Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.39)[8.1.0,8.4.2)[9.0.0,9.1.0) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Information Exposure | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Information Exposure | |
Information Exposure | |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Information Exposure | |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | [,8.0.40)[8.1.0,8.4.3)[9.0.0,9.1.0) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Denial of Service (DoS) | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Authorization | |
Improper Authorization | |
Improper Access Control | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Access Control Bypass | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Access Control Bypass | |
Denial of Service (DoS) | |
Resource Exhaustion | |
Resource Exhaustion | |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Cryptographic Issues | [,5.5.53)[5.6.0,5.6.34)[5.7.0,5.7.16) |
Authentication Bypass | |
Denial of Service (DoS) | |
CVE-2015-2576 | |
Improper Certificate Validation | |
Improper Input Validation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | |
Information Exposure | |
Denial of Service (DoS) | |
Information Exposure | [7.4.0,7.4.33][7.5.0,7.5.23][7.6.0,7.6.19][8.0.0,) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | [7.4.0,7.4.33][7.5.0,7.5.23][7.6.0,7.6.19][8.0.0,) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | [7.4.0,7.4.33][7.5.0,7.5.23][7.6.0,7.6.19][8.0.0,) |
Out-of-bounds Write | [7.4.0,7.4.33][7.5.0,7.5.23][7.6.0,7.6.19][8.0.0,) |
Improper Input Validation | [7.5.0,7.5.23][7.6.0,7.6.19][8.0.0,) |
Denial of Service (DoS) | |
Improper Input Validation | [7.4.0,7.4.33][7.5.0,7.5.23][7.6.0,7.6.19][8.0.0,) |
Out-of-Bounds | |
Improper Access Control | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Access Control | |
CVE-2016-0647 | [5.5.0,5.5.49)[5.6.0,5.6.30)[5.7.0,5.7.12) |
Access Restriction Bypass | [5.5.0,5.5.39)[5.6.0,5.6.20) |
Information Exposure | |
Information Exposure | |
Access Restriction Bypass | [,5.1.68][5.1.68,5.5.30][5.5.30,5.6.11) |
Improper Access Control | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.23) |
Information Exposure | |
Improper Access Control | [5.6.0,5.6.42)[5.7.0,5.7.24)[8.0.0,8.0.13) |
Denial of Service (DoS) | [5.7.0,5.7.25)[8.0.0,8.0.14) |
Access Restriction Bypass | |
Improper Access Control | |
CVE-2013-5908 | [,5.1.72][5.1.72,5.5.34][5.5.34,5.6.15) |
Denial of Service (DoS) | [5.7.0,5.7.25)[8.0.0,8.0.14) |
Information Exposure | [5.5.0,5.5.49)[5.6.0,5.6.30)[5.7.0,5.7.12) |
Improper Access Control | [5.6.0,5.6.42)[5.7.0,5.7.24)[8.0.0,8.0.13) |
Information Exposure | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
Access Restriction Bypass | [,5.1.71][5.1.71,5.5.33][5.5.33,5.6.14) |
Improper Access Control | [5.5.0,5.5.54)[5.6.0,5.6.35)[5.7.0,5.7.17) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.43)[5.7.0,5.7.25)[8.0.0,8.0.14) |
SQL Injection | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | |
Information Exposure | [5.5.0,5.5.41)[5.6.0,5.6.22) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.41)[5.7.0,5.7.22) |
Access Restriction Bypass | [5.1.0,5.1.64)[5.5.0,5.5.26) |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Access Control | [5.5.0,5.5.55)[5.6.0,5.6.36)[5.7.0,5.7.18) |
CVE-2016-5439 | [5.6.0,5.6.31)[5.7.0,5.7.13) |
Access Restriction Bypass | [5.5.0,5.5.40)[5.6.0,5.6.21) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.35)[5.7.0,5.7.17) |
Denial of Service (DoS) | |
Information Exposure | |
CVE-2016-5437 | |
Access Restriction Bypass | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | |
Denial of Service (DoS) | [,5.0.51)[5.1.0,5.1.23)[6.0.0,6.0.4) |
Improper Access Control | |
Out-of-Bounds | |
Improper Access Control | [5.6.0,5.6.36)[5.7.0,5.7.18) |
Access Restriction Bypass | |
Improper Access Control | |
Information Exposure | |
Improper Access Control | [5.6.0,5.6.37)[5.7.0,5.7.19) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Access Control | |
Access Restriction Bypass | |
Out-of-Bounds | |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | [5.5.0,5.5.54)[5.6.0,5.6.35)[5.7.0,5.7.17) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | [5.6.0,5.6.47)[5.7.0,5.7.29)[8.0.0,8.0.19) |
Information Exposure | [5.5.0,5.5.40)[5.6.0,5.6.21) |
CVE-2016-0652 | |
Resource Management Errors | |
Denial of Service (DoS) | [,7.2.25][7.2.25,7.3.14][7.3.14,7.4.13) |
Access Restriction Bypass | [5.6.0,5.6.32)[5.7.0,5.7.14) |
Improper Input Validation | |
Denial of Service (DoS) | [,5.5.58)[5.6.0,5.6.38)[5.7.0,5.7.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | [,5.1.67][5.1.67,5.5.29][5.5.29,5.6.11) |
Improper Access Control | [5.6.0,5.6.37)[5.7.0,5.7.19) |
CVE-2016-0649 | [5.5.0,5.5.48)[5.6.0,5.6.29)[5.7.0,5.7.11) |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Integer Underflow | [,7.3.30][7.4.0,7.4.29][7.5.0,7.5.19][7.6.0,7.6.15][8.0.0,) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
CVE-2016-8284 | [5.6.0,5.6.32)[5.7.0,5.7.14) |
Denial of Service (DoS) | |
Information Exposure | [5.5.0,5.5.44)[5.6.0,5.6.25) |
Denial of Service (DoS) | [5.6.0,5.6.49][5.7.0,7.1.29)[8.0.0,) |
Denial of Service (DoS) | [5.7.0,5.7.25)[8.0.0,8.0.14) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.39)[5.7.0,5.7.20) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Access Control | [5.5.0,5.5.57)[5.6.0,5.6.37)[5.7.0,5.7.18][5.7.18,7.1.29) |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | [7.3.0,7.3.29][7.4.0,7.4.28][7.5.0,7.5.18][7.6.0,7.6.14][8.0.0,) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | |
Denial of Service (DoS) | |
Improper Access Control | [5.5.0,5.5.57)[5.6.0,5.6.37)[5.7.0,5.7.19) |
Denial of Service (DoS) | [5.3.0,5.4.1)[8.0.0,8.0.20) |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | [,5.6.48][5.7.0,7.1.29)[8.0.0,) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Improper Access Control | [5.7.0,5.7.23)[8.0.0,8.0.12) |
Access Restriction Bypass | |
Information Exposure | [5.6.0,5.6.48)[5.7.0,5.7.29) |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.30)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | [5.5.0,5.5.51)[5.6.0,5.6.32)[5.7.0,5.7.14) |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.46)[5.6.0,5.6.27) |
Access Restriction Bypass | |
CVE-2012-0494 | |
Access Restriction Bypass | |
Improper Access Control | [5.6.0,5.6.41)[5.7.0,5.7.23)[8.0.0,8.0.12) |
CVE-2016-0655 | [5.6.0,5.6.30)[5.7.0,5.7.12) |
Denial of Service (DoS) | |
CVE-2014-0433 | |
Access Restriction Bypass | [5.5.0,5.5.50)[5.6.0,5.6.31)[5.7.0,5.7.13) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | [5.5.0,5.5.56)[5.6.0,5.6.36) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | [5.5.0,5.5.32)[5.6.0,5.6.12) |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | [5.5.0,5.5.43)[5.6.0,5.6.24) |
Access Restriction Bypass | |
Improper Access Control | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | [5.5.0,5.5.46)[5.6.0,5.6.27) |
Denial of Service (DoS) | [5.6.0,5.6.39)[5.7.0,5.7.21) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,5.5.58)[5.6.0,5.6.38)[5.7.0,5.7.12) |
Access Restriction Bypass | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Symlink Attack | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Information Exposure | [5.6.0,5.6.39)[5.7.0,5.7.21) |
CVE-2016-5634 | |
Improper Access Control | |
CVE-2016-8290 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.6.0,5.6.31)[5.7.0,5.7.13) |
Denial of Service (DoS) | |
CVE-2016-0648 | [5.5.0,5.5.49)[5.6.0,5.6.30)[5.7.0,5.7.12) |
Denial of Service (DoS) | |
Information Exposure | [,5.1.68][5.1.68,5.5.30][5.5.30,5.6.11) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.5.0,5.5.59)[5.6.0,5.6.39)[5.7.0,5.7.21) |
Denial of Service (DoS) | |
Information Exposure | [5.5.0,5.5.49)[5.6.0,5.6.30)[5.7.0,5.7.11) |
CVE-2016-0658 | |
CVE-2016-5443 | |
Access Restriction Bypass | |
Improper Access Control | |
CVE-2015-2661 | |
Access Restriction Bypass | [5.5.0,5.5.46)[5.6.0,5.6.27) |
Improper Access Control | |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Resource Management Errors | [,5.0.92)[5.1.0,5.1.51)[5.5.0,5.5.6) |
Improper Access Control | [,7.2.27][7.2.27,7.3.16][7.3.16,7.4.14][7.4.14,7.5.6) |
Information Exposure | [5.7.0,5.7.26)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Resources Downloaded over Insecure Protocol | [4.0.0,4.0.12)[8.0.0,8.0.20) |
Denial of Service (DoS) | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.22) |
Information Exposure | |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
Improper Access Control | [5.6.0,5.6.42)[5.7.0,5.7.24)[8.0.0,8.0.13) |
Use of Externally-Controlled Format String | |
Denial of Service (DoS) | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.22) |
Improper Access Control | |
Access Restriction Bypass | [,5.1.67][5.1.67,5.5.29][5.5.29,5.6.11) |
Access Restriction Bypass | [,5.1.72][5.1.72,5.5.34][5.5.34,5.6.15) |
Access Restriction Bypass | [,5.1.68][5.1.68,5.5.30][5.5.30,5.6.11) |
Information Exposure | [5.5.0,5.5.46)[5.6.0,5.6.27) |
Information Exposure | |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.39)[5.7.0,5.7.21) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
Access Restriction Bypass | [,5.1.71][5.1.71,5.5.33][5.5.33,5.6.14) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | [5.7.0,5.7.23)[8.0.0,8.0.12) |
Insufficient Encapsulation | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | [5.5.0,5.5.40)[5.6.0,5.6.21) |
Access Restriction Bypass | [5.5.0,5.5.53)[5.6.0,5.6.34)[5.7.0,5.7.16) |
Access Restriction Bypass | |
Improper Access Control | [5.6.0,5.6.39)[5.7.0,5.7.21) |
Information Exposure | |
Access Restriction Bypass | |
Denial of Service (DoS) | [5.6.0,5.6.39)[5.7.0,5.7.21) |
Information Exposure | [5.5.0,5.5.40)[5.6.0,5.6.21) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | [,5.5.58)[5.6.0,5.6.38)[5.7.0,5.7.20) |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.0.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.22) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.49][5.7.0,7.1.29)[8.0.0,) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2016-5635 | |
Improper Access Control | [5.6.0,5.6.42)[5.7.0,5.7.24)[8.0.0,8.0.13) |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.0.0,5.7.26)[8.0.0,8.0.20) |
Information Exposure | |
Access Restriction Bypass | [5.5.0,5.5.46)[5.6.0,5.6.27) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
Denial of Service (DoS) | |
Improper Access Control | [5.5.0,5.5.55)[5.6.0,5.6.36)[5.7.0,5.7.18) |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
Denial of Service (DoS) | |
Improper Access Control | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.49][5.7.0,7.1.29)[8.0.0,) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
CVE-2013-1502 | |
Improper Access Control | [5.6.0,5.6.41)[5.7.0,5.7.23)[8.0.0,8.0.12) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | [5.5.0,5.5.59)[5.6.0,5.6.39)(5.7.0,5.7.21) |
Improper Access Control | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.22) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2015-4766 | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.47)[5.6.0,5.6.28) |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | [5.5.0,5.5.49)[5.6.0,5.6.30)[5.7.0,5.7.12) |
Access Restriction Bypass | |
Improper Access Control | [5.7.0,5.7.23)[8.0.0,8.0.12) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.26)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.43)[5.7.0,5.7.25)[8.0.0,8.0.14) |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.26)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Improper Access Control | |
Access Restriction Bypass | |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Access Restriction Bypass | |
CVE-2012-1702 | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Access Restriction Bypass | |
Improper Access Control | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Neutralization | |
Improper Access Control | |
Buffer Overflow | |
Improper Access Control | |
Information Exposure | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.5.0,5.5.54)[5.6.0,5.6.35)[5.7.0,5.7.17) |
CVE-2016-5440 | [5.5.0,5.5.50)[5.6.0,5.6.31)[5.7.0,5.7.13) |
Access Restriction Bypass | [5.6.0,5.6.32)[5.7.0,5.7.14) |
Denial of Service (DoS) | |
CVE-2016-0665 | [5.6.0,5.6.29)[5.7.0,5.7.11) |
Denial of Service (DoS) | [5.6.0,5.6.39)(5.7.0,5.7.21) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2016-0651 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,7.2.26][7.2.26,7.3.14][7.3.14,7.4.13) |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
CVE-2013-3798 | |
Denial of Service (DoS) | |
CVE-2013-1570 | |
Improper Access Control | [5.5.0,5.5.57)[5.6.0,5.6.37)[5.7.0,5.7.19) |
Denial of Service (DoS) | |
Improper Access Control | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | [5.5.0,5.5.47)[5.6.0,5.6.28)[5.7.0,5.7.10) |
Denial of Service (DoS) | |
CVE-2001-1275 | |
SQL Injection | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | [5.5.0,5.5.44)[5.6.0,5.6.25) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | [5.5.0,5.5.39)[5.6.0,5.6.20) |
Improper Input Validation | |
Denial of Service (DoS) | [5.6.0,5.6.50][5.7.0,7.1.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.43)[5.6.0,5.6.24) |
CVE-2016-0668 | [5.6.0,5.6.29)[5.7.0,5.7.11) |
Access Restriction Bypass | [,5.1.69][5.1.69,5.5.31][5.5.31,5.6.12) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | [5.6.0,5.6.37)[5.7.0,5.7.19) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2015-0382 | [5.5.0,5.5.41)[5.6.0,5.6.22) |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [7.2.0,7.2.28)[7.3.1,7.3.17)[7.4.1,7.4.15)[7.5.0,7.5.6) |
CVE-2012-3147 | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | [5.5.0,5.5.41)[5.6.0,5.6.22) |
Denial of Service (DoS) | [5.6.0,5.6.39)[5.7.0,5.7.21) |
Access Restriction Bypass | |
Information Exposure | |
Denial of Service (DoS) | |
Improper Access Control | [5.6.0,5.6.42)[5.7.0,5.7.24)[8.0.0,8.0.13) |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.26)[8.0.0,8.0.20) |
Access Restriction Bypass | [,5.1.71][5.1.71,5.5.33][5.5.33,5.6.14) |
Access Restriction Bypass | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
Denial of Service (DoS) | [5.6.0,5.6.50][5.7.0,7.1.29)[8.0.0,) |
Access Restriction Bypass | [,5.1.72][5.1.72,5.5.34][5.5.34,5.6.15) |
Improper Access Control | |
Improper Access Control | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.23) |
Access Restriction Bypass | [5.5.0,5.5.43)[5.6.0,5.6.24) |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Information Exposure | [5.5.0,5.5.45)[5.6.0,5.6.26) |
Resource Management Errors | [,5.0.92)[5.1.0,5.1.51)[5.5.0,5.5.6) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Resource Management Errors | [,5.0.92)[5.1.0,5.1.51)[5.5.0,5.5.6) |
Access Restriction Bypass | [5.5.0,5.5.46)[5.6.0,5.6.27) |
CVE-2015-2568 | [5.5.0,5.5.42)[5.6.0,5.6.23) |
Information Exposure | |
Denial of Service (DoS) | |
Directory Traversal | [,4.0.25)[4.1.0,4.1.13)[5.0.0,5.0.7) |
Information Exposure | |
Symlink Attack | [5.5.0,5.5.52)[5.6.0,5.6.33)[5.7.0,5.7.15) |
Improper Access Control | [5.5.0,5.5.57)[5.6.0,5.6.37)[5.7.0,5.7.19) |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.42)[5.6.0,5.6.23) |
Access Restriction Bypass | |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | [5.0.0,5.7.29)[8.0.0,8.0.20) |
Information Exposure | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Use of Externally-Controlled Format String | |
Arbitrary Code Execution | |
Out-of-bounds Write | [5.0.0,5.0.90)[5.1.0,5.1.43) |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.46)[5.6.0,5.6.27) |
Denial of Service (DoS) | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Arbitrary Command Injection | |
Denial of Service (DoS) | |
CVE-2016-0640 | [5.5.0,5.5.48)[5.6.0,5.6.29)[5.7.0,5.7.11) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.43)[5.7.0,5.7.25)[8.0.0,8.0.14) |
Denial of Service (DoS) | |
Information Exposure | [,5.1.69)[5.5.0,5.5.31)[5.6.0,5.6.11) |
Improper Access Control | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.23)[8.0.0,8.0.12) |
Improper Access Control | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Access Control | |
Information Exposure | |
Access Restriction Bypass | [5.5.0,5.5.47)[5.6.0,5.6.28)[5.7.0,5.7.10) |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.44)[5.6.0,5.6.25) |
Denial of Service (DoS) | |
Race Condition | [5.5.0,5.5.53)[5.6.0,5.6.34)[5.7.0,5.7.16)[8.0.0,8.0.1) |
Denial of Service (DoS) | [5.6.0,5.6.38)[5.7.0,5.7.20) |
Information Exposure | [5.7.0,5.7.30)[8.0.0,8.0.20) |
Denial of Service (DoS) | [5.5.0,5.5.59)[5.6.0,5.6.39)[5.7.0,5.7.21) |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Access Restriction Bypass | |
CVE-2012-2750 | |
Access Restriction Bypass | [5.5.0,5.5.39)[5.6.0,5.6.20) |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.43)[5.6.0,5.6.24) |
Information Exposure | |
Information Exposure | |
Access Restriction Bypass | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.30)[8.0.0,8.0.20) |
Access Restriction Bypass | [5.5.0,5.5.39)[5.6.0,5.6.20) |
Access Restriction Bypass | [5.5.0,5.5.47)[5.6.0,5.6.28)[5.7.0,5.7.10) |
Denial of Service (DoS) | [5.6.0,5.6.43)[5.7.0,5.7.25)[8.0.0,8.0.14) |
Access Restriction Bypass | [5.5.0,5.5.47)[5.6.0,5.6.28)[5.7.0,5.7.10) |
Access Restriction Bypass | |
SQL Injection | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2016-5441 | |
Denial of Service (DoS) | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.22) |
Information Exposure | [5.5.0,5.5.54)[5.6.0,5.6.35)[5.7.0,5.7.17) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Directory Traversal | |
Access Restriction Bypass | [5.5.0,5.5.46)[5.6.0,5.6.27) |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.52)[5.6.0,5.6.33)[5.7.0,5.7.15) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Access Control | [5.5.0,5.5.59)[5.6.0,5.6.39)[5.7.0,5.7.20) |
Denial of Service (DoS) | [5.6.0,5.6.49][5.7.0,7.1.29)[8.0.0,8.0.21) |
Information Exposure | |
CVE-2014-6496 | [5.5.0,5.5.40)[5.6.0,5.6.21) |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.30)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Improper Access Control | [5.5.0,5.5.57)[5.6.0,5.6.37)[5.7.0,5.7.19) |
CVE-2006-4031 | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.47)[5.6.0,5.6.28)[5.7.0,5.7.10) |
CVE-2016-5630 | [5.6.0,5.6.32)[5.7.0,5.7.14) |
Access Restriction Bypass | |
Improper Access Control | [5.5.0,5.5.55)[5.6.0,5.6.36)[5.7.0,5.7.18) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.43)[5.6.0,5.6.24) |
Denial of Service (DoS) | |
CVE-2016-5628 | |
Access Restriction Bypass | [,5.0.51)[5.1.0,5.1.23)[6.0.0,6.0.4) |
CVE-2016-5631 | |
Information Exposure | |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
CVE-2014-6494 | [5.5.0,5.5.40)[5.6.0,5.6.21) |
Denial of Service (DoS) | |
Improper Access Control | [5.6.0,5.6.36)[5.7.0,5.7.18) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | [,5.1.72][5.1.72,5.5.34][5.5.34,5.6.15) |
Improper Access Control | |
Improper Access Control | [5.5.0,5.5.55)[5.6.0,5.6.36)[5.7.0,5.7.18) |
Access Restriction Bypass | [,5.1.68][5.1.68,5.5.30][5.5.30,5.6.11) |
Access Restriction Bypass | |
Improper Access Control | [5.5.0,5.5.55)[5.6.0,5.6.36)[5.7.0,5.7.18) |
Denial of Service (DoS) | |
Improper Access Control | [5.5.0,5.5.55)[5.6.0,5.6.36)[5.7.0,5.7.18) |
Improper Access Control | |
Improper Access Control | |
Arbitrary Code Execution | |
Improper Access Control | [,5.5.60][5.5.60,5.6.40][5.6.40,5.7.23) |
Arbitrary Code Execution | |
Access Restriction Bypass | [5.5.0,5.5.50)[5.6.0,5.6.31)[5.7.0,5.7.13) |
Improper Access Control | [5.5.0,5.5.62)[5.6.0,5.6.42)[5.7.0,5.7.24)[8.0.0,8.0.13) |
Information Exposure | |
Access Restriction Bypass | [5.5.0,5.5.46)[5.6.0,5.6.27) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2016-5629 | [5.5.0,5.5.52)[5.6.0,5.6.33)[5.7.0,5.7.15) |
Access Restriction Bypass | |
CVE-2016-0646 | [5.5.0,5.5.48)[5.6.0,5.6.29)[5.7.0,5.7.11) |
Improper Access Control | [5.6.0,5.6.43)[5.7.0,5.7.25)[8.0.0,8.0.14) |
Denial of Service (DoS) | [5.6.0,5.6.43)[5.7.0,5.7.25)[8.0.0,8.0.14) |
CVE-2016-3459 | [5.6.0,5.6.31)[5.7.0,5.7.13) |
Denial of Service (DoS) | |
Security Features | [5.5.0,5.5.49)[5.6.0,5.6.30)[5.7.0,5.7.12) |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.44)[5.7.0,5.7.26)[8.0.0,8.0.20) |
Information Exposure | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | [5.5.0,5.5.47)[5.6.0,5.6.28)[5.7.0,5.7.10) |
Access Restriction Bypass | |
Improper Access Control | |
Denial of Service (DoS) | [7.3.0,7.3.29)[7.4.0,7.4.28)[7.5.0,7.5.18)[7.6.0,7.6.14)[8.0.0,8.0.20) |
Resource Management Errors | |
Information Exposure | [5.5.0,5.5.48)[5.6.0,5.6.29)[5.7.0,5.7.11) |
Denial of Service (DoS) | [5.7.0,5.7.25)[8.0.0,8.0.14) |
Arbitrary Code Execution | |
Improper Access Control | [5.6.0,5.6.37)[5.7.0,5.7.19) |
Out-of-Bounds | |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
CVE-2016-0653 | |
Access Restriction Bypass | [5.1.0,5.1.69)[5.5.0,5.5.31)[5.6.0,5.6.11) |
Information Exposure | [5.6.0,5.6.30)[5.7.0,5.7.12) |
Access Restriction Bypass | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | [5.5.0,5.5.44)[5.6.0,5.6.24) |
Improper Access Control | [5.5.0,5.5.57)[5.6.0,5.6.37)[5.7.0,5.7.19) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.44)[5.7.0,5.7.26)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Information Exposure | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | [5.7.0,5.7.25)[8.0.0,8.0.14) |
Access Restriction Bypass | |
Improper Access Control | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.22) |
Denial of Service (DoS) | |
Use of Externally-Controlled Format String | [,5.0.66)[5.1.0,5.1.26)[6.0.0,6.0.6) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | |
Improper Access Control | [5.5.0,5.5.62)[5.6.0,5.6.42)[5.7.0,5.7.24)[8.0.0,8.0.13) |
Access Restriction Bypass | |
Access Restriction Bypass | [5.5.0,5.5.47)[5.6.0,5.6.28)[5.7.0,5.7.10) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
CVE-2002-1923 | |
Denial of Service (DoS) | [5.7.0,5.7.26)[8.0.0,8.0.20) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2016-0667 | |
Denial of Service (DoS) | |
Information Exposure | [5.5.0,5.5.39)[5.6.0,5.6.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.52)[5.6.0,5.6.33)[5.7.0,5.7.15) |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
Improper Input Validation | [,7.2.25][7.2.25,7.3.14][7.3.14,7.4.13) |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.41)[5.7.0,5.7.22) |
Improper Authentication | |
Denial of Service (DoS) | |
Information Exposure | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.22) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2016-0654 | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.52)[5.6.0,5.6.33)[5.7.0,5.7.15) |
Denial of Service (DoS) | [5.5.0,5.5.54)[5.6.0,5.6.35)[5.7.0,5.7.17) |
Access Restriction Bypass | |
Information Exposure | |
CVE-2016-5442 | |
Access Restriction Bypass | |
Information Exposure | [5.5.0,5.5.39)[5.6.0,5.6.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Directory Traversal | |
Information Exposure | |
Information Exposure | [5.5.0,5.5.53)[5.6.0,5.6.34)[5.7.0,5.7.16) |
Information Exposure | [5.6.0,5.6.48)[5.7.0,5.7.29) |
Access Restriction Bypass | [5.5.0,5.5.46)[5.6.0,5.6.27) |
Denial of Service (DoS) | |
Information Exposure | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Access Restriction Bypass | |
CVE-2016-0644 | [5.5.0,5.5.48)[5.6.0,5.6.29)[5.7.0,5.7.11) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | [5.6.0,5.6.48)[5.7.0,5.7.29) |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.23) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2015-0381 | [5.5.0,5.5.41)[5.6.0,5.6.22) |
Denial of Service (DoS) | |
Improper Access Control | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | |
Information Exposure | [5.5.0,5.5.41)[5.6.0,5.6.22) |
Access Restriction Bypass | |
Improper Access Control | [5.6.0,5.6.21)[5.7.0,5.7.5) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.42)[5.6.0,5.6.23) |
Access Restriction Bypass | |
CVE-2002-1374 | |
Access Restriction Bypass | [5.5.0,5.5.44)[5.6.0,5.6.25) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
CVE-2016-0642 | [5.5.0,5.5.49)[5.6.0,5.6.30)[5.7.0,5.7.12) |
Denial of Service (DoS) | [,4.1.18)[5.0.0,5.0.19)[5.1.0,5.1.6) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Deserialization of Untrusted Data | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | [5.5.0,5.5.46)[5.6.0,5.6.27) |
Access Restriction Bypass | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | [,4.1.24)[5.0.0,5.0.60)[5.1.0,5.1.24)[6.0.0,6.0.5) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | [5.6.0,5.6.35)[5.7.0,5.7.17) |
Improper Access Control | [5.6.0,5.6.39)(5.7.0,5.7.21) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
CVE-2016-3424 | |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | [5.5.0,5.5.44)[5.6.0,5.6.25) |
CVE-2016-5632 | |
Access Restriction Bypass | |
Access Restriction Bypass | [,5.1.69][5.1.69,5.5.31][5.5.31,5.6.12) |
Denial of Service (DoS) | [5.6.0,5.6.41)[5.7.0,5.7.22) |
Denial of Service (DoS) | [5.6.0,5.6.48][5.7.0,7.1.29)[8.0.0,) |
Improper Input Validation | [5.5.0,5.5.54)[5.6.0,5.6.35)[5.7.0,5.7.17) |
Access Restriction Bypass | |
Information Exposure | [,5.5.58)[5.6.0,5.6.38)[5.7.0,5.7.20) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.49][5.7.0,7.1.29)[8.0.0,) |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | |
Improper Access Control | |
Denial of Service (DoS) | |
CVE-2016-3495 | |
Information Exposure | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Access Restriction Bypass | [5.5.0,5.5.40)[5.6.0,5.6.21) |
Improper Access Control | [5.5.0,5.5.55)[5.6.0,5.6.36)[5.7.0,5.7.18) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.50][5.7.0,7.1.29)[8.0.0,) |
Denial of Service (DoS) | [5.6.0,5.6.43)[5.7.0,5.7.25)[8.0.0,8.0.14) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.44)[5.7.0,5.7.26)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.18) |
Access Restriction Bypass | |
Access Restriction Bypass | [5.6.0,5.6.31)[5.7.0,5.7.13) |
CVE-2011-2262 | |
Denial of Service (DoS) | [5.6.0,5.6.48][5.7.0,7.1.29)[8.0.0,) |
Improper Access Control | |
Information Exposure | |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
Denial of Service (DoS) | [5.6.0,5.6.43)[5.7.0,5.7.25)[8.0.0,8.0.14) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Improper Access Control | |
Improper Access Control | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Information Exposure | |
CVE-2016-0662 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.6.0,5.6.31)[5.7.0,5.7.13) |
Information Exposure | |
Improper Access Control | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Denial of Service (DoS) | [5.6.0,5.6.43)[5.7.0,5.7.25)[8.0.0,8.0.14) |
Information Exposure | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Improper Input Validation | |
Access Restriction Bypass | [,3.23.59)[4.0.0,4.0.19)[4.1.0,4.1.2)[5.0.0,5.0.1) |
CVE-2016-0666 | [5.5.0,5.5.49)[5.6.0,5.6.30)[5.7.0,5.7.12) |
Improper Access Control | |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
CVE-2016-0663 | |
Access Restriction Bypass | |
Cryptographic Issues | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
CVE-2016-5633 | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
SQL Injection | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
CVE-2002-1921 | |
Improper Input Validation | [,7.2.19][7.2.19,7.3.8][7.3.8,7.4.6) |
Denial of Service (DoS) | [5.7.0,7.1.29)[8.0,8.0.20) |
Denial of Service (DoS) | [5.6.0,5.6.47)[5.7.0,5.7.29)[8.0.0,8.0.19) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.30)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
CVE-2016-0661 | [5.6.0,5.6.29)[5.7.0,5.7.11) |
Access Restriction Bypass | |
Denial of Service (DoS) | [5.5.0,5.5.59)[5.6.0,5.6.39)[5.7.0,5.7.21) |
CVE-2014-6495 | [5.5.0,5.5.39)[5.6.0,5.6.20) |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2014-2431 | |
Denial of Service (DoS) | [5.6.0,5.6.50][5.7.0,7.1.29)[8.0.0,) |
Resource Management Errors | |
Denial of Service (DoS) | |
Symlink Attack | |
Information Exposure | |
Improper Access Control | [5.6.0,5.6.41)[5.7.0,5.7.22) |
Denial of Service (DoS) | [5.6.0,5.6.49][5.7.0,7.1.29)[8.0.0,) |
Information Exposure | [5.6.0,5.6.48)[5.7.0,5.7.29)[8.0.0,8.0.20) |
Improper Access Control | |
Information Exposure | [5.5.0,5.5.50)[5.6.0,5.6.31)[5.7.0,5.7.13) |
Security Features | [5.5.0,5.5.54)[5.6.0,5.6.35)[5.7.0,5.7.17) |
Information Exposure | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2016-0656 | |
Improper Access Control | [5.7.0,5.7.24)[8.0.0,8.0.13) |
Denial of Service (DoS) | |
Information Exposure | [5.5.0,5.5.47)[5.6.0,5.6.28)[5.7.0,5.7.10) |
Denial of Service (DoS) | |
CVE-2016-0650 | [5.5.0,5.5.48)[5.6.0,5.6.29)[5.7.0,5.7.11) |
Denial of Service (DoS) | |
CVE-2016-0659 | |
Improper Access Control | [5.6.0,5.6.31)[5.7.0,5.7.13) |
Denial of Service (DoS) | [,5.0.92)[5.1.0,5.1.51)[5.5.0,5.5.6) |
Access Restriction Bypass | [5.5.0,5.5.39)[5.6.0,5.6.20) |
Improper Access Control | [5.5.0,5.5.57)[5.6.0,5.6.37) |
Access Restriction Bypass | [5.5.0,5.5.46)[5.6.0,5.6.27) |
Improper Input Validation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | [5.6.0,5.6.35)[5.7.0,5.7.17) |
Improper Access Control | |
Information Exposure | [5.5.0,5.5.40)[5.6.0,5.6.21) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | [,4.1.23)[5.0.0,5.0.42)[5.1.0,5.1.18) |
Denial of Service (DoS) | |
CVE-2013-0383 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.42)[5.6.0,5.6.23) |
Improper Access Control | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.22) |
Information Exposure | [5.6.0,5.6.48)[5.7.0,5.7.30)[8.0.0,8.0.20) |
Improper Access Control | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Access Control | [5.5.0,5.5.55)[5.6.0,5.6.36)[5.7.0,5.7.18) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | |
Denial of Service (DoS) | [5.6.0,5.6.41)[5.7.0,5.7.22) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Symlink Attack | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.5.0,5.5.54)[5.6.0,5.6.35)[5.7.0,5.7.17) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Access Control | [5.5.0,5.5.55)[5.6.0,5.6.36)[5.7.0,5.7.18) |
CVE-2016-5507 | [5.6.0,5.6.33)[5.7.0,5.7.15) |
Denial of Service (DoS) | [,5.0.92)[5.1.0,5.1.51)[5.5.0,5.5.6) |
Denial of Service (DoS) | |
Improper Access Control | [5.5.0,5.5.61)[5.6.0,5.6.41)[5.7.0,5.7.22) |
Improper Access Control | [5.7.0,5.7.23)[8.0.0,8.0.12) |
Denial of Service (DoS) | |
CVE-2014-6478 | [5.5.0,5.5.39)[5.6.0,5.6.20) |
Improper Access Control | [5.6.0,5.6.42)[5.7.0,5.7.24)[8.0.0,8.0.13) |
Access Restriction Bypass | |
Improper Access Control | [5.5.0,5.5.55)[5.6.0,5.6.36)[5.7.0,5.7.18) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Access Control | [5.6.0,5.6.37)[5.7.0,5.7.19) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.30)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Information Exposure | [5.5.0,5.5.40)[5.6.0,5.6.21) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | [5.6.0,5.6.48)[5.7.0,5.7.29) |
Improper Access Control | |
Information Exposure | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Denial of Service (DoS) | [5.7.0,5.7.25)[8.0.0,8.0.14) |
Information Exposure | [5.6.0,5.6.43)[5.7.0,5.7.25)[8.0.0,8.0.14) |
Access Restriction Bypass | |
Improper Access Control | |
Denial of Service (DoS) | |
Insufficiently Protected Credentials | [,5.2.14)[5.3.0,5.3.12)[5.5.0,5.5.29) |
Access Restriction Bypass | [5.6.0,5.6.48)[5.7.0,5.7.19) |
CVE-2016-5436 | |
Access Restriction Bypass | |
Arbitrary Code Execution | [,4.0.25)[4.1.0,4.1.13)[5.0.0,5.0.7) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.48)[5.7.0,5.7.30)[8.0.0,8.0.20) |
Access Restriction Bypass | [,5.1.70][5.1.70,5.5.32][5.5.32,5.6.13) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | [5.5.0,5.5.44)[5.6.0,5.6.25) |
Improper Access Control | [5.7.0,5.7.23)[8.0.0,8.0.12) |
Access Restriction Bypass | [,5.1.68][5.1.68,5.5.30][5.5.30,5.6.11) |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | [5.7.0,5.7.29)[8.0.0,8.0.20) |
Access Restriction Bypass | |
CVE-2016-8287 | |
Improper Access Control | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Information Exposure | [5.5.0,5.5.54)[5.6.0,5.6.35)[5.7.0,5.7.17) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | [5.5.0,5.5.62)[5.6.0,5.6.42)[5.7.0,5.7.24)[8.0.0,8.0.13) |
Information Exposure | [5.6.0,5.6.48)[5.7.0,5.7.30)[8.0.0,8.0.20) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Divide By Zero | |
Improper Initialization | |
Out-of-bounds Write | |
Use After Free | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [5.6.0,5.6.31)[5.7.0,5.7.13) |
NULL Pointer Dereference | |
Cryptographic Issues | [,5.6.43)[5.7.0,5.7.25)[8.0.0,8.0.14) |
Denial of Service (DoS) | [5.6.0,5.6.30)[5.7.0,5.7.12) |
NULL Pointer Dereference | [,4.0.12][4.0.12,5.6.48][5.7.0,7.1.29)[8.0.0,4.0.12)[8.0.20,) |