CVE-2024-4076 | |
CVE-2024-1975 | |
CVE-2024-1737 | |
CVE-2023-4408 | |
Allocation of Resources Without Limits or Throttling | |
CVE-2023-5679 | |
CVE-2023-50868 | |
Allocation of Resources Without Limits or Throttling | |
Reachable Assertion | |
Out-of-bounds Write | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Write | |
Reachable Assertion | |
Use After Free | |
CVE-2022-3736 | |
Memory Leak | |
Memory Leak | |
CVE-2022-2795 | |
CVE-2022-3080 | |
Out-of-bounds Read | |
Improper Resource Shutdown or Release | |
HTTP Request Smuggling | |
CVE-2021-25219 | |
Reachable Assertion | |
Reachable Assertion | |
Reachable Assertion | |
Buffer Overflow | |
Improper Privilege Management | |
Reachable Assertion | |
Improper Privilege Management | |
Improper Input Validation | |
Reachable Assertion | |
Improper Resource Shutdown or Release | |
Reachable Assertion | |
Reachable Assertion | |
Resource Exhaustion | |
Resource Exhaustion | |
Race Condition | |
Allocation of Resources Without Limits or Throttling | |
Missing Release of Resource after Effective Lifetime | |
Incorrect Permission Assignment for Critical Resource | |
Use of a Broken or Risky Cryptographic Algorithm | |
Incorrect Authorization | |
Reachable Assertion | |
Use After Free | |
Reachable Assertion | |
Reachable Assertion | |
NULL Pointer Dereference | |
Reachable Assertion | |
Improper Input Validation | |
CVE-2017-3143 | |
Information Exposure | |
Reachable Assertion | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Reachable Assertion | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Data Handling | |
Code | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2013-4854 | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Numeric Errors | |
CVE-2012-4244 | |
Improper Input Validation | |
Numeric Errors | |
CVE-2012-1033 | |
CVE-2011-4313 | |
CVE-2011-2465 | |
CVE-2011-2464 | |
Numeric Errors | |
Resource Management Errors | |
Resource Management Errors | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
Improper Data Handling | |
Improper Input Validation | |
CVE-2010-0290 | |
CVE-2010-0382 | |
CVE-2009-4022 | |
Configuration | |
Improper Authentication | |
Insufficient Entropy | |
CVE-2007-2926 | |
CVE-2007-2925 | |
CVE-2007-2241 | |
Improper Data Handling | |
CVE-2007-0493 | |
CVE-2006-4095 | |
CVE-2006-4096 | |
CVE-2006-2073 | |
CVE-2006-0987 | |
CVE-2005-0034 | |