|
CVE-2024-21147
| |
|
Out-of-bounds Read
| |
|
Improper Input Validation
| |
|
CVE-2024-21140
| |
|
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
|
CVE-2024-21131
| |
|
CVE-2024-21147
| |
|
Out-of-bounds Read
| |
|
Improper Input Validation
| |
|
CVE-2024-21140
| |
|
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
|
CVE-2024-21131
| |
|
CVE-2024-21147
| |
|
Out-of-bounds Read
| |
|
Improper Input Validation
| |
|
CVE-2024-21140
| |
|
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
|
CVE-2024-21131
| |
|
CVE-2024-21147
| |
|
Out-of-bounds Read
| |
|
Improper Input Validation
| |
|
CVE-2024-21140
| |
|
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
|
CVE-2024-21131
| |
|
CVE-2024-21140
| |
|
Improper Input Validation
| |
|
CVE-2024-21147
| |
|
CVE-2024-21131
| |
|
Out-of-bounds Read
| |
|
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
|
Out-of-bounds Write
| |
|
Uncontrolled Memory Allocation
| |
|
Integer Overflow or Wraparound
| |
|
Improper Output Neutralization for Logs
| |
|
Out-of-bounds Write
| |
|
Uncontrolled Memory Allocation
| |
|
Integer Overflow or Wraparound
| |
|
Improper Output Neutralization for Logs
| |
|
Out-of-bounds Write
| |
|
Uncontrolled Memory Allocation
| |
|
Integer Overflow or Wraparound
| |
|
Improper Output Neutralization for Logs
| |
|
Out-of-bounds Write
| |
|
Uncontrolled Memory Allocation
| |
|
Integer Overflow or Wraparound
| |
|
Improper Output Neutralization for Logs
| |
|
Out-of-bounds Write
| |
|
Uncontrolled Memory Allocation
| |
|
Integer Overflow or Wraparound
| |
|
Improper Output Neutralization for Logs
| |
|
Improper Output Neutralization for Logs
| |
|
Integer Overflow or Wraparound
| |
|
Out-of-bounds Write
| |
|
Uncontrolled Memory Allocation
| |
|
Covert Timing Channel
| |
|
Information Exposure Through Log Files
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Integer Overflow or Wraparound
| |
|
Covert Timing Channel
| |
|
Information Exposure Through Log Files
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Integer Overflow or Wraparound
| |
|
Covert Timing Channel
| |
|
Information Exposure Through Log Files
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Integer Overflow or Wraparound
| |
|
Covert Timing Channel
| |
|
Information Exposure Through Log Files
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Integer Overflow or Wraparound
| |
|
Covert Timing Channel
| |
|
Information Exposure Through Log Files
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Integer Overflow or Wraparound
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Information Exposure Through Log Files
| |
|
Covert Timing Channel
| |
|
Integer Overflow or Wraparound
| |
|
Out-of-Bounds
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Deserialization of Untrusted Data
| |
|
Deserialization of Untrusted Data
| |
|
Deserialization of Untrusted Data
| |
|
Deserialization of Untrusted Data
| |
|
Deserialization of Untrusted Data
| |
|
Deserialization of Untrusted Data
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improperly Implemented Security Check for Standard
| |
|
Improperly Implemented Security Check for Standard
| |
|
Improperly Implemented Security Check for Standard
| |
|
Improperly Implemented Security Check for Standard
| |
|
Improperly Implemented Security Check for Standard
| |
|
Improperly Implemented Security Check for Standard
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Improper Neutralization of Null Byte or NUL Character
| |
|
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
| |
|
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
| |
|
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
| |
|
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
| |
|
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
| |
|
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
| |
|
Reliance on File Name or Extension of Externally-Supplied File
| |
|
Reliance on File Name or Extension of Externally-Supplied File
| |
|
Reliance on File Name or Extension of Externally-Supplied File
| |
|
Reliance on File Name or Extension of Externally-Supplied File
| |
|
Reliance on File Name or Extension of Externally-Supplied File
| |
|
Reliance on File Name or Extension of Externally-Supplied File
| |
|
Deserialization of Untrusted Data
| |
|
Deserialization of Untrusted Data
| |
|
Deserialization of Untrusted Data
| |
|
Deserialization of Untrusted Data
| |
|
Deserialization of Untrusted Data
| |
|
Deserialization of Untrusted Data
| |
|
NULL Pointer Dereference
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Use of Insufficiently Random Values
| |
|
Use of Insufficiently Random Values
| |
|
Use of Insufficiently Random Values
| |
|
Use of Insufficiently Random Values
| |
|
Use of Insufficiently Random Values
| |
|
Use of Insufficiently Random Values
| |
|
Integer Coercion Error
| |
|
Integer Coercion Error
| |
|
Integer Coercion Error
| |
|
Integer Coercion Error
| |
|
Integer Coercion Error
| |
|
Integer Coercion Error
| |
|
Integer Coercion Error
| |
|
Integer Coercion Error
| |
|
Integer Coercion Error
| |
|
Integer Coercion Error
| |
|
Integer Coercion Error
| |
|
Integer Coercion Error
| |
|
Improper Access Control
| |
|
Improper Access Control
| |
|
Improper Access Control
| |
|
Improper Access Control
| |
|
Improper Access Control
| |
|
Improper Access Control
| |
|
Resource Leak
| |
|
Resource Leak
| |
|
Resource Leak
| |
|
Resource Leak
| |
|
Resource Leak
| |
|
Resource Leak
| |
|
Improper Use of Validation Framework
| |
|
Improper Use of Validation Framework
| |
|
Improper Use of Validation Framework
| |
|
Improper Use of Validation Framework
| |
|
Improper Use of Validation Framework
| |
|
Improper Use of Validation Framework
| |
|
Incorrect Behavior Order: Early Validation
| |
|
Incorrect Behavior Order: Early Validation
| |
|
Incorrect Behavior Order: Early Validation
| |
|
Incorrect Behavior Order: Early Validation
| |
|
Incorrect Behavior Order: Early Validation
| |
|
Incorrect Behavior Order: Early Validation
| |
|
Integer Underflow
| |
|
Integer Underflow
| |
|
Integer Underflow
| |
|
Integer Underflow
| |
|
Integer Underflow
| |
|
Integer Underflow
| |
|
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
|
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
|
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
|
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
|
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
|
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |