Signed to Unsigned Conversion Error | |
Uncontrolled Memory Allocation | |
Integer Overflow or Wraparound | |
Improper Handling of Length Parameter Inconsistency | |
Signed to Unsigned Conversion Error | |
Uncontrolled Memory Allocation | |
Integer Overflow or Wraparound | |
Improper Handling of Length Parameter Inconsistency | |
Out-of-Bounds | |
Signed to Unsigned Conversion Error | |
Uncontrolled Memory Allocation | |
Integer Overflow or Wraparound | |
Improper Handling of Length Parameter Inconsistency | |
Out-of-Bounds | |
Signed to Unsigned Conversion Error | |
Uncontrolled Memory Allocation | |
Integer Overflow or Wraparound | |
Improper Handling of Length Parameter Inconsistency | |
Out-of-Bounds | |
Signed to Unsigned Conversion Error | |
Uncontrolled Memory Allocation | |
Integer Overflow or Wraparound | |
Improper Handling of Length Parameter Inconsistency | |
Out-of-Bounds | |
Signed to Unsigned Conversion Error | |
Uncontrolled Memory Allocation | |
Integer Overflow or Wraparound | |
Improper Handling of Length Parameter Inconsistency | |
Out-of-Bounds | |
CVE-2024-21147 | |
Out-of-bounds Read | |
CVE-2024-21140 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2024-21131 | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Reliance on Reverse DNS Resolution for a Security-Critical Action | |
Improper Output Neutralization for Logs | |
Covert Timing Channel | |
Information Exposure Through Log Files | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Improper Certificate Validation | |
Out-of-Bounds | |
Allocation of Resources Without Limits or Throttling | |
Directory Traversal | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Small Space of Random Values | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Directory Traversal | |
Improper Input Validation | |
Improperly Implemented Security Check for Standard | |
Information Exposure | |
Improper Input Validation | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
Reliance on File Name or Extension of Externally-Supplied File | |
Resource Exhaustion | |
Authentication Bypass | |
Integer Overflow or Wraparound | |
Allocation of Resources Without Limits or Throttling | |
Resource Exhaustion | |
Use of Insufficiently Random Values | |
Integer Coercion Error | |
Buffer Overflow | |
Integer Coercion Error | |
Inconsistency Between Implementation and Documented Design | |
Improper Access Control | |
Resource Leak | |
Improper Use of Validation Framework | |
Incorrect Behavior Order: Early Validation | |
Improper Verification of Cryptographic Signature | |
Integer Underflow | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Resource Exhaustion | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
CVE-2024-21147 | |
Out-of-bounds Read | |
CVE-2024-21140 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2024-21131 | |
CVE-2024-21147 | |
Out-of-bounds Read | |
CVE-2024-21140 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2024-21131 | |
CVE-2024-21147 | |
Out-of-bounds Read | |
CVE-2024-21140 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2024-21131 | |
CVE-2024-21147 | |
Out-of-bounds Read | |
CVE-2024-21140 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2024-21131 | |
CVE-2024-21140 | |
CVE-2024-21147 | |
CVE-2024-21131 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Out-of-bounds Read | |
Improper Output Neutralization for Logs | |
Integer Overflow or Wraparound | |
Reliance on Reverse DNS Resolution for a Security-Critical Action | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Reliance on Reverse DNS Resolution for a Security-Critical Action | |
Improper Output Neutralization for Logs | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Reliance on Reverse DNS Resolution for a Security-Critical Action | |
Improper Output Neutralization for Logs | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Reliance on Reverse DNS Resolution for a Security-Critical Action | |
Improper Output Neutralization for Logs | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Reliance on Reverse DNS Resolution for a Security-Critical Action | |
Improper Output Neutralization for Logs | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Reliance on Reverse DNS Resolution for a Security-Critical Action | |
Improper Output Neutralization for Logs | |
Covert Timing Channel | |
Information Exposure Through Log Files | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Covert Timing Channel | |
Information Exposure Through Log Files | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Covert Timing Channel | |
Information Exposure Through Log Files | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Covert Timing Channel | |
Information Exposure Through Log Files | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Covert Timing Channel | |
Information Exposure Through Log Files | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Information Exposure Through Log Files | |
Improper Input Validation | |
Covert Timing Channel | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Small Space of Random Values | |
Small Space of Random Values | |
Small Space of Random Values | |
Small Space of Random Values | |
Small Space of Random Values | |
Small Space of Random Values | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improperly Implemented Security Check for Standard | |
Improperly Implemented Security Check for Standard | |
Improperly Implemented Security Check for Standard | |
Improperly Implemented Security Check for Standard | |
Improperly Implemented Security Check for Standard | |
Improperly Implemented Security Check for Standard | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Neutralization of Null Byte or NUL Character | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Reliance on File Name or Extension of Externally-Supplied File | |
Reliance on File Name or Extension of Externally-Supplied File | |
Reliance on File Name or Extension of Externally-Supplied File | |
Reliance on File Name or Extension of Externally-Supplied File | |
Reliance on File Name or Extension of Externally-Supplied File | |
Reliance on File Name or Extension of Externally-Supplied File | |
NULL Pointer Dereference | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Integer Coercion Error | |
Integer Coercion Error | |
Integer Coercion Error | |
Integer Coercion Error | |
Integer Coercion Error | |
Integer Coercion Error | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Integer Coercion Error | |
Integer Coercion Error | |
Integer Coercion Error | |
Integer Coercion Error | |
Integer Coercion Error | |
Integer Coercion Error | |
Inconsistency Between Implementation and Documented Design | |
Inconsistency Between Implementation and Documented Design | |
Inconsistency Between Implementation and Documented Design | |
Inconsistency Between Implementation and Documented Design | |
Inconsistency Between Implementation and Documented Design | |
Inconsistency Between Implementation and Documented Design | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Improper Verification of Cryptographic Signature | |
Improper Verification of Cryptographic Signature | |
Improper Verification of Cryptographic Signature | |
Improper Verification of Cryptographic Signature | |
Improper Verification of Cryptographic Signature | |
Improper Verification of Cryptographic Signature | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Integer Underflow | |
Integer Underflow | |
Integer Underflow | |
Integer Underflow | |
Integer Underflow | |
Integer Underflow | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |