Improper Input Validation | |
Improper Handling of Missing Values | |
Improper Validation of Consistency within Input | |
Improper Input Validation | |
Improper Input Validation | |
Heap-based Buffer Overflow | |
Information Exposure | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Authentication | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Information Exposure | |
Cryptographic Issues | |
Improper Authentication | |
Double Free | |
Memory Leak | [,1.4.0.24)[1.4.0.4,1.4.1.4) |
Resource Management Errors | |
Out-of-Bounds | [1.3.6.1,1.3.6.13)[1.3.7.1,1.3.7.9)[1.4.0.0,1.4.0.5) |
Out-of-bounds Read | |
Information Exposure | |
Insufficiently Protected Credentials | |
Out-of-bounds Read | |
Improper Input Validation | |
Access Restriction Bypass | [,1.2.11.20)[1.3.0.0,1.3.0.5) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Improper Access Control | |
Improper Input Validation | [,1.3.7.10][1.3.8.0,1.3.8.8][1.4.0.0,) |
Improper Input Validation | |
Information Exposure | [,1.3.2.27)[1.3.3.0,1.3.3.9) |
NULL Pointer Dereference | [1.3.5.0,1.3.5.17)[1.3.6.0,1.3.6.10) |
Resource Management Errors | |
Improper Input Validation | |
Resource Management Errors | |
Resource Management Errors | |
Security Features | |
Improper Input Validation | [1.3.6.0,1.3.6.15)[1.4.0.0,1.4.0.9) |
Access Restriction Bypass | |
Improper Authentication | |
Information Exposure | |
Cryptographic Issues | |
Information Exposure | [,1.3.8.5)[1.4.0.0,1.4.0.12) |
Race Condition | |
Information Exposure | [,1.4.3.19)[1.4.4.0,1.4.4.13)[2.0.0,2.0.3) |