Arbitrary Command Injection | |
Insecure Inherited Permissions | |
Insecure Inherited Permissions | |
Insecure Inherited Permissions | |
Arbitrary Command Injection | |
Insecure Inherited Permissions | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Authentication Bypass | |
Insecure Inherited Permissions | |
Insecure Inherited Permissions | |
Insecure Inherited Permissions | |
Insecure Inherited Permissions | |
Heap-based Buffer Overflow | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Incorrect Default Permissions | |