Authentication Bypass by Spoofing | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | |
Improper Authentication | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Improper Authentication | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Insufficient Verification of Data Authenticity | |
Out-of-Bounds | |
Resource Management Errors | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Insufficiently Protected Credentials | |
Improper Certificate Validation | |
Out-of-bounds Read | |
SQL Injection | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Improper Authentication | |
Out-of-bounds Write | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | [2.0,2.2.10)[3.0.0,3.0.15) |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Symlink Attack | |
User Enumeration | |
Out-of-Bounds | |