| CVE-2024-37894 | |
| Uncontrolled Recursion | |
| CVE-2024-25617 | |
| Operation on a Resource after Expiration or Release | |
| Uncontrolled Recursion | |
| Reachable Assertion | |
| Out-of-bounds Read | |
| Use After Free | |
| NULL Pointer Dereference | |
| Improper Handling of Exceptional Conditions | |
| HTTP Request Smuggling | |
| Buffer Overflow | |
| Integer Overflow or Wraparound | |
| Insufficient Comparison | |
| Reachable Assertion | |
| Improper Input Validation | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Improper Encoding or Escaping of Output | |
| Memory Leak | |
| Memory Leak | |
| Improper Encoding or Escaping of Output | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Improper Privilege Management | |
| NULL Pointer Dereference | |
| HTTP Request Smuggling | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Missing Authentication for Critical Function | |
| Arbitrary Code Injection | |
| Improper Input Validation | |
| Information Exposure | |
| Exposure of Resource to Wrong Sphere | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| CVE-2019-12523 | |
| Buffer Overflow | |
| Information Exposure | |
| HTTP Request Smuggling | |
| Cross-site Request Forgery (CSRF) | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Missing Release of Resource after Effective Lifetime | |
| NULL Pointer Dereference | |
| CVE-2018-1000024 | |
| NULL Pointer Dereference | |
| Insufficient Verification of Data Authenticity | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| CVE-2015-0881 | |
| Improper Input Validation | |
| Improper Data Handling | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| CVE-2010-0639 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2007-1560 | |
| Resource Management Errors | |
| CVE-2007-0248 | |
| CVE-2005-2917 | |
| CVE-2005-2794 | |
| CVE-2005-2796 | |
| CVE-2005-1519 | |
| CVE-2005-0446 | |
| CVE-2005-0241 | |
| CVE-2005-0173 | |
| CVE-2005-1345 | |
| Out-of-Bounds | |
| CVE-2005-0194 | |
| CVE-2005-0718 | |
| CVE-2005-0626 | |
| CVE-2005-0174 | |
| CVE-2005-0175 | |
| Resource Management Errors | |
| CVE-2005-0096 | |
| CVE-2005-0095 | |
| CVE-2005-0094 | |
| CVE-2005-0097 | |
| CVE-2004-2480 | |
| CVE-2004-2479 | |
| CVE-2004-2654 | |
| CVE-2004-0832 | |
| CVE-2004-0541 | |
| CVE-2004-0189 | |
| CVE-2002-0916 | |
| CVE-2002-0715 | |
| CVE-2002-0714 | |
| CVE-2002-0713 | |
| CVE-1999-0710 | |