Resource Leak | |
Improper Check for Unusual or Exceptional Conditions | |
Resource Exhaustion | |
Incorrect Regular Expression | |
Authentication Bypass by Primary Weakness | |
Uncontrolled Recursion | |
Improper Input Validation | |
Improper Input Validation | |
Resource Exhaustion | |
Directory Traversal | |
Incorrect Type Conversion or Cast | |
Open Redirect | |
Improper Input Validation | |
Arbitrary Code Injection | |
Unchecked Return Value | |
Directory Traversal | |
Resource Exhaustion | |
Buffer Overflow | |
Resource Exhaustion | |
HTTP Request Smuggling | |
Integer Overflow or Wraparound | |
Cross-site Scripting (XSS) | |
Covert Timing Channel | |
Eval Injection | |
Improper Input Validation | |
HTTP Response Splitting | |
HTTP Response Splitting | |
Improper Input Validation | |
Information Exposure | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Directory Traversal | |
Improper Input Validation | |
Use After Free | |