Information Exposure | |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
Improper Verification of Cryptographic Signature | |
Observable Discrepancy | |
Information Exposure Through Discrepancy | |
Observable Timing Discrepancy | |
Double Free | |
NULL Pointer Dereference | |
Use of a Risky Cryptographic Algorithm | |
Improper Input Validation | |
Out-of-Bounds | |
Cryptographic Issues | |
Denial of Service (DoS) | |
Cryptographic Issues | |
Cryptographic Issues | |
Cryptographic Issues | |
Insufficiently Protected Credentials | |
Use of a Risky Cryptographic Algorithm | |
Use After Free | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Cryptographic Issues | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Cryptographic Issues | [,3.1.28)[3.2.0,3.2.20)[3.3.0,3.3.10) |
Out-of-bounds Write | |
Out-of-Bounds | |
Cryptographic Issues | |
Denial of Service (DoS) | |
Insufficiently Protected Credentials | |
Code | |
Out-of-Bounds | |
Access Restriction Bypass | |
Cryptographic Issues | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
User Enumeration | |
Use of a Risky Cryptographic Algorithm | |
Improper Authentication | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Cryptographic Issues | |
Resource Management Errors | |
Double Free | |
Double Free | |
Cryptographic Issues | [,2.12.23)[3.0.0,3.0.28)[3.1.0,3.1.7) |
Use After Free | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Improper Input Validation | |
Access of Uninitialized Pointer | |
Denial of Service (DoS) | |
Improper Certificate Validation | |
Use of a Risky Cryptographic Algorithm | |
Use of a Risky Cryptographic Algorithm | |
User Enumeration | |
Access Restriction Bypass | |
CVE-2006-4790 | |
Buffer Overflow | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Cryptographic Issues | |
Cryptographic Issues | |