Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Use of GET Request Method With Sensitive Query Strings | |
Memory Allocation with Excessive Size Value | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Control Bypass | |
Denial of Service (DoS) | |
Improper Input Validation | |
Improper Input Validation | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Arbitrary Command Injection | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Cryptographic Issues | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Insecure Encryption | |
Incorrect Authorization | |
Denial of Service (DoS) | [0.14.0,0.14.3)[0.15.0,0.15.2)[0.16.0,0.16.3) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Buffer Overflow | |
Cryptographic Issues | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Access Control | |
Resource Management Errors | |
Resource Management Errors | |
Denial of Service (DoS) | |
Information Exposure | |
Resource Management Errors | |
Denial of Service (DoS) | |
Resource Management Errors | |
Information Exposure | |
Denial of Service (DoS) | |