|
Missing Release of Resource after Effective Lifetime
| |
|
External Control of File Name or Path
| |
|
Improper Synchronization
| |
|
Expected Behavior Violation
| |
|
Improper Certificate Validation
| |
|
Authentication Bypass by Primary Weakness
| |
|
Authentication Bypass by Primary Weakness
| |
|
Directory Traversal
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Cleartext Transmission of Sensitive Information
| |
|
Use After Free
| |
|
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
| |
|
Information Exposure
| |
|
Inappropriate Encoding for Output Context
| |
|
Release of Invalid Pointer or Reference
| |
|
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
|
Cleartext Transmission of Sensitive Information
| |
|
Improper Certificate Validation
| |
|
Insufficiently Protected Credentials
| |
|
Insufficiently Protected Credentials
| |
|
Improper Authentication
| |
|
Improper Authentication
| |
|
Improper Authentication
| |
|
Heap-based Buffer Overflow
| |
|
Information Exposure
| |
|
Out-of-bounds Read
| |
|
Improper Input Validation
| |
|
Improper Authentication
| |
|
HTTP Response Splitting
| |
|
Improper Authentication
| |
|
Credentials Management
| |
|
Uncontrolled Recursion
| |
|
Information Exposure
| |
|
Heap-based Buffer Overflow
| |
|
Heap-based Buffer Overflow
| |
|
Out-of-bounds Read
| |
|
Incorrect Calculation of Buffer Size
| |
|
Out-of-bounds Write
| |
|
Information Exposure
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Improper Authentication
| |
|
Heap-based Buffer Overflow
| |
|
Out-of-bounds Read
| |
|
Improper Certificate Validation
| |
|
Improper Input Validation
| |
|
Use After Free
| |
|
Improper Input Validation
| |
|
Integer Overflow or Wraparound
| |
|
Use After Free
| |
|
Out-of-bounds Write
| |
|
Use After Free
| |
|
Resource Injection
| |
|
Use of Uninitialized Resource
| |
|
Use of Uninitialized Resource
| |
|
Improper Certificate Validation
| |
|
Information Exposure
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Authentication
| |
|
Information Exposure
| |