CVE-2024-45802 | |
CVE-2024-37894 | |
CVE-2024-25111 | |
Collapse of Data into Unsafe Value | |
Operation on a Resource after Expiration or Release | |
Uncontrolled Recursion | |
Out-of-bounds Read | |
Use After Free | |
Reachable Assertion | |
Buffer Overflow | |
Incorrect Conversion between Numeric Types | |
Improper Certificate Validation | |
Improper Handling of Exceptional Conditions | |
NULL Pointer Dereference | |
HTTP Request Smuggling | |
Integer Overflow or Wraparound | |
Insufficient Comparison | |
Reachable Assertion | |
Improper Certificate Validation | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Improper Encoding or Escaping of Output | |
Memory Leak | |
Memory Leak | |
Improper Encoding or Escaping of Output | |
Improper Input Validation | |
Out-of-bounds Read | |
Improper Input Validation | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Improper Privilege Management | |
NULL Pointer Dereference | |
HTTP Request Smuggling | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Missing Authentication for Critical Function | |
Arbitrary Code Injection | |
Improper Input Validation | |
Information Exposure | |
Exposure of Resource to Wrong Sphere | |
Out-of-Bounds | |
Out-of-bounds Write | |
CVE-2019-12523 | |
Buffer Overflow | |
Information Exposure | |
HTTP Request Smuggling | |
Cross-site Request Forgery (CSRF) | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Missing Release of Resource after Effective Lifetime | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2018-1000024 | |
Insufficient Verification of Data Authenticity | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Improper Input Validation | |
CVE-2015-0881 | |
Improper Data Handling | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2010-0639 | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2007-1560 | |
Resource Management Errors | |
CVE-2007-0248 | |
CVE-2005-2917 | |
CVE-2005-2796 | |
CVE-2005-2794 | |
CVE-2005-1519 | |
CVE-2005-1345 | |
CVE-2005-0194 | |
Out-of-Bounds | |
CVE-2005-0446 | |
CVE-2005-0173 | |
CVE-2005-0241 | |
CVE-2005-0718 | |
CVE-2005-0626 | |
CVE-2005-0174 | |
CVE-2005-0175 | |
Resource Management Errors | |
CVE-2005-0096 | |
CVE-2005-0094 | |
CVE-2005-0095 | |
CVE-2005-0097 | |
CVE-2004-2479 | |
CVE-2004-2654 | |
CVE-2004-2480 | |
CVE-2004-0832 | |
CVE-2004-0541 | |
CVE-2004-0189 | |
CVE-2002-0916 | |
CVE-2002-0713 | |
CVE-2002-0715 | |
CVE-2002-0714 | |
CVE-1999-0710 | |