| SQL Injection |  | 
| Arbitrary Code Injection |  | 
| Buffer Overflow |  | 
| Improper Resource Shutdown or Release |  | 
| CVE-2020-35652 |  | 
| Improper Resource Shutdown or Release |  | 
| Uncontrolled Recursion |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| NULL Pointer Dereference |  | 
| NULL Pointer Dereference |  | 
| Out-of-Bounds |  | 
| NULL Pointer Dereference |  | 
| Resource Exhaustion |  | 
| Incorrect Authorization |  | 
| NULL Pointer Dereference |  | 
| Information Exposure |  | 
| CVE-2018-7286 |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Incomplete Cleanup |  | 
| Out-of-Bounds |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Information Exposure |  | 
| OS Command Injection |  | 
| Information Exposure |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Improper Authorization |  | 
| CVE-2016-2232 |  | 
| Integer Underflow |  | 
| Cryptographic Issues |  | 
| Resource Management Errors |  | 
| CVE-2014-9374 |  | 
| Improper Data Handling |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Resource Management Errors |  | 
| CVE-2014-4047 |  | 
| CVE-2014-4046 |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| CVE-2012-2186 |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Improper Access Control |  | 
| Out-of-Bounds |  | 
| Improper Authentication |  | 
| Out-of-Bounds |  | 
| CVE-2012-0885 |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Configuration |  | 
| Out-of-Bounds |  | 
| CVE-2011-2665 |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| CVE-2011-2216 |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| CVE-2011-1175 |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Access Restriction Bypass |  | 
| CVE-2010-0685 |  | 
| Improper Input Validation |  | 
| CVE-2009-4055 |  | 
| Information Exposure |  | 
| CVE-2008-7220 |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Information Exposure |  | 
| Improper Authentication |  | 
| Information Exposure |  | 
| Improper Authentication |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Improper Authentication |  | 
| Configuration |  | 
| Out-of-Bounds |  | 
| Credentials Management |  | 
| Use of Externally-Controlled Format String |  | 
| Access Restriction Bypass |  | 
| Resource Management Errors |  | 
| Improper Authentication |  | 
| SQL Injection |  | 
| SQL Injection |  | 
| Out-of-Bounds |  | 
| CVE-2007-4455 |  | 
| CVE-2007-4280 |  | 
| CVE-2007-4103 |  | 
| CVE-2007-3762 |  | 
| CVE-2007-3765 |  | 
| CVE-2007-3763 |  | 
| CVE-2007-3764 |  | 
| CVE-2007-2488 |  | 
| CVE-2007-2383 |  | 
| CVE-2007-2293 |  | 
| CVE-2007-2294 |  | 
| CVE-2007-2297 |  | 
| CVE-2007-1595 |  | 
| CVE-2007-1561 |  | 
| CVE-2007-1306 |  | 
| CVE-2006-5445 |  | 
| CVE-2006-5444 |  | 
| CVE-2006-4345 |  | 
| CVE-2006-4346 |  | 
| Out-of-Bounds |  | 
| CVE-2006-1827 |  | 
| CVE-2005-3559 |  | 
| CVE-2005-2081 |  | 
| CVE-2003-0779 |  | 
| CVE-2003-0761 |  |