Server-Side Request Forgery (SSRF) | |
Out-of-Bounds | |
Improper Input Validation | |
Heap-based Buffer Overflow | |
Stack-based Buffer Overflow | |
External Control of File Name or Path | |
Link Following | |
Misinterpretation of Input | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Arbitrary Command Injection | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |
External Control of File Name or Path | |