Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Heap-based Buffer Overflow | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Improper Output Neutralization for Logs | |
Uncontrolled Memory Allocation | |
Out-of-bounds Read | |
Directory Traversal | |
Integer Coercion Error | |
Improper Access Control | |
Resource Leak | |
CVE-2017-10176 | |
Covert Timing Channel | |
Allocation of Resources Without Limits or Throttling | |
Unsynchronized Access to Shared Data in a Multithreaded Context | |
Untrusted Search Path | |
Deserialization of Untrusted Data | |
CVE-2018-2582 | |
Improper Access Control | |
Improper Input Validation | |
Use After Free | |
Allocation of Resources Without Limits or Throttling | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of Insufficiently Random Values | |
Improper Input Validation | |
LDAP Injection | |
Use After Free | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
CVE-2017-10355 | |
Insufficient Verification of Data Authenticity | |
Allocation of Resources Without Limits or Throttling | |
Use of a Broken or Risky Cryptographic Algorithm | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
CVE-2017-10274 | |
Allocation of Resources Without Limits or Throttling | |
CVE-2017-10346 | |
CVE-2017-10285 | |
HTTP Response Splitting | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
CVE-2015-0470 | |
Directory Traversal | |
Uncaught Exception | |
Off-by-one Error | |
Directory Traversal | |
CVE-2015-0460 | |
CVE-2015-0477 | |
Improperly Implemented Security Check for Standard | |
Out-of-Bounds | |
Uncaught Exception | |
Improper Input Validation | |
CVE-2020-2781 | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
HTTP Response Splitting | |
Uncaught Exception | |
Incorrect Regular Expression | |