NULL Pointer Dereference | |
Improper Locking | |
Improper Handling of Values | |
Improper Handling of Values | |
Improper Handling of Values | |
Improper Handling of Values | |
Improper Handling of Values | |
Improper Handling of Values | |
Improper Locking | |
Improper Resource Shutdown or Release | |
Improper Locking | |
Improper Resource Shutdown or Release | |
CVE-2022-21451 | |
CVE-2022-21427 | |
Reachable Assertion | |
Reachable Assertion | |
Reachable Assertion | |
Reachable Assertion | |
Reachable Assertion | |
Reachable Assertion | |
CVE-2022-27445 | |
Out-of-Bounds | |
SQL Injection | |
SQL Injection | |
Use After Free | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
Reachable Assertion | |
Use After Free | |
Improper Use of Validation Framework | |
Buffer Overflow | |
Heap-based Buffer Overflow | |
Improper Input Validation | |
Use After Free | |
Resource Exhaustion | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
NULL Pointer Dereference | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2021-35604 | |
CVE-2014-6474 | |
CVE-2014-6489 | |
CVE-2021-2389 | |
CVE-2021-2372 | |
Missing Required Cryptographic Step | |
CVE-2017-10378 | |
CVE-2017-10384 | |
CVE-2017-3317 | |
Information Exposure | |
CVE-2017-3456 | |
CVE-2017-3243 | |
CVE-2017-3238 | |
CVE-2017-3244 | |
Improper Input Validation | |
CVE-2017-3318 | |
CVE-2016-8283 | |
Incorrect Permission Assignment for Critical Resource | |
Race Condition | |
CVE-2016-5612 | |
Race Condition | |
CVE-2016-3492 | |
CVE-2016-5629 | |
CVE-2016-5624 | |
CVE-2016-5626 | |
CVE-2016-3615 | |
CVE-2016-5444 | |
CVE-2016-5440 | |
CVE-2016-0643 | |
CVE-2016-0644 | |
CVE-2016-0646 | |
CVE-2016-0641 | |
CVE-2016-0647 | |
CVE-2016-3452 | |
CVE-2016-0666 | |
CVE-2016-3521 | |
CVE-2016-0640 | |
CVE-2016-0649 | |
CVE-2016-0650 | |
CVE-2016-0648 | |
CVE-2016-3477 | |
CVE-2015-4861 | |
CVE-2015-4913 | |
CVE-2016-0642 | |
CVE-2015-4879 | |
CVE-2015-4870 | |
CVE-2015-4858 | |
CVE-2015-4816 | |
CVE-2016-0651 | |
CVE-2016-3471 | |
CVE-2015-4836 | |
CVE-2015-4826 | |
CVE-2015-4830 | |
CVE-2015-4815 | |
CVE-2015-4792 | |
CVE-2015-4802 | |
CVE-2021-2144 | |
CVE-2015-0499 | |
CVE-2015-2568 | |
CVE-2015-4752 | |
CVE-2015-4757 | |
CVE-2015-4864 | |
CVE-2015-2643 | |
CVE-2015-2573 | |
CVE-2015-2620 | |
CVE-2015-0441 | |
CVE-2015-2648 | |
CVE-2015-2582 | |
CVE-2015-0505 | |
CVE-2015-4737 | |
CVE-2015-0433 | |
CVE-2015-0501 | |
CVE-2015-2571 | |
CVE-2014-6568 | |
CVE-2015-0382 | |
CVE-2015-0374 | |
CVE-2015-0381 | |
CVE-2014-6551 | |
CVE-2014-6530 | |
CVE-2014-6484 | |
CVE-2014-6555 | |
CVE-2014-6469 | |
CVE-2014-6464 | |
CVE-2014-6520 | |
CVE-2014-2494 | |
CVE-2014-6463 | |
CVE-2014-4260 | |
CVE-2014-4258 | |
CVE-2014-4243 | |
CVE-2014-6507 | |
CVE-2014-4274 | |
CVE-2014-4287 | |
CVE-2014-6505 | |
CVE-2014-4207 | |
CVE-2014-6559 | |
Information Exposure | |
CVE-2014-2419 | |
CVE-2014-2436 | |
CVE-2014-2432 | |
CVE-2014-2438 | |
CVE-2014-2430 | |
CVE-2014-0384 | |
CVE-2014-2431 | |
CVE-2020-2812 | |
CVE-2020-2780 | |
CVE-2020-2752 | |
Resource Exhaustion | |
CVE-2021-2007 | |
Information Exposure | |
CVE-2020-14550 | |
CVE-2021-2194 | |
CVE-2021-2022 | |
CVE-2019-2974 | |
CVE-2020-14765 | |
CVE-2020-14812 | |
CVE-2018-2761 | |
CVE-2018-2755 | |
CVE-2018-2819 | |
CVE-2018-3133 | |
CVE-2018-3282 | |
CVE-2018-3063 | |
CVE-2018-3066 | |
CVE-2018-3058 | |
CVE-2018-3081 | |
CVE-2018-2817 | |
CVE-2018-2771 | |
CVE-2018-2813 | |
CVE-2018-2640 | |
CVE-2018-2622 | |
CVE-2018-2665 | |
CVE-2018-2668 | |
CVE-2018-2562 | |
CVE-2018-2781 | |
CVE-2019-2529 | |
CVE-2019-2614 | |
CVE-2019-2740 | |
CVE-2019-2455 | |
CVE-2019-2481 | |
CVE-2019-2627 | |
CVE-2019-2805 | |
CVE-2019-2739 | |
CVE-2019-2503 | |
CVE-2019-2737 | |
CVE-2017-3641 | |
Arbitrary Command Injection | |
CVE-2017-3309 | |
Use After Free | |
Link Following | |
CVE-2017-3653 | |
CVE-2017-3651 | |
CVE-2017-3464 | |
CVE-2017-3636 | |
CVE-2017-3453 | |
CVE-2017-3308 | |
Untrusted Search Path | |
CVE-2017-3312 | |
Information Exposure | |
Information Exposure | |
Link Following | |
Arbitrary Command Injection | |
CVE-2016-5617 | |
CVE-2021-2180 | |
CVE-2021-2166 | |
CVE-2021-2154 | |
CVE-2021-2011 | |
Improper Certificate Validation | |
CVE-2016-0606 | |
CVE-2016-0598 | |
CVE-2016-0596 | |
CVE-2016-0609 | |
CVE-2016-0608 | |
CVE-2016-0600 | |
CVE-2016-0616 | |
CVE-2016-0597 | |
Buffer Overflow | |
CVE-2016-0505 | |
Buffer Overflow | |
Improper Access Control | |
CVE-2015-0391 | |
CVE-2015-0411 | |
CVE-2015-0432 | |
Numeric Errors | |
CVE-2018-2773 | |
CVE-2014-6564 | |