Heap-based Buffer Overflow | |
Resource Exhaustion | |
Integer Overflow to Buffer Overflow | |
Asymmetric Resource Consumption (Amplification) | |
Incomplete Model of Endpoint Features | |
Use of a Broken or Risky Cryptographic Algorithm | |
Off-by-one Error | |
Reachable Assertion | |
Use of a Broken or Risky Cryptographic Algorithm | |
Reachable Assertion | |
Improper Check for Unusual or Exceptional Conditions | |
Allocation of Resources Without Limits or Throttling | |
NULL Pointer Dereference | |
Allocation of Resources Without Limits or Throttling | |
Improper Check for Unusual or Exceptional Conditions | |
Allocation of Resources Without Limits or Throttling | |
Buffer Overflow | |
CVE-2024-28870 | |
Allocation of Resources Without Limits or Throttling | |
CVE-2023-35853 | |
Directory Traversal | |
CVE-2021-45098 | |
Out-of-bounds Write | |
CVE-2021-35063 | |
CVE-2019-18625 | |
Arbitrary Code Injection | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Enforcement of Message or Data Structure | |
Improper Check for Unusual or Exceptional Conditions | |
Improper Verification of Cryptographic Signature | |
Improper Input Validation | |
Integer Underflow | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2018-14568 | |
Protection Mechanism Failure | |
CVE-2017-15377 | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Improperly Implemented Security Check for Standard | |
Resource Management Errors | |
Resource Management Errors | |
Improper Input Validation | |