081 | |
CVE-2018-2817 | |
CVE-2018-2771 | |
CVE-2018-2813 | |
CVE-2018-2640 | |
CVE-2018-2622 | |
CVE-2018-2665 | |
CVE-2018-2668 | |
CVE-2018-2562 | |
CVE-2018-2781 | |
CVE-2019-2529 | |
CVE-2019-2819 | |
CVE-2019-2614 | |
CVE-2019-2537 | |
CVE-2019-2683 | |
CVE-2019-2740 | |
CVE-2019-2455 | |
CVE-2019-2969 | |
CVE-2019-2481 | |
CVE-2019-2627 | |
CVE-2019-2738 | |
CVE-2019-2805 | |
CVE-2019-2739 | |
CVE-2019-2503 | |
CVE-2019-2737 | |
CVE-2017-3652 | |
CVE-2017-3641 | |
Arbitrary Command Injection | |
CVE-2017-3309 | |
Use After Free | |
CVE-2017-3462 | |
Link Following | |
CVE-2017-3653 | |
CVE-2017-3648 | |
CVE-2017-3651 | |
CVE-2017-3464 | |
CVE-2017-3463 | |
CVE-2017-3636 | |
CVE-2017-3461 | |
CVE-2017-3453 | |
CVE-2017-3308 | |
Untrusted Search Path | |
CVE-2017-3312 | |
Information Exposure | |
Information Exposure | |
Link Following | |
Arbitrary Command Injection | |
CVE-2016-5617 | |
CVE-2021-2060 | |
CVE-2021-2010 | |
CVE-2021-2001 | |
Improper Certificate Validation | |
CVE-2016-0606 | |
CVE-2016-0598 | |
CVE-2016-0502 | |
CVE-2016-0596 | |
CVE-2016-0609 | |
CVE-2016-0608 | |
CVE-2016-0600 | |
CVE-2016-0616 | |
CVE-2016-0597 | |
Buffer Overflow | |
CVE-2016-0505 | |
CVE-2020-14867 | |
CVE-2020-14793 | |
CVE-2020-14769 | |
CVE-2020-14672 | |
Buffer Overflow | |
Improper Access Control | |
CVE-2015-0391 | |
CVE-2015-0411 | |
CVE-2015-0432 | |
SQL Injection | |
Credentials Management | |
Numeric Errors | |
CVE-2012-2750 | |
CVE-2018-2773 | |
CVE-2014-6564 | |
CVE-2010-1849 | |