Incorrect Default Permissions | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
Inclusion of Functionality from Untrusted Control Sphere | |
Improper Encoding or Escaping of Output | |
Improper Encoding or Escaping of Output | |
Improper Encoding or Escaping of Output | |
Detection of Error Condition Without Action | |
Resource Exhaustion | |
Improper Validation of Certificate with Host Mismatch | |
Missing Release of Resource after Effective Lifetime | |
Improper Certificate Validation | |
Misinterpretation of Input | |
Cross-site Scripting (XSS) | |
Missing Required Cryptographic Step | |
Missing Encryption of Sensitive Data | |
Information Exposure | |
Out-of-bounds Read | |