Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Out-of-bounds Read | |
CVE-2020-7066 | |
Improper Preservation of Permissions | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Arbitrary Code Injection | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Improper Input Validation | |
Use of Uninitialized Resource | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Deserialization of Untrusted Data | |
NULL Pointer Dereference | |
Arbitrary Argument Injection | |
Cross-site Scripting (XSS) | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Missing Release of Resource after Effective Lifetime | |
Out-of-bounds Read | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Cross-site Scripting (XSS) | |
NULL Pointer Dereference | |
Information Exposure | |
Out-of-Bounds | |
Resource Exhaustion | |
Improper Input Validation | |
Incorrect Conversion between Numeric Types | |
Cross-site Scripting (XSS) | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-bounds Read | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Exhaustion | |
Out-of-bounds Read | |
Use After Free | |
Improper Check for Unusual or Exceptional Conditions | |
Improper Input Validation | |
Information Exposure | |
Use After Free | |
Resource Exhaustion | |
Out-of-bounds Write | |
Server-Side Request Forgery (SSRF) | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Access Restriction Bypass | |
Arbitrary Code Injection | |
Numeric Errors | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Out-of-bounds Read | |
Use After Free | |
CVE-2016-7478 | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Deserialization of Untrusted Data | |
Arbitrary Code Injection | |
Information Exposure | |
Out-of-Bounds | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Use After Free | |
Double Free | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Use After Free | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Double Free | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Out-of-Bounds | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Use After Free | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Access Control | |
CVE-2016-4540 | |
Improper Input Validation | |
Out-of-Bounds | |
Cryptographic Issues | |
Out-of-Bounds | |
CVE-2016-4541 | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2015-8876 | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2016-4343 | |
Improper Input Validation | |
CVE-2015-8866 | |
Directory Traversal | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Numeric Errors | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2015-4599 | |
CVE-2015-4601 | |
CVE-2015-6835 | |
CVE-2015-6837 | |
Improper Input Validation | |
CVE-2015-6834 | |
CVE-2015-4116 | |
Improper Input Validation | |
CVE-2015-4600 | |
CVE-2015-4602 | |
Improper Input Validation | |
CVE-2015-8835 | |
Improper Input Validation | |
CVE-2015-4603 | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Improper Access Control | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2015-6838 | |
CVE-2014-0236 | |
CVE-2015-4644 | |
Numeric Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2015-6832 | |
Directory Traversal | |
CVE-2015-6836 | |
CVE-2015-6831 | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2015-7803 | |
Numeric Errors | |
Improper Input Validation | |
Numeric Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Numeric Errors | |
Resource Management Errors | |
Improper Data Handling | |
Improper Input Validation | |
Improper Data Handling | |
Out-of-Bounds | |
Improper Data Handling | |
Out-of-Bounds | |
Numeric Errors | |
CVE-2015-1352 | |
CVE-2015-2301 | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2015-2787 | |
CVE-2015-0273 | |
Use After Free | |
Numeric Errors | |
Arbitrary Code Injection | |
Access Restriction Bypass | |
CVE-2015-0232 | |
CVE-2015-0231 | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2014-9425 | |
CVE-2014-8142 | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Numeric Errors | |
Link Following | |
Out-of-Bounds | |
Improper Input Validation | |
Numeric Errors | |
CVE-2014-4698 | |
CVE-2014-4670 | |
Improper Input Validation | |
Numeric Errors | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2014-3515 | |
Out-of-Bounds | |
Information Exposure | |
Resource Management Errors | |
Out-of-Bounds | |
Link Following | |
Resource Management Errors | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
Numeric Errors | |
Improper Input Validation | |
Numeric Errors | |
Numeric Errors | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-Bounds | |
Improper Input Validation | |
Numeric Errors | |
Out-of-Bounds | |
Improper Input Validation | |
Access Restriction Bypass | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Cryptographic Issues | |
CVE-2012-3450 | |
CVE-2012-2688 | |
Access Restriction Bypass | |
Numeric Errors | |
Cryptographic Issues | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
SQL Injection | |
Out-of-Bounds | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Resource Management Errors | |
Access Restriction Bypass | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Numeric Errors | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Resource Management Errors | |
Cryptographic Issues | |
CVE-2011-3182 | |
Resource Management Errors | |
Cryptographic Issues | |
Access Restriction Bypass | |
Out-of-Bounds | |
Link Following | |
Resource Management Errors | |
Improper Input Validation | |
Numeric Errors | |
CVE-2011-0421 | |
Numeric Errors | |
CVE-2011-1467 | |
CVE-2011-1469 | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Use of Externally-Controlled Format String | |
Numeric Errors | |
Link Following | |
CVE-2011-0420 | |
Improper Input Validation | |
Race Condition | |
Numeric Errors | |
Improper Input Validation | |
Out-of-Bounds | |
Numeric Errors | |
Resource Management Errors | |
Numeric Errors | |
Resource Management Errors | |
Numeric Errors | |
Numeric Errors | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Resource Management Errors | |
Use of Externally-Controlled Format String | |
Information Exposure | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
Information Exposure | |
Resource Management Errors | |
Information Exposure | |
Information Exposure | |
Use of Externally-Controlled Format String | |
Information Exposure | |
Information Exposure | |
Resource Management Errors | |
Information Exposure | |
Information Exposure | |
Arbitrary Code Injection | |
Numeric Errors | |
Information Exposure | |
Resource Management Errors | |
Information Exposure | |
Access Restriction Bypass | |
Cryptographic Issues | |
Improper Input Validation | |
CVE-2010-0397 | |
Numeric Errors | |
CVE-2009-4143 | |
Cross-site Scripting (XSS) | |
CVE-2009-2626 | |
Access Restriction Bypass | |
CVE-2009-4017 | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2009-3559 | |
CVE-2009-3292 | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2009-1271 | |
Use of Externally-Controlled Format String | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Directory Traversal | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Numeric Errors | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Directory Traversal | |
Directory Traversal | |
Numeric Errors | |
Numeric Errors | |
CVE-2008-0599 | |
CVE-2008-2051 | |
Out-of-Bounds | |
Numeric Errors | |
Access Restriction Bypass | |
Information Exposure | |
Improper Input Validation | |
CVE-2007-5898 | |
CVE-2007-5424 | |
CVE-2007-4889 | |
Improper Input Validation | |
Directory Traversal | |
Improper Input Validation | |
Improper Input Validation | |
Arbitrary Code Injection | |
CVE-2007-4670 | |
Out-of-Bounds | |
Directory Traversal | |
Out-of-Bounds | |
CVE-2007-4659 | |
Resource Management Errors | |
CVE-2007-4658 | |
Out-of-Bounds | |
Link Following | |
Access Restriction Bypass | |
Improper Input Validation | |
Arbitrary Code Injection | |
CVE-2007-4255 | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-Bounds | |
CVE-2007-3205 | |
Access Restriction Bypass | |
Numeric Errors | |
CVE-2007-0448 | |
CVE-2006-7205 | |
CVE-2007-2519 | |
CVE-2007-2728 | |
CVE-2007-2727 | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
CVE-2007-2511 | |
CVE-2007-1900 | |
CVE-2007-1890 | |
CVE-2007-1883 | |
CVE-2007-1887 | |
CVE-2007-1889 | |
CVE-2007-1835 | |
CVE-2007-1824 | |
CVE-2007-1777 | |
CVE-2007-1718 | |
CVE-2007-1717 | |
CVE-2007-1711 | |
Deserialization of Untrusted Data | |
CVE-2007-1700 | |
CVE-2007-1710 | |
CVE-2007-1649 | |
Arbitrary Code Injection | |
CVE-2007-1583 | |
CVE-2007-1582 | |
CVE-2007-1521 | |
CVE-2007-1522 | |
CVE-2007-1484 | |
Access Restriction Bypass | |
CVE-2007-1453 | |
Access Restriction Bypass | |
CVE-2007-1454 | |
Out-of-Bounds | |
CVE-2007-1396 | |
CVE-2007-1399 | |
CVE-2007-1375 | |
CVE-2007-1376 | |
CVE-2007-1380 | |
CVE-2007-1286 | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2007-0907 | |
Out-of-Bounds | |
CVE-2007-0909 | |
Improper Input Validation | |
CVE-2007-0911 | |
CVE-2007-0905 | |
CVE-2007-0910 | |
Improper Input Validation | |
CVE-2006-5706 | |
CVE-2006-5465 | |
Arbitrary Code Injection | |
Race Condition | |
CVE-2006-4625 | |
CVE-2006-4481 | |
Numeric Errors | |
CVE-2006-4485 | |
CVE-2006-4483 | |
Out-of-Bounds | |
CVE-2006-4433 | |
CVE-2006-4023 | |
CVE-2006-4020 | |
Access Restriction Bypass | |
CVE-2006-3016 | |
CVE-2006-3018 | |
CVE-2006-3017 | |
CVE-2006-2660 | |
CVE-2006-2563 | |
Resource Management Errors | |
CVE-2006-1990 | |
Resource Management Errors | |
CVE-2006-1608 | |
CVE-2006-1494 | |
Cross-site Scripting (XSS) | |
CVE-2006-1490 | |
CVE-2006-1015 | |
CVE-2006-1014 | |
Directory Traversal | |
Cross-site Scripting (XSS) | |
Use of Externally-Controlled Format String | |
Arbitrary Code Injection | |
CVE-2005-4154 | |
CVE-2005-3883 | |
CVE-2005-3353 | |
CVE-2005-3389 | |
CVE-2005-3390 | |
CVE-2005-3388 | |
CVE-2005-3392 | |
CVE-2005-3391 | |
CVE-2005-3319 | |
CVE-2005-3054 | |
CVE-2005-2498 | |
CVE-2002-1954 | |