| CVE-2021-3670 | |
| Link Following | |
| Out-of-bounds Read | |
| Incorrect Default Permissions | |
| Race Condition | |
| Race Condition | |
| Improper Input Validation | |
| Incorrect Authorization | |
| Missing Authorization | |
| Use After Free | |
| Improper Input Validation | |
| Race Condition | |
| Improper Authentication | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| CVE-2020-14383 | |
| NULL Pointer Dereference | |
| Incorrect Privilege Assignment | |
| Improper Privilege Management | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| Use After Free | |
| Buffer Overflow | |
| CVE-2019-14902 | |
| Out-of-bounds Read | |
| Improper Authentication | |
| Incorrect Default Permissions | |
| Directory Traversal | |
| Weak Password Requirements | |
| NULL Pointer Dereference | |
| Improperly Implemented Security Check for Standard | |
| Directory Traversal | |
| Out-of-bounds Read | |
| Double Free | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Cryptographic Issues | |
| CVE-2017-12150 | |
| Information Exposure | |
| Race Condition | |
| Incorrect Authorization | |
| NULL Pointer Dereference | |
| Race Condition | |
| Out-of-Bounds | |
| Use After Free | |
| Insufficient Verification of Data Authenticity | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Arbitrary Code Injection | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Security Features | |
| CVE-2015-5370 | |
| Security Features | |
| Security Features | |
| Cryptographic Issues | |
| Security Features | |
| Security Features | |
| Security Features | |
| Improper Access Control | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Information Exposure | |
| Information Exposure | |
| Resource Management Errors | |
| Numeric Errors | |
| Improper Input Validation | |
| Code | |
| Access Restriction Bypass | |
| Arbitrary Code Injection | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| CVE-2014-0178 | |
| Credentials Management | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Cryptographic Issues | |
| Numeric Errors | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Cross-site Request Forgery (CSRF) | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2010-1635 | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Link Following | |
| Improper Input Validation | |
| CVE-2009-2906 | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Use of Externally-Controlled Format String | |
| Improper Input Validation | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| CVE-2007-2447 | |
| CVE-2007-2444 | |
| Out-of-Bounds | |
| Use of Externally-Controlled Format String | |
| CVE-2007-0452 | |
| CVE-2006-3403 | |
| CVE-2006-1059 | |
| CVE-2004-0930 | |
| CVE-2004-0882 | |
| CVE-2004-1154 | |
| CVE-2004-0829 | |
| CVE-2004-0808 | |
| CVE-2004-2546 | |
| CVE-2004-0815 | |
| CVE-2004-0807 | |
| CVE-2004-0686 | |
| CVE-2004-0600 | |
| CVE-2004-0186 | |
| CVE-2004-0082 | |
| CVE-2003-0201 | |
| CVE-2003-0196 | |
| CVE-2003-0086 | |
| CVE-2003-0085 | |
| Out-of-Bounds | |
| CVE-2002-1318 | |