CVE-2024-1737
| |
CVE-2024-1975
| |
CVE-2024-4076
| |
CVE-2024-0760
| |
CVE-2023-5679
| |
CVE-2023-4408
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2023-5517
| |
CVE-2023-6516
| |
CVE-2023-50868
| |
Out-of-bounds Write
| |
Reachable Assertion
| |
Allocation of Resources Without Limits or Throttling
| |
Out-of-bounds Write
| |
Reachable Assertion
| |
Use After Free
| |
CVE-2022-3736
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
CVE-2022-2795
| |
CVE-2022-3080
| |
Out-of-bounds Read
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Improper Resource Shutdown or Release
| |
HTTP Request Smuggling
| |
CVE-2021-25219
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Buffer Overflow
| |
Improper Privilege Management
| |
Reachable Assertion
| |
Improper Privilege Management
| |
Improper Input Validation
| |
Reachable Assertion
| |
Improper Resource Shutdown or Release
| |
Reachable Assertion
| |
Reachable Assertion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Race Condition
| |
Allocation of Resources Without Limits or Throttling
| |
Missing Release of Resource after Effective Lifetime
| |
Incorrect Permission Assignment for Critical Resource
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Incorrect Authorization
| |
Reachable Assertion
| |
Use After Free
| |
Reachable Assertion
| |
Reachable Assertion
| |
NULL Pointer Dereference
| |
Reachable Assertion
| |
Improper Input Validation
| |
CVE-2017-3143
| |
Information Exposure
| |
Reachable Assertion
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Reachable Assertion
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Data Handling
| |
Code
| |
Resource Management Errors
| |
Resource Management Errors
| |
Out-of-Bounds
| |
CVE-2013-4854
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Improper Input Validation
| |
Numeric Errors
| |
CVE-2012-4244
| |
Improper Input Validation
| |
Numeric Errors
| |
CVE-2012-1033
| |
CVE-2011-4313
| |
CVE-2011-2464
| |
CVE-2011-2465
| |
Numeric Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Improper Data Handling
| |
CVE-2010-0290
| |
Improper Input Validation
| |
CVE-2010-0382
| |
CVE-2009-4022
| |
Configuration
| |
Improper Authentication
| |
Insufficient Entropy
| |
CVE-2007-2925
| |
CVE-2007-2926
| |
CVE-2007-2241
| |
CVE-2007-0493
| |
Improper Data Handling
| |
CVE-2006-4096
| |
CVE-2006-4095
| |
CVE-2006-2073
| |
CVE-2006-0987
| |
CVE-2005-0034
| |