Insufficiently Protected Credentials | |
Untrusted Search Path | |
Improper Input Validation | |
Information Exposure Through Log Files | |
Incorrect Privilege Assignment | |
Allocation of Resources Without Limits or Throttling | |
Improper Input Validation | |
Resource Exhaustion | |
Directory Traversal | |
Heap-based Buffer Overflow | |
Buffer Overflow | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Link Following | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Untrusted Search Path | |
Integer Overflow or Wraparound | |
Authentication Bypass by Primary Weakness | |
Deserialization of Untrusted Data | |
Improper Input Validation | |
Out-of-Bounds | |
Arbitrary Command Injection | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Directory Traversal | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Improper Privilege Management | |
Stack-based Buffer Overflow | |
Covert Timing Channel | |
Missing Required Cryptographic Step | |
Encoding Error | |
Information Exposure | |