Use After Free | |
Directory Traversal | |
Out-of-Bounds | |
Improper Input Validation | |
Authentication Bypass | |
Use After Free | |
Information Exposure | |
Deserialization of Untrusted Data | |
Improper Access Control | |
Resource Exhaustion | |
Improper Input Validation | |
NULL Pointer Dereference | |
Improper Input Validation | |
Improper Certificate Validation | |
Error Handling | |
HTTP Request Smuggling | |
Improper Input Validation | |
Improper Access Control | |
Encoding Error | |
Uncontrolled Recursion | |
Information Exposure | |
Out-of-bounds Read | |
Authentication Bypass by Primary Weakness | |
Out-of-bounds Read | |
Uncontrolled Recursion | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Access Control | |
Security Features | |
Information Exposure | |
Information Exposure | |
Security Features | |
Access Restriction Bypass | |
Out-of-Bounds | |