Reversible One-Way Hash | |
Out-of-bounds Write | |
Improper Authentication | |
Improper Null Termination | |
Incorrect Privilege Assignment | |
Out-of-bounds Read | |
Directory Traversal | |
Directory Traversal | |
Out-of-bounds Read | |
Out-of-Bounds | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Information Exposure | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Race Condition | |
Access Restriction Bypass | |
Improper Authentication | |
Improper Access Control | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Improper Certificate Validation | |
Man-in-the-Middle (MitM) | |
Authentication Bypass | |
Man-in-the-Middle (MitM) | |
CVE-2015-5370 | |
Incorrect Calculation of Multi-Byte String Length | |
Missing Authorization | |
Insufficient Verification of Data Authenticity | |
Path Equivalence | |
Improper Access Control | |
Allocation of Resources Without Limits or Throttling | |
Improper Input Validation | |
Improper Authentication | |
Directory Traversal | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
Arbitrary Code Injection | |
Resource Exhaustion | |
Incorrect Default Permissions | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2023-34968 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Out-of-bounds Read | |
Race Condition | |
Reversible One-Way Hash | |
Unchecked Return Value | |
Incorrect Default Permissions | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Race Condition | |
Race Condition | |
Improper Input Validation | |
Improper Input Validation | |
Improper Authentication | |
Improper Authentication | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
CVE-2015-5370 | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Incorrect Calculation of Multi-Byte String Length | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Path Equivalence | |
Directory Traversal | |
Directory Traversal | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Improper Authentication | |
Improper Authentication | |
Improper Null Termination | |
Improper Null Termination | |
Incorrect Privilege Assignment | |
Incorrect Privilege Assignment | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Use After Free | |
Directory Traversal | |
Directory Traversal | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Out-of-bounds Read | |
Out-of-bounds Read | |