Insufficient Verification of Data Authenticity
| |
CVE-2023-42117
| |
CVE-2023-42116
| |
CVE-2023-42114
| |
CVE-2023-42119
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Arbitrary Code Injection
| |
Arbitrary Argument Injection
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
CVE-2020-28021
| |
Improper Initialization
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
CVE-2020-28015
| |
CVE-2020-28014
| |
Out-of-bounds Write
| |
Exposure of Resource to Wrong Sphere
| |
Out-of-bounds Write
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Link Following
| |
Out-of-bounds Read
| |
Buffer Overflow
| |
CVE-2019-15846
| |
Improper Data Handling
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Use After Free
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Resource Shutdown or Release
| |
Key Management Errors
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Numeric Errors
| |
Out-of-Bounds
| |
Use of Externally-Controlled Format String
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Access Restriction Bypass
| |
Race Condition
| |
Race Condition
| |
CVE-2005-0021
| |
CVE-2005-0022
| |
CVE-2004-0399
| |
CVE-2004-0400
| |
CVE-2002-1381
| |