Improper Locking
| |
CVE-2024-50303
| |
Time-of-check Time-of-use (TOCTOU)
| |
Improper Initialization
| |
Out-of-bounds Read
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
CVE-2024-50209
| |
Out-of-bounds Read
| |
CVE-2024-53044
| |
Improper Locking
| |
CVE-2024-53045
| |
Use of Uninitialized Resource
| |
Double Free
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
CVE-2024-50179
| |
CVE-2024-50253
| |
Buffer Overflow
| |
Memory Leak
| |
CVE-2024-50290
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
CVE-2024-50251
| |
CVE-2024-50256
| |
CVE-2024-50220
| |
CVE-2024-53065
| |
Memory Leak
| |
Improper Handling of Exceptional Conditions
| |
CVE-2024-50204
| |
CVE-2024-50201
| |
NULL Pointer Dereference
| |
CVE-2024-53060
| |
CVE-2024-53091
| |
Out-of-bounds Read
| |
Use of Uninitialized Resource
| |
CVE-2024-53059
| |
CVE-2024-50190
| |
CVE-2024-50191
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Race Condition
| |
Improper Locking
| |
Use of Uninitialized Resource
| |
Use After Free
| |
Out-of-bounds Read
| |
Improper Locking
| |
CVE-2024-50249
| |
CVE-2024-50186
| |
CVE-2024-53073
| |
CVE-2024-50219
| |
CVE-2024-53042
| |
Use of Uninitialized Resource
| |
Use After Free
| |
Use After Free
| |
Use of Uninitialized Resource
| |
CVE-2024-50183
| |
Expired Pointer Dereference
| |
Memory Leak
| |
CVE-2024-50263
| |
CVE-2024-53092
| |
Always-Incorrect Control Flow Implementation
| |
CVE-2024-50304
| |
Missing Release of Resource after Effective Lifetime
| |
Out-of-bounds Write
| |
CVE-2024-50216
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
CVE-2024-50195
| |
CVE-2024-50211
| |
Use After Free
| |
Improper Locking
| |
CVE-2024-50199
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Use of Uninitialized Resource
| |
Memory Leak
| |
CVE-2024-50162
| |
Improper Resource Locking
| |
CVE-2024-50148
| |
CVE-2024-50142
| |
Out-of-bounds Read
| |
Memory Leak
| |
NULL Pointer Dereference
| |
CVE-2024-50164
| |
Use After Free
| |
Memory Leak
| |
CVE-2024-50157
| |
NULL Pointer Dereference
| |
CVE-2024-50163
| |
NULL Pointer Dereference
| |
Use of Uninitialized Resource
| |
CVE-2024-50092
| |
CVE-2024-50113
| |
Use After Free
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
CVE-2024-50095
| |
NULL Pointer Dereference
| |
CVE-2024-50136
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Use After Free
| |
Race Condition
| |
NULL Pointer Dereference
| |
Use After Free
| |
Access of Uninitialized Pointer
| |
CVE-2024-50077
| |
Missing Initialization of Resource
| |
Use After Free
| |
CVE-2024-50081
| |
Out-of-bounds Read
| |
Access of Uninitialized Pointer
| |
Out-of-bounds Write
| |
CVE-2024-50083
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
CVE-2024-49971
| |
Use After Free
| |
Use After Free
| |
CVE-2024-49927
| |
Use After Free
| |
Improper Handling of Exceptional Conditions
| |
Use After Free
| |
Access of Uninitialized Pointer
| |
CVE-2024-50015
| |
CVE-2024-49944
| |
CVE-2024-49959
| |
Improper Handling of Exceptional Conditions
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
CVE-2024-50010
| |
CVE-2024-49934
| |
Reachable Assertion
| |
CVE-2024-49967
| |
Use After Free
| |
CVE-2024-49878
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
CVE-2024-49948
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2024-49935
| |
CVE-2024-49937
| |
Integer Overflow or Wraparound
| |
Improper Validation of Array Index
| |
Integer Overflow or Wraparound
| |
Memory Leak
| |
CVE-2024-49954
| |
Double Free
| |
Use After Free
| |
Improper Locking
| |
CVE-2024-49974
| |
CVE-2024-49885
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Memory Leak
| |
Race Condition
| |
CVE-2024-50023
| |
Race Condition
| |
Improper Locking
| |
Off-by-one Error
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2024-49861
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
CVE-2024-50063
| |
Operation on a Resource after Expiration or Release
| |
CVE-2024-50038
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Always-Incorrect Control Flow Implementation
| |
CVE-2024-49968
| |
CVE-2024-47709
| |
CVE-2024-47738
| |
Use After Free
| |
Use of Uninitialized Resource
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
CVE-2024-50022
| |
Out-of-bounds Write
| |
Memory Leak
| |
CVE-2024-50008
| |
Off-by-one Error
| |
Buffer Overflow
| |
CVE-2024-50012
| |
CVE-2024-49940
| |
Double Free
| |
Use of Uninitialized Resource
| |
Divide By Zero
| |
CVE-2024-50025
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Improper Resource Shutdown or Release
| |
Improper Validation of Integrity Check Value
| |
Buffer Overflow
| |
NULL Pointer Dereference
| |
Directory Traversal
| |
Use After Free
| |
NULL Pointer Dereference
| |
Off-by-one Error
| |
Use After Free
| |
CVE-2024-49964
| |
CVE-2024-50019
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
NULL Pointer Dereference
| |
CVE-2024-50020
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
CVE-2024-49926
| |
Race Condition
| |
Integer Overflow or Wraparound
| |
CVE-2024-49946
| |
Memory Leak
| |
Incomplete Cleanup
| |
NULL Pointer Dereference
| |
Incomplete Cleanup
| |
CVE-2024-50021
| |
Use of Uninitialized Resource
| |
Use After Free
| |
Memory Leak
| |
CVE-2024-50040
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Double Free
| |
Improper Access Control
| |
Incomplete Cleanup
| |
Use After Free
| |
CVE-2024-47713
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2023-52917
| |
CVE-2022-49027
| |
Incomplete Cleanup
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Validation of Array Index
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Write
| |
Memory Leak
| |
Memory Leak
| |
Use of Uninitialized Resource
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
CVE-2022-49002
| |
Memory Leak
| |
CVE-2022-48994
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Improper Validation of Array Index
| |
Improper Control of a Resource Through its Lifetime
| |
Use After Free
| |
CVE-2022-48978
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
CVE-2022-48986
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Incomplete Cleanup
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2022-48961
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Resource Injection
| |
Race Condition
| |
CVE-2022-49000
| |
Race Condition
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
CVE-2024-47673
| |
Information Exposure
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Validation of Array Index
| |
Race Condition
| |
Memory Leak
| |
Missing Initialization of Resource
| |
Out-of-bounds Read
| |
CVE-2024-46825
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
CVE-2024-46830
| |
CVE-2024-46840
| |
NULL Pointer Dereference
| |
Use After Free
| |
CVE-2024-46839
| |
CVE-2024-46841
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2024-46861
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Double Free
| |
Out-of-bounds Write
| |
CVE-2024-2201
| |
Out-of-bounds Write
| |
Memory Leak
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2024-46783
| |
CVE-2024-46745
| |
Link Following
| |
CVE-2024-46715
| |
Integer Underflow
| |
CVE-2024-46754
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Improper Locking
| |
Improper Check or Handling of Exceptional Conditions
| |
Uncontrolled Recursion
| |
NULL Pointer Dereference
| |
CVE-2024-46777
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Improper Resource Shutdown or Release
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
CVE-2024-46771
| |
Missing Release of Resource after Effective Lifetime
| |
CVE-2024-46767
| |
Reachable Assertion
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2024-46787
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Integer Underflow
| |
Unchecked Return Value
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Improper Authentication
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Input Validation
| |
Use of Uninitialized Variable
| |
Race Condition
| |
Improper Locking
| |
Race Condition
| |
Buffer Underflow
| |
Improper Synchronization
| |
Resource Injection
| |
Use After Free
| |
Double Free
| |
Out-of-Bounds
| |
Time-of-check Time-of-use (TOCTOU)
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Out-of-bounds Write
| |
Privilege Dropping / Lowering Errors
| |
Use After Free
| |
Out-of-bounds Write
| |
Improper Cleanup on Thrown Exception
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Information Exposure
| |
Double Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Improper Zeroization of Hardware Register
| |
Use After Free
| |
Improper Access Control
| |
Execution with Unnecessary Privileges
| |
NULL Pointer Dereference
| |
Integer Underflow
| |
Out-of-Bounds
| |
CVE-2021-26401
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Incomplete Cleanup
| |
Information Exposure
| |
Incomplete Cleanup
| |
Information Exposure
| |
Incomplete Cleanup
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Information Exposure
| |
Information Exposure
| |
Buffer Overflow
| |
Resource Exhaustion
| |
Race Condition
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Missing Authorization
| |
Use After Free
| |
Improper Preservation of Permissions
| |
Incorrect Calculation of Buffer Size
| |
Race Condition
| |
Race Condition
| |
Double Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
CVE-2024-26602
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Buffer Overflow
| |
Incomplete Cleanup
| |
Improper Validation of Array Index
| |
Memory Leak
| |
Use After Free
| |
Execution with Unnecessary Privileges
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Resource Exhaustion
| |
Use After Free
| |
Resource Exhaustion
| |
Race Condition
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Improper Input Validation
| |
Time-of-check Time-of-use (TOCTOU)
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Calculation of Buffer Size
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
Use After Free
| |
Improper Locking
| |
Improper Input Validation
| |
Use of Insufficiently Random Values
| |
Use After Free
| |
Cleartext Transmission of Sensitive Information
| |
Out-of-Bounds
| |
Use After Free
| |
Information Exposure
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Use After Free
| |
Information Exposure
| |
Information Exposure
| |
Cleartext Transmission of Sensitive Information
| |
Out-of-bounds Write
| |
Arbitrary Code Injection
| |
Memory Leak
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Acceptance of Extraneous Untrusted Data With Trusted Data
| |
Out-of-bounds Write
| |
Use of Uninitialized Resource
| |
Use After Free
| |
Race Condition
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Missing Release of Resource after Effective Lifetime
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Missing Release of Resource after Effective Lifetime
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Memory Leak
| |
Resource Exhaustion
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Out-of-bounds Write
| |
Improper Access Control
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Race Condition
| |
Resource Exhaustion
| |
Information Exposure
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Use After Free
| |
Improper Authentication
| |
Improper Input Validation
| |
Missing Authorization
| |
Missing Authorization
| |
Incorrect Authorization
| |
Heap-based Buffer Overflow
| |
Buffer Overflow
| |
Out-of-Bounds
| |
Use After Free
| |
CVE-2019-0136
| |
Use After Free
| |
Improper Input Validation
| |
Expected Behavior Violation
| |
Improper Locking
| |
Information Exposure
| |
Buffer Overflow
| |
Resource Exhaustion
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-bounds Read
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
Use After Free
| |
Incorrect Check of Function Return Value
| |
Information Exposure
| |
Execution with Unnecessary Privileges
| |
Information Exposure
| |
Insufficient Entropy
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Out-of-bounds Write
| |
Race Condition
| |
Out-of-bounds Read
| |
Missing Authorization
| |
Improper Locking
| |
Buffer Overflow
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Missing Authorization
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Uncaught Exception
| |
Sensitive Information Uncleared Before Release
| |
Improper Access Control
| |
Sensitive Information Uncleared Before Release
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Write
| |
Buffer Overflow
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Out-of-Bounds
| |
Heap-based Buffer Overflow
| |
Covert Timing Channel
| |
Stack-based Buffer Overflow
| |
Out-of-Bounds
| |
Information Exposure
| |
Information Exposure
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Resource Exhaustion
| |
Information Exposure
| |
Information Exposure
| |
Out-of-bounds Read
| |
Missing Initialization of a Variable
| |
NULL Pointer Dereference
| |
Race Condition
| |
NULL Pointer Dereference
| |
Time-of-check Time-of-use (TOCTOU)
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Resource Exhaustion
| |
Information Exposure
| |
Use After Free
| |
Operation on a Resource after Expiration or Release
| |
Out-of-bounds Read
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Execution with Unnecessary Privileges
| |
Sensitive Information Uncleared Before Release
| |
Information Exposure
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Covert Timing Channel
| |
Buffer Overflow
| |
Use After Free
| |
Improper Access Control
| |
Use After Free
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Out-of-bounds Read
| |
Information Exposure
| |
Use After Free
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
Out-of-Bounds
| |
Buffer Overflow
| |
Improper Input Validation
| |
Resource Exhaustion
| |
Use After Free
| |
Unchecked Error Condition
| |
Improper Access Control
| |
NULL Pointer Dereference
| |
Heap-based Buffer Overflow
| |
Information Exposure
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Divide By Zero
| |
Out-of-bounds Read
| |
Deadlock
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Input Validation
| |
Race Condition
| |
Use After Free
| |
Information Exposure
| |
Integer Overflow or Wraparound
| |
Missing Authorization
| |
Race Condition
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Race Condition
| |
NULL Pointer Dereference
| |
Race Condition
| |
Heap-based Buffer Overflow
| |
Improper Input Validation
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Locking
| |
Improperly Implemented Security Check for Standard
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Use After Free
| |
Buffer Overflow
| |
Incorrect Privilege Assignment
| |
Improper Handling of Syntactically Invalid Structure
| |
NULL Pointer Dereference
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Use After Free
| |
Improper Initialization
| |
NULL Pointer Dereference
| |
Information Exposure
| |
Resource Exhaustion
| |
Out-of-Bounds
| |
Time-of-check Time-of-use (TOCTOU)
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
Information Exposure
| |
Resource Exhaustion
| |
Sensitive Information Uncleared Before Release
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Sensitive Information Uncleared Before Release
| |
Integer Overflow or Wraparound
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Race Condition
| |
Incorrect Conversion between Numeric Types
| |
Use After Free
| |
Improper Input Validation
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Improper Authentication
| |
Race Condition
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Improper Access Control
| |
Improper Access Control
| |
NULL Pointer Dereference
| |
Use After Free
| |
Race Condition
| |
Improper Cleanup on Thrown Exception
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Incorrect Authorization
| |
Out-of-bounds Read
| |
Incorrect Privilege Assignment
| |
Resource Exhaustion
| |
Improper Access Control
| |
Information Exposure
| |
Uncaught Exception
| |
Reachable Assertion
| |
Out-of-bounds Write
| |
Use After Free
| |
Predictable from Observable State
| |
Execution with Unnecessary Privileges
| |
Unchecked Error Condition
| |
Execution with Unnecessary Privileges
| |
Out-of-Bounds
| |
Improper Cleanup on Thrown Exception
| |
Use After Free
| |
Execution with Unnecessary Privileges
| |
Stack-based Buffer Overflow
| |
Race Condition
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Improper Input Validation
| |
Unchecked Error Condition
| |
Detection of Error Condition Without Action
| |
Improper Initialization
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Race Condition
| |
NULL Pointer Dereference
| |
Improper Authentication
| |
Race Condition
| |
NULL Pointer Dereference
| |
Missing Release of Resource after Effective Lifetime
| |
Use After Free
| |
CVE-2017-1000379
| |
Out-of-Bounds
| |
Use After Free
| |
Missing Release of Resource after Effective Lifetime
| |
Incorrect Permission Assignment for Critical Resource
| |
Uncaught Exception
| |
Use After Free
| |
Reachable Assertion
| |
Improper Authentication
| |
Stack-based Buffer Overflow
| |
Allocation of Resources Without Limits or Throttling
| |
Divide By Zero
| |
Race Condition
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2014-7975
| |
Resource Exhaustion
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Divide By Zero
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Race Condition
| |
Improper Input Validation
| |
Information Exposure
| |
Race Condition
| |
Off-by-one Error
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Improper Handling of Length Parameter Inconsistency
| |
Heap-based Buffer Overflow
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Execution with Unnecessary Privileges
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Link Following
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Information Exposure
| |
Resource Management Errors
| |
Resource Exhaustion
| |
Improper Input Validation
| |
CVE-2014-3631
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Off-by-one Error
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Information Exposure
| |
Access Restriction Bypass
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Race Condition
| |
Buffer Overflow
| |
Reachable Assertion
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Read
| |
Race Condition
| |
Race Condition
| |
Heap-based Buffer Overflow
| |
Improper Input Validation
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Unchecked Error Condition
| |
Race Condition
| |
NULL Pointer Dereference
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Buffer Overflow
| |
Incorrect Check of Function Return Value
| |
Out-of-Bounds
| |
Incorrect Permission Assignment for Critical Resource
| |
Race Condition
| |
Missing Initialization of a Variable
| |
Interaction Error
| |
Improper Input Validation
| |
Improper Input Validation
| |
Missing Initialization of a Variable
| |
Incorrect Permission Assignment for Critical Resource
| |
Race Condition
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Race Condition
| |
Unchecked Error Condition
| |
Directory Traversal
| |
Unchecked Error Condition
| |
Exposed Dangerous Method or Function
| |
Information Exposure
| |
Deadlock
| |
Race Condition
| |
Uncaught Exception
| |
Exposed Dangerous Method or Function
| |
Race Condition
| |
NULL Pointer Dereference
| |
Access Restriction Bypass
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Resource Management Errors
| |
CVE-2014-4171
| |
Heap-based Buffer Overflow
| |
Resource Exhaustion
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Initialization
| |
Improper Locking
| |
Memory Leak
| |
Code
| |
CVE-2014-9585
| |
Use After Free
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Insufficient Comparison
| |
Race Condition
| |
Improper Input Validation
| |
Race Condition
| |
Access Restriction Bypass
| |
Buffer Overflow
| |
Return of Wrong Status Code
| |
Code
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Privilege Management
| |
External Control of Critical State Data
| |
Improper Data Handling
| |
Stack-based Buffer Overflow
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Code
| |
Improper Input Validation
| |
Race Condition
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Race Condition
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
Use After Free
| |
Uncaught Exception
| |
Uncaught Exception
| |
Race Condition
| |
Use After Free
| |
External Initialization of Trusted Variables or Data Stores
| |
Out-of-Bounds
| |
Improper Enforcement of Behavioral Workflow
| |
Out-of-Bounds
| |
Improper Privilege Management
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Improper Check for Unusual or Exceptional Conditions
| |
CVE-2014-0206
| |
CVE-2024-45017
| |
Download of Code Without Integrity Check
| |
Heap-based Buffer Overflow
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Improper Locking
| |
Use After Free
| |
Resource Injection
| |
Use of Uninitialized Variable
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Out-of-Bounds
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Uncontrolled Memory Allocation
| |
Missing Release of Resource after Effective Lifetime
| |
Use After Free
| |
Improper Locking
| |
Use After Free
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Improper Check for Unusual or Exceptional Conditions
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Improper Initialization
| |
Use After Free
| |
Improper Input Validation
| |
Improper Locking
| |
Integer Overflow or Wraparound
| |
Deadlock
| |
Time-of-check Time-of-use (TOCTOU)
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2024-44984
| |
Race Condition
| |
Improper Check or Handling of Exceptional Conditions
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Use of Uninitialized Variable
| |
Resource Leak
| |
Use of Uninitialized Resource
| |
Memory Leak
| |
Race Condition
| |
Improper Input Validation
| |
Use After Free
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Divide By Zero
| |
Divide By Zero
| |
Out-of-bounds Read
| |
Improper Locking
| |
NULL Pointer Dereference
| |
Reachable Assertion
| |
Race Condition
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Use After Free
| |
Excessive Iteration
| |
Resource Leak
| |
Race Condition
| |
Double Free
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Use After Free
| |
Race Condition
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Use After Free
| |
Memory Leak
| |
Out-of-Bounds
| |
CVE-2022-48936
| |
NULL Pointer Dereference
| |
Missing Release of Resource after Effective Lifetime
| |
Buffer Overflow
| |
Improper Check for Unusual or Exceptional Conditions
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Race Condition
| |
Double Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Race Condition
| |
Resource Leak
| |
Resource Leak
| |
Incorrect Privilege Assignment
| |
Resource Injection
| |
Deadlock
| |
NULL Pointer Dereference
| |
CVE-2024-42107
| |
Resource Injection
| |
Out-of-bounds Read
| |
Resource Leak
| |
Improper Resource Shutdown or Release
| |
Resource Leak
| |
NULL Pointer Dereference
| |
CVE-2024-41078
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Resource Management Errors
| |
Resource Injection
| |
Race Condition
| |
NULL Pointer Dereference
| |
Race Condition
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Use After Free
| |
Memory Leak
| |
Improper Handling of Length Parameter Inconsistency
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Incorrect Calculation
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Control of a Resource Through its Lifetime
| |
Use After Free
| |
Resource Injection
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Use After Free
| |
Unchecked Return Value
| |
Improper Input Validation
| |
Improper Input Validation
| |
Reachable Assertion
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
Use After Free
| |
Improper Handling of Length Parameter Inconsistency
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Multiple Locks of a Critical Resource
| |
NULL Pointer Dereference
| |
Divide By Zero
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2024-42304
| |
Use After Free
| |
Improper Input Validation
| |
Improper Validation of Array Index
| |
Improper Input Validation
| |
Improper Locking
| |
Resource Injection
| |
CVE-2024-42322
| |
Improper Locking
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Deadlock
| |
Out-of-bounds Read
| |
Numeric Range Comparison Without Minimum Check
| |
Use After Free
| |
NULL Pointer Dereference
| |
Deadlock
| |
Use After Free
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Allocation of Resources Without Limits or Throttling
| |
Resource Injection
| |
Resource Injection
| |
Race Condition
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Clearing of Heap Memory Before Release ('Heap Inspection')
| |
CVE-2024-42257
| |
Improper Locking
| |
Resource Injection
| |
Improper Input Validation
| |
Resource Injection
| |
Double Free
| |
Resource Injection
| |
Missing Synchronization
| |
Improper Locking
| |
Resource Injection
| |
Resource Injection
| |
Reachable Assertion
| |
Resource Injection
| |
Use of Uninitialized Variable
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Incomplete Internal State Distinction
| |
Resource Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Deadlock
| |
Race Condition
| |
Resource Injection
| |
Incomplete Internal State Distinction
| |
CVE-2024-42149
| |
Unchecked Return Value
| |
Integer Overflow or Wraparound
| |
Deadlock
| |
Use After Free
| |
Use of Uninitialized Resource
| |
Unchecked Return Value
| |
Information Exposure
| |
Resource Injection
| |
Resource Injection
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Information Exposure
| |
Improper Resource Locking
| |
Resource Injection
| |
Divide By Zero
| |
Improper Resource Shutdown or Release
| |
Use of Uninitialized Variable
| |
NULL Pointer Dereference
| |
Use of Uninitialized Variable
| |
Use After Free
| |
Resource Exhaustion
| |
Integer Overflow or Wraparound
| |
Stack-based Buffer Overflow
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2024-42138
| |
Use of Uninitialized Variable
| |
Improper Validation of Array Index
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Allocation of Resources Without Limits or Throttling
| |
Buffer Overflow
| |
Improper Input Validation
| |
Improper Resource Locking
| |
Use After Free
| |
Deadlock
| |
Stack-based Buffer Overflow
| |
Unchecked Return Value
| |
Improper Update of Reference Count
| |
Resource Management Errors
| |
Out-of-bounds Read
| |
Improper Control of Document Type Definition
| |
Improper Input Validation
| |
Buffer Overflow
| |
Memory Leak
| |
Out-of-Bounds
| |
Untrusted Pointer Dereference
| |
Memory Leak
| |
Integer Overflow or Wraparound
| |
Static Code Injection
| |
CVE-2024-42132
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Access of Uninitialized Pointer
| |
Improper Synchronization
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Deadlock
| |
Race Condition
| |
Resource Injection
| |
Resource Injection
| |
Untrusted Pointer Dereference
| |
Integer Underflow
| |
Out-of-bounds Read
| |
Resource Injection
| |
Improper Handling of Length Parameter Inconsistency
| |
Reachable Assertion
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Double Free
| |
Improper Input Validation
| |
Information Exposure
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Incomplete Internal State Distinction
| |
Use After Free
| |
CVE-2024-42141
| |
Use After Free
| |
Out-of-Bounds
| |
Race Condition
| |
Stack-based Buffer Overflow
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Read
| |
Resource Injection
| |
Use After Free
| |
Improper Input Validation
| |
Deadlock
| |
Improper Update of Reference Count
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Resource Injection
| |
Out-of-Bounds
| |
Race Condition
| |
Resource Injection
| |
Out-of-bounds Read
| |
Resource Injection
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Resource Injection
| |
Improper Initialization
| |
NULL Pointer Dereference
| |
Deadlock
| |
NULL Pointer Dereference
| |
Untrusted Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Deadlock
| |
NULL Pointer Dereference
| |
Race Condition
| |
Improper Input Validation
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Improper Synchronization
| |
Use of Uninitialized Resource
| |
Out-of-bounds Read
| |
Resource Injection
| |
Improper Update of Reference Count
| |
Improper Resource Shutdown or Release
| |
Return of Wrong Status Code
| |
Improper Locking
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2024-40998
| |
Resource Injection
| |
Resource Injection
| |
Improper Input Validation
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Use After Free
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Use After Free
| |
Integer Underflow
| |
CVE-2022-48832
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
CVE-2022-48811
| |
Improper Update of Reference Count
| |
Incorrect Check of Function Return Value
| |
Missing Lock Check
| |
CVE-2022-48836
| |
Use After Free
| |
CVE-2022-48802
| |
NULL Pointer Dereference
| |
CVE-2022-48785
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Resource Injection
| |
Release of Invalid Pointer or Reference
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Resource Injection
| |
CVE-2022-48834
| |
Resource Leak
| |
Permission Issues
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
Incorrect Check of Function Return Value
| |
Resource Injection
| |
Race Condition
| |
NULL Pointer Dereference
| |
Race Condition
| |
Resource Injection
| |
NULL Pointer Dereference
| |
CVE-2022-48849
| |
CVE-2022-48828
| |
Use After Free
| |
Use After Free
| |
Resource Injection
| |
Use of Uninitialized Resource
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Out-of-bounds Read
| |
State Issues
| |
Resource Injection
| |
CVE-2022-48831
| |
Resource Leak
| |
Use After Free
| |
Deadlock
| |
Improper Initialization
| |
Deadlock
| |
Resource Injection
| |
Out-of-Bounds
| |
Use After Free
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
CVE-2024-39509
| |
CVE-2024-40901
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
CVE-2024-39488
| |
Memory Leak
| |
Race Condition
| |
Stack-based Buffer Overflow
| |
Out-of-Bounds
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Deadlock
| |
Resource Injection
| |
Covert Timing Channel
| |
Improper Input Validation
| |
Use After Free
| |
Resource Injection
| |
Race Condition
| |
Race Condition
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Resource Leak
| |
Improper Initialization
| |
Race Condition
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Execution with Unnecessary Privileges
| |
Resource Leak
| |
Out-of-bounds Read
| |
Double Free
| |
NULL Pointer Dereference
| |
Unchecked Error Condition
| |
Double Free
| |
Resource Injection
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Improper Locking
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
CVE-2024-38580
| |
NULL Pointer Dereference
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Race Condition
| |
Improper Input Validation
| |
Incomplete Cleanup
| |
Resource Injection
| |
Improper Input Validation
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Deadlock
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Locking
| |
CVE-2024-38573
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Improper Locking
| |
Resource Exhaustion
| |
Resource Injection
| |
CVE-2024-38589
| |
Out-of-bounds Read
| |
Stack-based Buffer Overflow
| |
Resource Injection
| |
Use of Uninitialized Variable
| |
Out-of-Bounds
| |
Resource Leak
| |
Out-of-bounds Read
| |
Buffer Underflow
| |
Out-of-bounds Write
| |
Resource Injection
| |
Out-of-bounds Read
| |
Missing Synchronization
| |
CVE-2022-48752
| |
Use After Free
| |
Improper Resource Shutdown or Release
| |
Resource Leak
| |
Use After Free
| |
Double Free
| |
Incorrect Default Permissions
| |
Out-of-bounds Read
| |
Resource Leak
| |
Memory Leak
| |
Use After Free
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
Unchecked Return Value
| |
NULL Pointer Dereference
| |
Deadlock
| |
Missing Initialization of Resource
| |
CVE-2022-48764
| |
Resource Leak
| |
Use After Free
| |
NULL Pointer Dereference
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
NULL Pointer Dereference
| |
Race Condition
| |
Out-of-bounds Write
| |
Use of Uninitialized Variable
| |
Use After Free
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Deadlock
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Resource Leak
| |
Allocation of Resources Without Limits or Throttling
| |
Improper Update of Reference Count
| |
Release of Invalid Pointer or Reference
| |
CVE-2021-47607
| |
Information Exposure
| |
Improper Resource Shutdown or Release
| |
Out-of-bounds Read
| |
Divide By Zero
| |
Out-of-bounds Read
| |
Use of Uninitialized Variable
| |
Resource Exhaustion
| |
Deadlock
| |
Improper Null Termination
| |
Race Condition
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Resource Exhaustion
| |
Resource Leak
| |
Improper Locking
| |
Out-of-bounds Write
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
CVE-2024-36970
| |
Resource Injection
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
Incomplete Cleanup
| |
Out-of-Bounds
| |
Stack-based Buffer Overflow
| |
Resource Leak
| |
Improper Locking
| |
Use After Free
| |
Resource Injection
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Use After Free
| |
Resource Injection
| |
Race Condition
| |
Resource Leak
| |
Out-of-bounds Read
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Resource Leak
| |
Resource Leak
| |
Resource Injection
| |
Use After Free
| |
Out-of-bounds Read
| |
Resource Leak
| |
Out-of-bounds Read
| |
Use After Free
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Improper Locking
| |
Out-of-bounds Read
| |
Resource Injection
| |
Improper Input Validation
| |
Resource Injection
| |
Improper Locking
| |
Resource Injection
| |
Use After Free
| |
Resource Leak
| |
Improper Input Validation
| |
Resource Injection
| |
Incomplete Cleanup
| |
Resource Leak
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Resource Leak
| |
Deadlock
| |
Improper Preservation of Permissions
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Time-of-check Time-of-use (TOCTOU)
| |
Double Free
| |
Use of Uninitialized Variable
| |
Use After Free
| |
NULL Pointer Dereference
| |
Untrusted Pointer Dereference
| |
Improper Null Termination
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Race Condition
| |
Out-of-bounds Read
| |
Deadlock
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Divide By Zero
| |
Race Condition
| |
Time-of-check Time-of-use (TOCTOU)
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Resource Leak
| |
Memory Leak
| |
Use After Free
| |
Out-of-bounds Read
| |
Leftover Debug Code
| |
Race Condition
| |
Resource Leak
| |
Double Free
| |
Deadlock
| |
Resource Injection
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Improper Null Termination
| |
Use of Uninitialized Resource
| |
Improper Initialization
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Stack-based Buffer Overflow
| |
Out-of-bounds Write
| |
CVE-2024-36015
| |
CVE-2023-52881
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Resource Injection
| |
Improper Resource Shutdown or Release
| |
NULL Pointer Dereference
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Improper Enforcement of Behavioral Workflow
| |
Resource Injection
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Update of Reference Count
| |
Double Free
| |
Improper Update of Reference Count
| |
Trust Boundary Violation
| |
Resource Exhaustion
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Untrusted Pointer Dereference
| |
Resource Management Errors
| |
CVE-2021-47446
| |
Improper Update of Reference Count
| |
Improper Check for Unusual or Exceptional Conditions
| |
Resource Leak
| |
NULL Pointer Dereference
| |
CVE-2021-47443
| |
NULL Pointer Dereference
| |
CVE-2021-47442
| |
Time-of-check Time-of-use (TOCTOU)
| |
Use After Free
| |
Memory Leak
| |
CVE-2021-47441
| |
Deadlock
| |
Race Condition
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Deadlock
| |
Use After Free
| |
Resource Injection
| |
Out-of-bounds Write
| |
Deadlock
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Out-of-bounds Read
| |
Use After Free
| |
CVE-2021-47290
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Use After Free
| |
Resource Injection
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Unsynchronized Access to Shared Data in a Multithreaded Context
| |
CVE-2021-47222
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Improper Protection Against Physical Side Channels
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Deadlock
| |
CVE-2021-47276
| |
Out-of-bounds Write
| |
Range Error
| |
Use After Free
| |
Resource Injection
| |
Out-of-bounds Read
| |
Resource Leak
| |
Improper Input Validation
| |
Use After Free
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Resource Leak
| |
Use After Free
| |
Race Condition
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Time-of-check Time-of-use (TOCTOU)
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Initialization
| |
CVE-2021-47246
| |
CVE-2021-47265
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Use of NullPointerException Catch to Detect NULL Pointer Dereference
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Deadlock
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
External Control of System or Configuration Setting
| |
Improper Validation of Array Index
| |
External Control of System or Configuration Setting
| |
Double Free
| |
Improper Validation of Array Index
| |
Resource Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Use After Free
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Race Condition
| |
Resource Injection
| |
Use After Free
| |
NULL Pointer Dereference
| |
Free of Memory not on the Heap
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Out-of-Bounds
| |
Race Condition
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Double Free
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Resource Leak
| |
Use After Free
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Use After Free
| |
Missing Initialization of a Variable
| |
Use After Free
| |
Resource Leak
| |
Race Condition
| |
Improper Initialization
| |
Improper Locking
| |
Incomplete Internal State Distinction
| |
Resource Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Resource Management Errors
| |
Stack-based Buffer Overflow
| |
Improper Locking
| |
Resource Injection
| |
Use After Free
| |
Resource Leak
| |
Improper Initialization
| |
Race Condition
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
Divide By Zero
| |
Double Free
| |
CVE-2021-47455
| |
Use of Uninitialized Variable
| |
Improper Resource Shutdown or Release
| |
NULL Pointer Dereference
| |
Improper Control of a Resource Through its Lifetime
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Improper Input Validation
| |
Reachable Assertion
| |
Improper Locking
| |
NULL Pointer Dereference
| |
Access of Uninitialized Pointer
| |
Deadlock
| |
Incomplete Cleanup
| |
Resource Leak
| |
Resource Leak
| |
Memory Leak
| |
CVE-2021-47376
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Resource Injection
| |
Use After Free
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Initialization
| |
Resource Injection
| |
Resource Leak
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Improper Input Validation
| |
Use After Free
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Resource Leak
| |
Use After Free
| |
Resource Leak
| |
Resource Leak
| |
CVE-2021-47359
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
CVE-2021-47387
| |
Use After Free
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Stack-based Buffer Overflow
| |
Resource Leak
| |
NULL Pointer Dereference
| |
CVE-2021-47337
| |
Use After Free
| |
Memory Leak
| |
CVE-2021-47384
| |
Resource Leak
| |
Improper Input Validation
| |
Use After Free
| |
Resource Leak
| |
NULL Pointer Dereference
| |
CVE-2024-35970
| |
CVE-2024-35996
| |
Memory Leak
| |
CVE-2024-35959
| |
CVE-2024-35960
| |
CVE-2024-35995
| |
CVE-2024-35954
| |
CVE-2024-35884
| |
CVE-2024-35952
| |
Improper Locking
| |
CVE-2024-35987
| |
CVE-2024-35974
| |
CVE-2024-35983
| |
Improper Cleanup on Thrown Exception
| |
CVE-2024-35993
| |
CVE-2024-35944
| |
CVE-2024-35969
| |
CVE-2024-35981
| |
CVE-2024-35945
| |
CVE-2024-35941
| |
CVE-2024-35973
| |
CVE-2024-35937
| |
CVE-2024-35999
| |
CVE-2024-35967
| |
CVE-2024-35962
| |
CVE-2024-35924
| |
CVE-2024-36006
| |
CVE-2024-35933
| |
CVE-2024-35985
| |
NULL Pointer Dereference
| |
CVE-2024-35877
| |
CVE-2024-35961
| |
CVE-2024-36007
| |
CVE-2024-35874
| |
Information Exposure
| |
CVE-2024-36005
| |
CVE-2024-35958
| |
CVE-2024-35966
| |
CVE-2024-36004
| |
CVE-2024-35965
| |
CVE-2024-35872
| |
NULL Pointer Dereference
| |
CVE-2024-35957
| |
CVE-2024-35860
| |
CVE-2024-35963
| |
CVE-2024-36000
| |
CVE-2024-35964
| |
CVE-2024-36002
| |
CVE-2024-35955
| |
CVE-2024-35979
| |
CVE-2024-35956
| |
Memory Leak
| |
CVE-2024-35925
| |
CVE-2024-35882
| |
CVE-2024-35879
| |
CVE-2024-35931
| |
CVE-2024-35947
| |
CVE-2024-35900
| |
CVE-2024-35917
| |
CVE-2024-35911
| |
CVE-2024-35903
| |
CVE-2024-35910
| |
CVE-2024-35914
| |
CVE-2024-35898
| |
CVE-2024-35899
| |
CVE-2024-35913
| |
CVE-2024-35887
| |
CVE-2024-35912
| |
CVE-2024-35892
| |
CVE-2024-35891
| |
CVE-2024-35886
| |
CVE-2024-35893
| |
CVE-2024-35895
| |
CVE-2024-35930
| |
CVE-2024-35928
| |
CVE-2024-35897
| |
CVE-2024-35927
| |
CVE-2024-35929
| |
CVE-2024-35896
| |
CVE-2023-52663
| |
CVE-2023-52662
| |
CVE-2024-35888
| |
CVE-2024-35890
| |
CVE-2024-35905
| |
CVE-2024-35904
| |
CVE-2024-35846
| |
CVE-2024-35857
| |
CVE-2024-35853
| |
CVE-2024-35855
| |
CVE-2024-35849
| |
CVE-2024-35809
| |
CVE-2024-35835
| |
CVE-2024-35816
| |
CVE-2024-35789
| |
CVE-2024-35808
| |
CVE-2024-35813
| |
CVE-2024-35803
| |
CVE-2024-35840
| |
CVE-2024-35804
| |
CVE-2024-35805
| |
CVE-2024-35800
| |
CVE-2024-35852
| |
CVE-2024-35856
| |
Missing Synchronization
| |
Missing Synchronization
| |
CVE-2024-35845
| |
Missing Synchronization
| |
CVE-2024-27415
| |
CVE-2024-35839
| |
CVE-2024-35817
| |
CVE-2024-27435
| |
CVE-2024-27413
| |
CVE-2024-35824
| |
CVE-2024-35838
| |
Missing Synchronization
| |
Deadlock
| |
Missing Synchronization
| |
CVE-2024-27416
| |
CVE-2024-35794
| |
CVE-2024-35815
| |
CVE-2024-35818
| |
CVE-2024-35798
| |
Resource Exhaustion
| |
CVE-2024-35810
| |
CVE-2024-27417
| |
CVE-2024-35787
| |
CVE-2024-35812
| |
Missing Synchronization
| |
CVE-2024-27436
| |
CVE-2024-35790
| |
CVE-2024-27410
| |
CVE-2024-27431
| |
Premature Release of Resource During Expected Lifetime
| |
Missing Synchronization
| |
Missing Synchronization
| |
CVE-2024-27414
| |
CVE-2024-35854
| |
CVE-2024-35807
| |
CVE-2024-35823
| |
CVE-2024-35784
| |
CVE-2024-35848
| |
CVE-2024-35797
| |
CVE-2024-27434
| |
Missing Synchronization
| |
CVE-2023-52683
| |
CVE-2023-52676
| |
CVE-2023-52686
| |
CVE-2023-52693
| |
CVE-2023-52672
| |
CVE-2023-52679
| |
CVE-2023-52690
| |
CVE-2023-52669
| |
CVE-2023-52674
| |
CVE-2023-52681
| |
CVE-2023-52658
| |
CVE-2023-52692
| |
CVE-2023-52680
| |
CVE-2023-52696
| |
Double Free
| |
Improper Locking
| |
CVE-2023-52698
| |
CVE-2024-27393
| |
CVE-2024-27400
| |
CVE-2024-27395
| |
Use After Free
| |
CVE-2024-27398
| |
CVE-2024-27399
| |
CVE-2023-52654
| |
CVE-2022-48702
| |
CVE-2022-48701
| |
Improper Locking
| |
Off-by-one Error
| |
CVE-2022-48696
| |
CVE-2022-48690
| |
Memory Leak
| |
CVE-2022-48697
| |
CVE-2022-48695
| |
CVE-2022-48700
| |
CVE-2022-48705
| |
NULL Pointer Dereference
| |
CVE-2022-48704
| |
Race Condition
| |
Use After Free
| |
Improper Locking
| |
CVE-2022-48694
| |
Memory Leak
| |
NULL Pointer Dereference
| |
CVE-2024-27065
| |
CVE-2024-27018
| |
CVE-2024-27050
| |
CVE-2024-26999
| |
Race Condition
| |
CVE-2024-26964
| |
CVE-2024-27066
| |
CVE-2024-27055
| |
CVE-2024-26993
| |
CVE-2024-26935
| |
CVE-2024-26962
| |
Out-of-bounds Read
| |
Improper Locking
| |
Improper Locking
| |
CVE-2023-52653
| |
CVE-2024-27390
| |
CVE-2024-27080
| |
Behavioral Change in New Version or Environment
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2024-26946
| |
Improper Input Validation
| |
CVE-2024-27389
| |
CVE-2024-27023
| |
CVE-2024-27036
| |
CVE-2022-48669
| |
CVE-2024-27026
| |
NULL Pointer Dereference
| |
Improper Locking
| |
CVE-2024-27031
| |
CVE-2024-27007
| |
CVE-2024-27006
| |
CVE-2024-27075
| |
NULL Pointer Dereference
| |
Memory Leak
| |
CVE-2024-27077
| |
CVE-2024-27038
| |
CVE-2024-27059
| |
CVE-2024-27069
| |
CVE-2024-26977
| |
CVE-2024-27067
| |
Memory Leak
| |
Double Free
| |
CVE-2024-27002
| |
Missing Synchronization
| |
CVE-2024-26973
| |
Double Free
| |
CVE-2024-26989
| |
CVE-2024-27056
| |
CVE-2023-52648
| |
Improper Locking
| |
Improper Resource Locking
| |
CVE-2024-27392
| |
CVE-2024-27010
| |
Memory Leak
| |
CVE-2024-27011
| |
CVE-2024-27064
| |
Incomplete Cleanup
| |
CVE-2024-26991
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2024-26992
| |
CVE-2024-26960
| |
Race Condition
| |
CVE-2024-27073
| |
CVE-2024-27004
| |
CVE-2024-27047
| |
CVE-2024-26958
| |
CVE-2024-27071
| |
CVE-2024-26976
| |
Race Condition
| |
Reachable Assertion
| |
CVE-2024-26953
| |
CVE-2024-27003
| |
CVE-2024-26974
| |
CVE-2023-52651
| |
CVE-2023-52652
| |
CVE-2024-26939
| |
CVE-2024-27048
| |
Improper Neutralization of Null Byte or NUL Character
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Deadlock
| |
NULL Pointer Dereference
| |
Reachable Assertion
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Use After Free
| |
Use After Free
| |
Incorrect Behavior Order
| |
NULL Pointer Dereference
| |
Modules with Circular Dependencies
| |
NULL Pointer Dereference
| |
Double Free
| |
Incomplete Internal State Distinction
| |
NULL Pointer Dereference
| |
Improper Handling of Values
| |
Improper Resource Shutdown or Release
| |
Reachable Assertion
| |
CVE-2022-48662
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Incorrect Behavior Order
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Integer Underflow
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Improper Validation of Specified Index, Position, or Offset in Input
| |
Improper Locking
| |
Race Condition
| |
Buffer Underflow
| |
Race Condition
| |
Unchecked Return Value to NULL Pointer Dereference
| |
Improper Input Validation
| |
Race Condition
| |
Deadlock
| |
Use After Free
| |
Memory Leak
| |
Resource Leak
| |
Unchecked Return Value to NULL Pointer Dereference
| |
CVE-2024-26920
| |
Improper Input Validation
| |
Resource Injection
| |
Improper Input Validation
| |
Race Condition
| |
Improper Input Validation
| |
Resource Injection
| |
Race Condition
| |
Memory Leak
| |
Data Element containing Pointer Item without Proper Copy Control Element
| |
Incomplete Cleanup
| |
Improper Input Validation
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Race Condition
| |
Improper Resource Locking
| |
Stack-based Buffer Overflow
| |
Improper Input Validation
| |
Divide By Zero
| |
Integer Underflow
| |
CVE-2024-26849
| |
Excessive Platform Resource Consumption within a Loop
| |
CVE-2024-26918
| |
Resource Injection
| |
Resource Leak
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Stack-based Buffer Overflow
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Improper Input Validation
| |
Integer Underflow
| |
CVE-2024-26841
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Deadlock
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Resource Leak
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Neutralization of Null Byte or NUL Character
| |
Improper Input Validation
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Improper Neutralization of Null Byte or NUL Character
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Resource Leak
| |
Use After Free
| |
NULL Pointer Dereference
| |
Incorrect Synchronization
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Excessive Platform Resource Consumption within a Loop
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Resource Leak
| |
Use After Free
| |
Deadlock
| |
Resource Injection
| |
Buffer Access with Incorrect Length Value
| |
Resource Injection
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Execution with Unnecessary Privileges
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Resource Injection
| |
NULL Pointer Dereference
| |
CVE-2024-26801
| |
Mismatched Memory Management Routines
| |
CVE-2024-26803
| |
Double Free
| |
CVE-2024-26804
| |
Use After Free
| |
Divide By Zero
| |
Deadlock
| |
Improper Null Termination
| |
Resource Injection
| |
Divide By Zero
| |
NULL Pointer Dereference
| |
Race Condition
| |
Deadlock
| |
Resource Injection
| |
Use After Free
| |
Unchecked Input for Loop Condition
| |
Improper Input Validation
| |
Improper Write Handling in Limited-write Non-Volatile Memories
| |
Deadlock
| |
Resource Leak
| |
Double Free
| |
Improper Input Validation
| |
Deadlock
| |
Improper Input Validation
| |
Race Condition
| |
CVE-2024-26764
| |
Improper Input Validation
| |
Use After Free
| |
Double Free
| |
Out-of-bounds Read
| |
Write-what-where Condition
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Race Condition
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Race Condition
| |
Resource Injection
| |
Incomplete Cleanup
| |
Improper Handling of Values
| |
Use After Free
| |
Deadlock
| |
Heap-based Buffer Overflow
| |
Improper Null Termination
| |
Resource Injection
| |
Improper Handling of Undefined Parameters
| |
Race Condition
| |
Improper Handling of Values
| |
Resource Injection
| |
Use After Free
| |
Out-of-bounds Write
| |
Divide By Zero
| |
NULL Pointer Dereference
| |
Race Condition
| |
NULL Pointer Dereference
| |
Deadlock
| |
Incomplete Cleanup
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Resource Injection
| |
Improper Null Termination
| |
Deadlock
| |
Deadlock
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Integer Overflow or Wraparound
| |
Resource Injection
| |
Unchecked Input for Loop Condition
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Out-of-Bounds
| |
Improper Resource Locking
| |
Out-of-bounds Read
| |
Race Condition
| |
Resource Injection
| |
Improper Locking
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Resource Injection
| |
Improper Resource Locking
| |
Race Condition
| |
Race Condition
| |
Incorrect Calculation of Buffer Size
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Use After Free
| |
Resource Injection
| |
Improper Input Validation
| |
Resource Leak
| |
Out-of-bounds Read
| |
Resource Injection
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Resource Injection
| |
Resource Injection
| |
Resource Injection
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Race Condition
| |
Resource Injection
| |
Resource Injection
| |
Resource Exhaustion
| |
Missing Initialization of a Variable
| |
Improper Input Validation
| |
Improper Input Validation
| |
Missing Initialization of a Variable
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Resource Injection
| |
Missing Lock Check
| |
Use After Free
| |
Resource Leak
| |
Missing Lock Check
| |
Improper Input Validation
| |
Incomplete Cleanup
| |
Out-of-bounds Read
| |
Resource Leak
| |
Use After Free
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Resource Leak
| |
Improper Input Validation
| |
Use After Free
| |
NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Double Free
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Resource Leak
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Improper Resource Locking
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Deadlock
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Improper Resource Locking
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Integer Overflow to Buffer Overflow
| |
Use After Free
| |
Resource Leak
| |
Race Condition
| |
NULL Pointer Dereference
| |
Deadlock
| |
Deadlock
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
Use After Free
| |
Improper Resource Locking
| |
Improper Input Validation
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Use of Uninitialized Variable
| |
Improper Resource Locking
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
Double Free
| |
Improper Input Validation
| |
Use of Uninitialized Variable
| |
Resource Leak
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
CVE-2023-52572
| |
CVE-2024-26602
| |
Memory Leak
| |
Stack-based Buffer Overflow
| |
CVE-2023-52575
| |
Memory Leak
| |
Unchecked Return Value
| |
Race Condition
| |
Improper Input Validation
| |
Resource Leak
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Incorrect Calculation of Buffer Size
| |
NULL Pointer Dereference
| |
Improper Handling of Exceptional Conditions
| |
Use After Free
| |
Memory Leak
| |
Improper Handling of Overlap Between Protected Memory Ranges
| |
Use After Free
| |
Resource Injection
| |
Use After Free
| |
Divide By Zero
| |
Resource Leak
| |
Missing Encryption of Sensitive Data
| |
Resource Leak
| |
Race Condition
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Use After Free
| |
CVE-2023-52497
| |
Resource Injection
| |
Memory Leak
| |
Deadlock
| |
Use After Free
| |
Use After Free
| |
Improper Resource Locking
| |
Improper Input Validation
| |
Memory Leak
| |
Memory Leak
| |
Truncation of Security-relevant Information
| |
Use After Free
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Resource Leak
| |
Use After Free
| |
Resource Leak
| |
CVE-2021-47055
| |
Improper Input Validation
| |
Return of Stack Variable Address
| |
Use After Free
| |
Resource Exhaustion
| |
Improper Protection Against Physical Side Channels
| |
NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Resource Leak
| |
Resource Leak
| |
Improper Input Validation
| |
Resource Leak
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Memory Leak
| |
Resource Leak
| |
Deadlock
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Out-of-Bounds
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Improper Handling of Missing Values
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Resource Leak
| |
Improper Input Validation
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Deadlock
| |
Use After Free
| |
Missing Report of Error Condition
| |
Resource Leak
| |
Resource Leak
| |
CVE-2021-47019
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Deadlock
| |
Improper Input Validation
| |
Resource Leak
| |
Information Exposure Through Indexing of Private Data
| |
Resource Leak
| |
Improper Input Validation
| |
Improper Input Validation
| |
Memory Leak
| |
Use After Free
| |
Untrusted Pointer Dereference
| |
Uncontrolled Memory Allocation
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Double Free
| |
Improper Input Validation
| |
Use After Free
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Use After Free
| |
Improper Input Validation
| |
Improper Input Validation
| |
Use After Free
| |
Return of Wrong Status Code
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Out-of-bounds Read
| |
Memory Leak
| |
Out-of-bounds Read
| |
Resource Leak
| |
Improper Input Validation
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
Incorrect Check of Function Return Value
| |
Improper Handling of Values
| |
Use After Free
| |
Improper Input Validation
| |
Race Condition
| |
Use After Free
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Use After Free
| |
Resource Leak
| |
Resource Leak
| |
Resource Leak
| |
Memory Leak
| |
Use After Free
| |
Resource Leak
| |
Resource Leak
| |
Resource Leak
| |
Resource Leak
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Integer Underflow
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Improper Resource Locking
| |
Out-of-bounds Read
| |
Use After Free
| |
Resource Injection
| |
CVE-2021-46914
| |
Information Exposure
| |
Improper Input Validation
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Use After Free
| |
Resource Leak
| |
Improper Input Validation
| |
Incorrect Calculation of Buffer Size
| |
Deadlock
| |
Memory Leak
| |
Missing Support for Integrity Check
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Resource Leak
| |
Memory Leak
| |
Improper Input Validation
| |
Range Error
| |
Divide By Zero
| |
Improper Check or Handling of Exceptional Conditions
| |
Improper Input Validation
| |
Improper Input Validation
| |
CVE-2021-46922
| |
Improper Input Validation
| |
Use After Free
| |
Unchecked Error Condition
| |
Double Free
| |
Memory Leak
| |
Resource Leak
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Integer Underflow
| |
Double Free
| |
Race Condition
| |
CVE-2023-52474
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Read
| |
Resource Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
CVE-2023-52461
| |
CVE-2023-52455
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Untrusted Pointer Dereference
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
Memory Leak
| |
Improper Check for Unusual or Exceptional Conditions
| |
CVE-2024-25744
| |
Insufficient Control Flow Management
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Information Exposure
| |
Use After Free
| |
Information Exposure
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Resource Exhaustion
| |
Use After Free
| |
Information Exposure
| |
Race Condition
| |
Improper Update of Reference Count
| |
Memory Leak
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Man-in-the-Middle (MitM)
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Double Free
| |
Out-of-bounds Read
| |
Race Condition
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
Allocation of Resources Without Limits or Throttling
| |
Buffer Overflow
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Access Control
| |
Use After Free
| |
Use After Free
| |
Improper Validation of Array Index
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Improper Zeroization of Hardware Register
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Double Free
| |
NULL Pointer Dereference
| |
Race Condition
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Out-of-bounds Read
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Incorrect Bitwise Shift of Integer
| |
CVE-2023-31084
| |
Divide By Zero
| |
Race Condition
| |
Release of Invalid Pointer or Reference
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Execution with Unnecessary Privileges
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Write
| |
Information Exposure
| |
Improperly Implemented Security Check for Standard
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Use After Free
| |
Sensitive Information Uncleared Before Release
| |
Incorrect Authorization
| |
Use After Free
| |
Double Free
| |
Sensitive Information Uncleared Before Release
| |
Out-of-bounds Read
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Improper Initialization
| |
NULL Pointer Dereference
| |
Authentication Bypass
| |
CVE-2022-27672
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Memory Leak
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Memory Leak
| |
Insecure Default Initialization of Resource
| |
Memory Leak
| |
Out-of-bounds Read
| |
Non-exit on Failed Initialization
| |
Information Exposure
| |
Memory Leak
| |
Logging of Excessive Data
| |
Unchecked Return Value
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Integer Overflow or Wraparound
| |
Race Condition
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Memory Leak
| |
Race Condition
| |
Deadlock
| |
Memory Leak
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Access of Uninitialized Pointer
| |
Use After Free
| |
Improper Locking
| |
Use After Free
| |
Race Condition During Access to Alternate Channel
| |
Race Condition
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Information Exposure
| |
Use After Free
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Expected Behavior Violation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Buffer Overflow
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Improper Locking
| |
Missing Report of Error Condition
| |
Improper Initialization
| |
Improper Input Validation
| |
Expected Behavior Violation
| |
Out-of-bounds Write
| |
Improper Restriction of Communication Channel to Intended Endpoints
| |
Improper Locking
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Improper Update of Reference Count
| |
Incorrect Calculation of Buffer Size
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Incorrect Conversion between Numeric Types
| |
Improper Locking
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Use After Free
| |
Privilege Defined With Unsafe Actions
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Incorrect Default Permissions
| |
Use After Free
| |
CVE-2021-26401
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Double Free
| |
Information Exposure
| |
Missing Initialization of Resource
| |
Information Exposure
| |
Improper Input Validation
| |
Use of Uninitialized Resource
| |
Memory Leak
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Information Exposure
| |
Authentication Bypass
| |
Memory Leak
| |
Improper Preservation of Permissions
| |
NULL Pointer Dereference
| |
Use of Uninitialized Resource
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Allocation of Resources Without Limits or Throttling
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Improper Preservation of Permissions
| |
Release of Invalid Pointer or Reference
| |
Use of Insufficiently Random Values
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Out-of-Bounds
| |
Race Condition
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Out-of-Bounds
| |
Improper Locking
| |
Improper Validation of Integrity Check Value
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2019-0136
| |
Incomplete Cleanup
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Incomplete Cleanup
| |
Incomplete Cleanup
| |
Out-of-bounds Write
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Unchecked Return Value
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Use of Insufficiently Random Values
| |
Insufficient Comparison
| |
Race Condition
| |
Information Exposure
| |
Cleartext Transmission of Sensitive Information
| |
Integer Overflow or Wraparound
| |
Improper Initialization
| |
Information Exposure
| |
Race Condition
| |
Out-of-bounds Read
| |
Memory Leak
| |
Race Condition
| |
Memory Leak
| |
Improper Validation of Integrity Check Value
| |
Use After Free
| |
Incorrect Permission Assignment for Critical Resource
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Out-of-Bounds
| |
Information Exposure
| |
Information Exposure
| |
Allocation of Resources Without Limits or Throttling
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Unchecked Return Value
| |
Use After Free
| |
Privilege Dropping / Lowering Errors
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Execution with Unnecessary Privileges
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Operation on a Resource after Expiration or Release
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Improper Cleanup on Thrown Exception
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Incorrect Conversion between Numeric Types
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
Detection of Error Condition Without Action
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
CVE-2014-7975
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Improper Handling of Length Parameter Inconsistency
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
CVE-2017-1000379
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Missing Authorization
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Handling of Syntactically Invalid Structure
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Improperly Implemented Security Check for Standard
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Incorrect Privilege Assignment
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
Interaction Error
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Incorrect Calculation of Buffer Size
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Directory Traversal
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Exposed Dangerous Method or Function
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
CVE-2014-9585
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
External Initialization of Trusted Variables or Data Stores
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Use After Free
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Return of Wrong Status Code
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Information Exposure
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Code
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Improper Data Handling
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
CVE-2014-4171
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Improper Enforcement of Behavioral Workflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Link Following
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
Resource Management Errors
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
CVE-2014-3631
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Off-by-one Error
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Insufficient Comparison
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Missing Release of Resource after Effective Lifetime
| |
Improper Input Validation
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
External Control of Critical State Data
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Out-of-bounds Read
| |
Use After Free
| |
Execution with Unnecessary Privileges
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Execution with Unnecessary Privileges
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Check for Unusual or Exceptional Conditions
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Improper Privilege Management
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
CVE-2014-0206
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Resource Exhaustion
| |
Use After Free
| |
Out-of-bounds Read
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Information Exposure
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Improper Access Control
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use of Insufficiently Random Values
| |
Use of Insufficiently Random Values
| |
Use of Insufficiently Random Values
| |
Use of Insufficiently Random Values
| |
Use of Insufficiently Random Values
| |
Use of Insufficiently Random Values
| |
Use of Insufficiently Random Values
| |
Use of Insufficiently Random Values
| |
Use of Insufficiently Random Values
| |
Use of Insufficiently Random Values
| |
Use of Insufficiently Random Values
| |
Cleartext Transmission of Sensitive Information
| |
Improper Input Validation
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Arbitrary Code Injection
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Race Condition
| |
Improper Input Validation
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Memory Leak
| |
Improper Input Validation
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Use of Uninitialized Resource
| |
Acceptance of Extraneous Untrusted Data With Trusted Data
| |
Out-of-bounds Write
| |
Race Condition
| |
Insufficient Comparison
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Use After Free
| |
Incomplete Cleanup
| |
Race Condition
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Expected Behavior Violation
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Improper Locking
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Memory Leak
| |
Incorrect Permission Assignment for Critical Resource
| |
Race Condition
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Information Exposure
| |
Execution with Unnecessary Privileges
| |
Resource Exhaustion
| |
Buffer Overflow
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
Null Byte Interaction Error (Poison Null Byte)
| |
Improper Input Validation
| |
Improper Access Control
| |
Resource Exhaustion
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Missing Release of Resource after Effective Lifetime
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Incorrect Check of Function Return Value
| |
Out-of-bounds Write
| |
Improper Cleanup on Thrown Exception
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Out-of-Bounds
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Insufficient Entropy
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Resource Exhaustion
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Resource Exhaustion
| |
Memory Leak
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Out-of-bounds Read
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Missing Initialization of a Variable
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Use of Insufficiently Random Values
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Information Exposure
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Missing Release of Resource after Effective Lifetime
| |
Information Exposure
| |
Improper Input Validation
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Reachable Assertion
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Numeric Range Comparison Without Minimum Check
| |
Missing Authorization
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Resource Exhaustion
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Deadlock
| |
Out-of-bounds Read
| |
Information Exposure
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Sensitive Information Uncleared Before Release
| |
Out-of-bounds Read
| |
Improper Access Control
| |
Divide By Zero
| |
Divide By Zero
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Error Handling
| |
Out-of-bounds Read
| |
Unchecked Error Condition
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Out-of-bounds Read
| |
Use After Free
| |
Incorrect Check of Function Return Value
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Out-of-Bounds
| |
Use After Free
| |
Missing Initialization of Resource
| |
Race Condition
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Race Condition
| |
Heap-based Buffer Overflow
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Race Condition
| |
Double Free
| |
Buffer Overflow
| |
Out-of-bounds Write
| |
Improper Initialization
| |
Integer Overflow or Wraparound
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Race Condition
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Out-of-Bounds
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Missing Release of Resource after Effective Lifetime
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Buffer Overflow
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Directory Traversal
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Missing Release of Resource after Effective Lifetime
| |
Information Exposure
| |
Improper Locking
| |
Information Exposure
| |
Incorrect Authorization
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Heap-based Buffer Overflow
| |
Stack-based Buffer Overflow
| |
Race Condition
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Race Condition
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Improper Initialization
| |
Time-of-check Time-of-use (TOCTOU)
| |
Predictable from Observable State
| |
Predictable from Observable State
| |
Predictable from Observable State
| |
Predictable from Observable State
| |
Predictable from Observable State
| |
Predictable from Observable State
| |
Predictable from Observable State
| |
Predictable from Observable State
| |
Predictable from Observable State
| |
Predictable from Observable State
| |
Improper Initialization
| |
Use After Free
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Buffer Overflow
| |
Improper Authentication
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Missing XML Validation
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Improper Access Control
| |
Information Exposure
| |
Improper Initialization
| |
Information Exposure
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improperly Implemented Security Check for Standard
| |
NULL Pointer Dereference
| |
Use After Free
| |
Execution with Unnecessary Privileges
| |
Buffer Overflow
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
Divide By Zero
| |
NULL Pointer Dereference
| |
Incorrect Authorization
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Locking
| |
NULL Pointer Dereference
| |
Improper Locking
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Missing Authorization
| |
NULL Pointer Dereference
| |
Integer Underflow
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Information Exposure
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Covert Timing Channel
| |
Resource Exhaustion
| |
Improper Restriction of Excessive Authentication Attempts
| |
Buffer Overflow
| |
Improper Restriction of Excessive Authentication Attempts
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Authentication Bypass
| |
Origin Validation Error
| |
Origin Validation Error
| |
Origin Validation Error
| |
Inclusion of Functionality from Untrusted Control Sphere
| |
Use After Free
| |
Cleartext Transmission of Sensitive Information
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Insufficient Verification of Data Authenticity
| |
Resource Exhaustion
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Incorrect Authorization
| |
Improper Input Validation
| |
Incorrect Privilege Assignment
| |
Incorrect Permission Assignment for Critical Resource
| |
Security Features
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Information Exposure
| |
Missing Release of Resource after Effective Lifetime
| |
Out-of-bounds Write
| |
Use After Free
| |
Improper Cleanup on Thrown Exception
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
Unchecked Error Condition
| |
NULL Pointer Dereference
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Out-of-bounds Read
| |
Memory Leak
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Incorrect Permission Assignment for Critical Resource
| |
NULL Pointer Dereference
| |
Authentication Bypass
| |
Divide By Zero
| |
Information Exposure
| |
Improper Access Control
| |
Improper Initialization
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
Authentication Bypass by Primary Weakness
| |
Missing Release of Resource after Effective Lifetime
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Missing Release of Resource after Effective Lifetime
| |
Race Condition
| |
Out-of-bounds Write
| |
Missing Release of Resource after Effective Lifetime
| |
Use After Free
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Uncaught Exception
| |
Use After Free
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Information Exposure
| |
Resource Exhaustion
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
Improper Handling of Length Parameter Inconsistency
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Expected Behavior Violation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Information Exposure
| |
Use After Free
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Improper Enforcement of Behavioral Workflow
| |
Files or Directories Accessible to External Parties
| |
Resource Exhaustion
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Security Features
| |
Out-of-bounds Read
| |
Unchecked Return Value
| |
Information Exposure
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Race Condition
| |
Heap-based Buffer Overflow
| |
Information Exposure
| |
Improper Initialization
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Race Condition
| |
Cryptographic Issues
| |
Improper Input Validation
| |
Access Restriction Bypass
| |