Externally Controlled Reference to a Resource in Another Sphere | |
Time-of-check Time-of-use (TOCTOU) | |
Integer Overflow or Wraparound | |
Incomplete Cleanup | |
Integer Overflow or Wraparound | |
SQL Injection | |
Use of a Broken or Risky Cryptographic Algorithm | |
SQL Injection | |
SQL Injection | |
Link Following | |
Link Following | |
CVE-2017-7547 | |
Improper Authentication | |
Information Exposure | |
Information Exposure | |
Arbitrary Code Injection | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
CVE-2015-3165 | |
Information Exposure | |
Information Exposure | |
Buffer Overflow | |
SQL Injection | |
Buffer Overflow | |