Out-of-bounds Write | [2.6.26,4.19.324)[5.4,5.4.286)[5.10,5.10.230)[5.15,5.15.172)[6.1,6.1.117)[6.6,6.6.61)[6.11,6.11.8)[6.12,6.12.1) |
Improper Control of Speculative Execution with Observable Side Effects | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Race Condition | |
Denial of Service (DoS) | |
Improper Check for Unusual or Exceptional Conditions | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Race Condition | |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
NULL Pointer Dereference | |
Improper Privilege Management | |
Improper Input Validation | |
Improper Input Validation | |
Resource Exhaustion | [5.2,5.4.119)[5.10,5.10.37)[5.11,5.11.21)[5.12,5.12.4) |
Out-of-bounds Write | [4.14.113,4.14.233)[4.19.19,4.19.190)[5.0,5.4.117)[5.10,5.10.35)[5.11,5.11.19)[5.12,5.12.2) |
Memory Leak | [4.5,4.9.269)[4.14,4.14.233)[4.19,4.19.191)[5.4,5.4.118)[5.10,5.10.36)[5.11,5.11.20)[5.12,5.12.3) |
Resource Exhaustion | [5.10,5.10.37)[5.11,5.11.21)[5.12,5.12.4) |
Resource Exhaustion | [4.20,5.4.118)[5.10,5.10.36)[5.11,5.11.20)[5.12,5.12.3) |
Out-of-bounds Write | [5.10,5.10.36)[5.11,5.11.20)[5.12,5.12.3) |
Resource Exhaustion | [5.11.0,5.11.20)[5.12.0,5.12.3) |
Allocation of Resources Without Limits or Throttling | [5.1,5.4.119)[5.10.0,5.10.37)[5.11.0,5.11.21)[5.12.0,5.12.4) |
Out-of-bounds Write | [5.8,5.10.36)[5.11.0,5.11.20)[5.12.0,5.12.3) |
Out-of-bounds Write | |
Resource Exhaustion | [5.10,5.10.37)[5.11.0,5.11.21)[5.12.0,5.12.4) |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
Use After Free | |
Use After Free | |
Buffer Overflow | |
Integer Overflow or Wraparound | |
Resource Exhaustion | |
Resource Exhaustion | |
Buffer Overflow | |
Out-of-bounds Read | |
Use After Free | |
Improper Control of a Resource Through its Lifetime | |
Information Exposure | |
Incorrect Permission Assignment for Critical Resource | |
Improper Input Validation | |
Improper Restriction of Operations within the Bounds of a Memory Buffer | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Lock Order Reversal | |
Improper Restriction of Operations within the Bounds of a Memory Buffer | |
Resource Exhaustion | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Read | |
Deadlock | |
Improper Restriction of Operations within the Bounds of a Memory Buffer | |
Improper Input Validation | |
Out-of-bounds Write | |
Resource Exhaustion | |
Race Condition | |
Improper Input Validation | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Race Condition | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Resource Exhaustion | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Race Condition | |
Use After Free | |
Race Condition | |
Out-of-bounds Read | |
Buffer Overflow | |
Use After Free | |
Improper Null Termination | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Double Free | |
Denial of Service (DoS) | |
Stack-based Buffer Overflow | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Control of a Resource Through its Lifetime | |
Use After Free | |
Observable Timing Discrepancy | |
Use After Free | |
Use After Free | |
Race Condition | |
Race Condition | |
Use After Free | |
Information Exposure | |
Improper Check or Handling of Exceptional Conditions | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Race Condition | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Allocation of Resources Without Limits or Throttling | |
Off-by-one Error | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Integer Underflow | |
Use After Free | |
NULL Pointer Dereference | |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
Transmission of Private Resources into a New Sphere ('Resource Leak') | |
Out-of-bounds Read | |
Use After Free | |
Double Free | |
Exposure of Sensitive Information to an Unauthorized Actor | |
Out-of-bounds Write | |
Race Condition | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Race Condition | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Insufficient Encryption Strength | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Information Exposure | |
Insufficient Granularity of Access Control | |
NULL Pointer Dereference | |
Out-of-Bounds Read | |
Out-of-bounds Read | |
Use of Out-of-range Pointer Offset | |
NULL Pointer Dereference | |
Buffer Overflow | |
Out-of-bounds Read | |
Uncontrolled Resource Consumption | |
Use After Free | |
Use After Free | |
Race Condition | |
Out-of-bounds Read | |
Improper Check or Handling of Exceptional Conditions | |
Use After Free | |
Use After Free | |
Out-of-Bounds Write | |
NULL Pointer Dereference | |
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Buffer Overflow | |
Improper Input Validation | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Improper Ownership Management | |
Release of Invalid Pointer or Reference | |
Out-of-Bounds | |
Buffer Overflow | |
Use After Free | |
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Use of Out-of-range Pointer Offset | |
Integer Overflow or Wraparound | |
Information Exposure | |
Race Condition | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Access Restriction Bypass | |
Use After Free | |
Stack-based Buffer Overflow | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Information Exposure | |
Out-of-Bounds | |
Privilege Escalation | |
Race Condition | |
NULL Pointer Dereference | |
Information Exposure | |
Information Exposure | |
NULL Pointer Dereference | |
Race Condition | |
Denial of Service (DoS) | |
Improper Resource Locking | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Off-by-one Error | |
Out-of-bounds Read | |
Deadlock | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Denial of Service (DoS) | |
Privilege Escalation | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Incorrect Bitwise Shift of Integer | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Privilege Escalation | |
Race Condition | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Execution with Unnecessary Privileges | |
Use After Free | |
Use After Free | |
Reachable Assertion | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Division by zero | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Update of Reference Count | |
Improper Resource Locking | |
Race Condition | |
Time-of-check Time-of-use (TOCTOU) Race Condition | |
Out-of-Bounds | |
Use After Free | |
Improper Validation of Array Index | |
Use After Free | |
Missing Release of Memory after Effective Lifetime | |
Denial of Service (DoS) | |
Incorrect Authorization | |
Information Exposure | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Double Free | |
Information Exposure | |
Missing Release of Memory after Effective Lifetime | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Use After Free | |
Denial of Service (DoS) | |
Buffer Overflow | |
Improper Initialization | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Excessive Platform Resource Consumption within a Loop | |
Race Condition | |
Use After Free | |
Buffer Overflow | |
Improper Cleanup on Thrown Exception | |
Use After Free | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Information Exposure | |
Denial of Service (DoS) | |
Integer Underflow (Wrap or Wraparound) | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Denial of Service (DoS) | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Buffer Overflow | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Heap-based Buffer Overflow | |
Uninitialized Memory Exposure | |
Use After Free | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Unchecked Return Value | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Denial of Service (DoS) | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Improper Locking | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Buffer Overflow | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Use After Free | |
User After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Race Condition | |
Race Condition | |
Race Condition | |
Use After Free | |
Use After Free | |
Information Exposure | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Buffer Overflow | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-bounds Read | |
Race Condition | |
Buffer Overflow | |
Out-of-bounds Write | |
Race Condition | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Use After Free | |
Improper Access Control | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Improper Access Control | |
Incomplete Cleanup | |
NULL Pointer Dereference | |
Uncontrolled Resource Consumption | |
Race Condition | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Exposure of Sensitive Information Through Data Queries | |
Incorrect Calculation of Buffer Size | |
Use After Free | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Race Condition | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Resource Shutdown or Release | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
Information Exposure | |
Use After Free | |
Heap-based Buffer Overflow | |
Improper Validation of Integrity Check Value | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Write | |
Arbitrary Code Execution | |
Race Condition | |
Improper Preservation of Permissions | |
Out-of-bounds Write | |
Use After Free | |
Buffer Overflow | |
Double Free | |
Double Free | |
Use After Free | |
Information Exposure | |
Improper Restriction of Operations within the Bounds of a Memory Buffer | |
Race Condition | |
Use After Free | |
Information Exposure | |
Use After Free | |
Information Exposure | |
Incomplete Cleanup | |
NULL Pointer Dereference | |
Use After Free | |
Information Exposure | |
Use After Free | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Privilege Escalation | |
Buffer Overflow | |
Race Condition | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Race Condition | |
Out-of-Bounds | |
Heap-based Buffer Overflow | |
Race Condition | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Use of Insufficiently Random Values | |
Denial of Service (DoS) | |
Information Exposure | |
Incomplete Cleanup | |
Integer Overflow or Wraparound | |
Information Exposure | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
Race Condition | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Use After Free | |
Improper Access Control | |
Use After Free | |
Information Exposure | |
Access Restriction Bypass | |
Use of Uninitialized Variable | |
Use After Free | |
Privilege Escalation | |
Information Exposure | |
Double Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Double Free | |
Double Free | |
Double Free | |
Information Exposure | |
Buffer Overflow | |
Denial of Service (DoS) | |
Buffer Overflow | |
Improper Input Validation | |
Session Fixation | |
Out-of-bounds Write | |
Information Exposure | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Double Free | |
Integer Underflow | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Missing Initialization of Resource | |
Buffer Overflow | |
Missing Initialization of Resource | |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Data Handling | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Privilege Escalation | |
Access Restriction Bypass | |
Information Exposure | |
CVE-2005-0750 | |
Race Condition | |
Security Features | |
Information Exposure | |
Race Condition | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Integer Underflow | |
Code | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Out-of-Bounds | |
Race Condition | |
Information Exposure | |
Resource Management Errors | |
Race Condition | [,2.6.27.24)[2.6.29.0,2.6.29.4)[2.6.0,2.6.30) |
Out-of-Bounds | |
NULL Pointer Dereference | |
Use After Free | |
Authentication Bypass | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Race Condition | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Resource Management Errors | |
Timing Attack | |
Access Restriction Bypass | |
Race Condition | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Improper Input Validation | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Read | |
Improper Input Validation | |
NULL Pointer Dereference | |
Privilege Escalation | |
Security Features | |
Improper Input Validation | |
Access Restriction Bypass | |
Incorrect Authorization | |
Information Exposure | [2.4.0,2.4.35.3)[2.6.0,2.6.24) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Double Free | |
Use After Free | |
Information Exposure | |
CVE-2007-1497 | |
CVE-2009-0834 | |
Improper Input Validation | |
Access Restriction Bypass | |
Resource Management Errors | |
Resource Management Errors | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Cryptographic Issues | |
Denial of Service (DoS) | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Improper Initialization | |
Out-of-Bounds | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Cryptographic Issues | |
Information Exposure | |
Error Handling | |
NULL Pointer Dereference | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Denial of Service (DoS) | |
Buffer Overflow | |
Information Exposure | |
CVE-2005-0839 | |
Out-of-bounds Write | |
Information Exposure | |
Out-of-bounds Read | |
Access Restriction Bypass | |
Privilege Escalation | |
Integer Overflow or Wraparound | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Information Exposure | |
Access Restriction Bypass | |
Information Exposure | |
Information Exposure | |
Out-of-bounds Read | |
Use of Uninitialized Resource | |
Resource Management Errors | |
Use After Free | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Double Free | |
Improper Input Validation | |
Improper Access Control | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-bounds Read | |
Access Restriction Bypass | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Resource Management Errors | |
Use After Free | |
Use After Free | |
Authentication Bypass | |
Use After Free | |
Improper Access Control | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Information Exposure | |
Use After Free | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Memory Leak | |
Incorrect Calculation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Use After Free | |
Memory Leak | |
Missing Initialization of Resource | |
Denial of Service (DoS) | |
Resource Management Errors | |
Race Condition | |
Out-of-Bounds | |
Buffer Overflow | |
Information Exposure | |
Improper Input Validation | |
Missing Initialization of Resource | |
Use After Free | |
Error Handling | |
NULL Pointer Dereference | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
CVE-2021-29264 | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Resource Management Errors | |
Symlink Attack | |
Improper Input Validation | |
Improper Input Validation | |
Memory Leak | |
Improper Input Validation | |
Resource Management Errors | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Divide By Zero | |
Race Condition | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Improper Access Control | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Race Condition | |
Information Exposure | |
Resource Management Errors | |
Resource Management Errors | |
Access Restriction Bypass | |
Use After Free | |
Memory Leak | |
Access Restriction Bypass | |
Improper Input Validation | |
NULL Pointer Dereference | |
Buffer Overflow | |
Resource Management Errors | |
Information Exposure | |
Code | |
Improper Input Validation | |
Memory Leak | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Improper Access Control | |
Denial of Service (DoS) | |
Use After Free | |
Improper Data Handling | |
Resource Management Errors | |
Race Condition | |
Out-of-Bounds | |
Resource Management Errors | |
Race Condition | |
Improper Input Validation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2005-4351 | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Information Exposure | |
Denial of Service (DoS) | |
Race Condition | [3.0.0,3.19.8][4.0.0,5.0) |
Denial of Service (DoS) | |
Buffer Overflow | |
Denial of Service (DoS) | |
Race Condition | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Resource Management Errors | |
Denial of Service (DoS) | |
Memory Leak | |
Use After Free | |
Denial of Service (DoS) | |
Improper Input Validation | |
Information Exposure | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Buffer Overflow | |
Buffer Overflow | |
Out-of-Bounds | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Input Validation | |
CVE-2021-42252 | |
Resource Management Errors | |
NULL Pointer Dereference | |
Improper Input Validation | |
Race Condition | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
CVE-2001-1572 | |
Insecure Randomness | |
Information Exposure | |
Access Restriction Bypass | |
Use After Free | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
CVE-2009-4538 | |
Out-of-Bounds | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Out-of-Bounds | |
Buffer Overflow | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Race Condition | |
Improper Access Control | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Improper Action Name Cleanup | [3.2,4.9.135)[4.9.136,4.14.78)[4.14.79,4.18.16)[4.18.17,4.19) |
Memory Leak | |
Buffer Overflow | |
Race Condition | |
Resource Management Errors | |
Resource Management Errors | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Information Exposure | |
NULL Pointer Dereference | |
Resource Management Errors | [,2.6.25.19)[2.6.26.0,2.6.26.7)[2.6.27.0,2.6.27.3) |
CVE-2001-1391 | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Memory Leak | |
Resource Management Errors | |
Buffer Overflow | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Information Exposure | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Privilege Escalation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Access Control | |
Information Exposure | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Authentication | |
Out-of-Bounds | |
Information Exposure | |
Race Condition | |
Improper Input Validation | |
Error Handling | |
Denial of Service (DoS) | |
Race Condition | |
Improper Input Validation | |
Buffer Overflow | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-Bounds | |
Resource Management Errors | |
CVE-1999-0138 | |
Memory Leak | |
CVE-2004-0003 | |
CVE-2020-26541 | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
CVE-2000-0289 | |
Denial of Service (DoS) | |
Race Condition | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Off-by-one Error | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-bounds Write | |
Double Free | |
Improper Input Validation | |
Privilege Escalation | |
Buffer Overflow | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Information Exposure | |
Denial of Service (DoS) | |
Information Exposure | |
Race Condition | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | |
Resource Management Errors | |
Use After Free | [,4.14.91)[4.15.0,4.19.13) |
Denial of Service (DoS) | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
CVE-2008-0001 | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Unchecked Return Value | |
CVE-2021-26934 | |
Information Exposure | |
Use After Free | |
Use of Uninitialized Resource | |
Resource Management Errors | |
CVE-2001-1397 | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Race Condition | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Security Features | |
Resource Management Errors | |
Use After Free | |
CVE-2002-0429 | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Memory Leak | |
Code | |
Out-of-bounds Read | |
CVE-2001-1390 | |
Denial of Service (DoS) | |
Improper Input Validation | |
Access Restriction Bypass | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Security Features | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cryptographic Issues | |
Resource Management Errors | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
CVE-2001-1395 | |
Divide By Zero | |
Denial of Service (DoS) | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Improper Access Control | |
NULL Pointer Dereference | |
Information Exposure | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Resource Management Errors | |
Improper Initialization | |
Information Exposure | |
NULL Pointer Dereference | |
Improper Input Validation | |
Out-of-bounds Write | |
Race Condition | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Use After Free | |
User Enumeration | |
Improper Initialization | |
NULL Pointer Dereference | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Security Features | |
Access Restriction Bypass | |
Missing Initialization of Resource | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | |
Code | |
Cryptographic Issues | |
Resource Management Errors | |
Improper Input Validation | |
Privilege Escalation | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
Directory Traversal | |
Denial of Service (DoS) | |
Buffer Overflow | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Race Condition | |
Access Restriction Bypass | |
Out-of-Bounds | |
Improper Input Validation | |
Denial of Service (DoS) | |
Information Exposure | |
Memory Leak | |
Information Exposure | |
Use After Free | |
User Enumeration | |
Information Exposure | |
Memory Leak | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Resource Management Errors | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Read | |
Race Condition | |
Double Free | |
Access Restriction Bypass | |
Out-of-Bounds | |
CVE-2002-1573 | |
Out-of-Bounds | |
User Enumeration | |
Access Restriction Bypass | |
Race Condition | |
Improper Data Handling | |
NULL Pointer Dereference | |
Use After Free | [4.14,4.14.166)[4.19,4.19.97)[5.0,5.2.1) |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | |
Missing Initialization of Resource | |
Denial of Service (DoS) | [3.10.1,3.11)[4.18.1,4.19) |
Privilege Escalation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Buffer Overflow | |
Resource Management Errors | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Resource Management Errors | |
Access Restriction Bypass | |
Buffer Overflow | |
Resource Management Errors | [,2.6.27.19)[2.6.28.0,2.6.28.7) |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Improper Input Validation | |
Resource Management Errors | |
Information Exposure | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Access Control | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Out-of-Bounds | |
Improper Validation of Array Index | |
Information Exposure | |
CVE-2001-0317 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Access Restriction Bypass | |
Resource Management Errors | |
NULL Pointer Dereference | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Information Exposure | |
Denial of Service (DoS) | |
Security Bypass | |
Out-of-Bounds | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
CVE-2010-1088 | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Access Restriction Bypass | |
Race Condition | |
Race Condition | |
Denial of Service (DoS) | |
Improper Input Validation | |
Use After Free | |
Improper Access Control | |
Use After Free | |
Race Condition | |
Insecure Default | |
Denial of Service (DoS) | |
Improper Input Validation | |
CVE-2001-1399 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Access Restriction Bypass | |
Improper Verification of Cryptographic Signature | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Management Errors | |
Improper Input Validation | |
Incorrect Authorization | |
CVE-2004-0887 | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Information Exposure | |
Information Exposure | |
CVE-2004-0496 | |
Information Exposure | |
Use After Free | |
Access Restriction Bypass | |
Code | |
Missing Initialization of Resource | |
Out-of-bounds Read | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | [2.6.0,3.0.0)[3.10.0,3.11)[4.14.0,4.14.55) |
Denial of Service (DoS) | |
Privilege Escalation | |
Improper Access Control | |
Improper Input Validation | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
Out-of-bounds Write | |
CVE-2006-0096 | |
Denial of Service (DoS) | |
Use After Free | |
NULL Pointer Dereference | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | [,2.4.36.6)[2.6.25.0,2.6.25.5) |
Buffer Overflow | |
Out-of-Bounds | |
Out-of-bounds Write | |
Race Condition | [4.3,4.4.179)[4.9,4.9.169)[4.14,4.14.112)[4.19,4.19.35)[5.0,5.0.8) |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Integer Overflow or Wraparound | [,2.6.27.53)[2.6.32,2.6.32.21)[2.6.34,2.6.34.6)[2.6.35,2.6.35.4) |
Out-of-bounds Read | |
Out-of-bounds Read | |
Cryptographic Issues | |
NULL Pointer Dereference | |
Buffer Overflow | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Memory Leak | |
NULL Pointer Dereference | |
Memory Leak | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Input Validation | [,3.2.102)[3.3,4.1.51)[4.3,4.9.87)[4.10,4.14.25)[4.15,4.15.8) |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Information Exposure | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Information Exposure | |
Code | |
Information Exposure | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Memory Leak | |
Access Restriction Bypass | |
Use After Free | |
Resource Management Errors | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Information Exposure | |
Improper Input Validation | [,2.6.27.19)[2.6.28.0,2.6.28.7) |
NULL Pointer Dereference | |
CVE-2007-0958 | |
Out-of-Bounds | |
Improper Input Validation | |
User Enumeration | |
Resource Management Errors | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Buffer Overflow | |
Denial of Service (DoS) | |
Double Free | |
Buffer Overflow | |
Improper Input Validation | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Information Exposure | |
Memory Leak | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Race Condition | |
Out-of-Bounds | |
Access Restriction Bypass | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Race Condition | |
Information Exposure | |
Out-of-bounds Read | [5.10,5.10.37)[5.11,5.11.21)[5.12,5.12.4) |
Use After Free | |
Memory Leak | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Write | |
Memory Leak | |
Out-of-Bounds | |
Resource Management Errors | |
Access Restriction Bypass | |
Improper Initialization | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-Bounds | [4.1.0,4.1.49)[4.4.0,4.4.107)[4.9.0,4.9.71)[4.14.0,4.14.8) |
Information Exposure | |
Access Restriction Bypass | |
Resource Management Errors | |
CVE-2007-2480 | |
Improper Input Validation | |
Information Exposure | |
NULL Pointer Dereference | |
Out-of-bounds Write | [2.6.19,4.4.267)[4.5,4.9.267)[4.10,4.14.231)[4.15,4.19.188)[4.20,5.4.113)[5.5,5.10.31)[5.11,5.12) |
Race Condition | |
Improper Input Validation | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Remote Code Execution (RCE) | |
Information Exposure | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Privilege Escalation | [3.0.0,3.19.8][4.0.0,5.0) |
Improper Access Control | |
Denial of Service (DoS) | |
Information Exposure | |
Race Condition | |
Information Exposure | |
Denial of Service (DoS) | |
Information Exposure | |
Race Condition | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Information Exposure | |
Improper Input Validation | [2.4.0,2.4.35)[2.6.0,2.6.21) |
Information Exposure | |
Arbitrary Code Execution | |
Improper Input Validation | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Use After Free | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Buffer Overflow | |
Access Restriction Bypass | |
Information Exposure | |
Improper Input Validation | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
CVE-2007-3848 | |
Improper Validation of Array Index | [4.19,4.19.25)[4.20,4.20.12) |
Memory Leak | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Missing Initialization of Resource | |
Race Condition | |
Information Exposure | |
Race Condition | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Race Condition | |
Use After Free | |
Denial of Service (DoS) | |
Missing Initialization of Resource | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | |
Resource Management Errors | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Cryptographic Issues | |
Race Condition | |
Access of Uninitialized Pointer | |
Denial of Service (DoS) | |
Resource Management Errors | |
Information Exposure | |
Out-of-Bounds | |
Out-of-bounds Write | |
CVE-1999-1341 | [2.2.0,2.2.14)[2.3.0,2.3.18) |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Information Exposure | |
Divide By Zero | |
Denial of Service (DoS) | |
CVE-2006-3626 | |
Out-of-bounds Write | |
Information Exposure | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Access Restriction Bypass | |
Information Exposure | |
Race Condition | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Use After Free | |
Information Exposure | |
Improper Access Control | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Double Free | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Resource Management Errors | |
Out-of-Bounds | |
Race Condition | |
Information Exposure | |
Resource Management Errors | |
Denial of Service (DoS) | |
Improper Input Validation | |
Code | |
Access Restriction Bypass | |
Race Condition | |
CVE-2005-0204 | |
Out-of-Bounds | |
Out-of-bounds Write | |
Buffer Overflow | |
Race Condition | |
Resource Management Errors | |
Incorrect Calculation | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Resource Management Errors | |
Privilege Escalation | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Memory Leak | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Use After Free | |
Insecure Default | |
Access Restriction Bypass | |
Race Condition | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
CVE-2021-26930 | |
Information Exposure | |
CVE-2006-1052 | |
Improper Input Validation | |
Memory Leak | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Out-of-Bounds | [4.4,4.4.195)[4.9,4.9.197)[4.14,4.14.142)[4.19,4.19.70)[5.2,5.2.12) |
Access Restriction Bypass | |
Memory Leak | |
Information Exposure | |
Race Condition | |
Access Restriction Bypass | |
Race Condition | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Information Exposure | |
Resource Management Errors | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Use After Free | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | [,2.6.27.22)[2.6.28.0,2.6.28.10) |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Input Validation | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | [,2.4.37.6)[2.6.0,2.6.13) |
Information Exposure | |
Race Condition | |
Memory Leak | |
Information Exposure | |
Race Condition | |
Memory Leak | |
Access Restriction Bypass | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Race Condition | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Divide By Zero | |
Denial of Service (DoS) | [,2.6.27.13)[2.6.28,2.6.28.2) |
Resource Management Errors | |
NULL Pointer Dereference | |
Memory Leak | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Buffer Overflow | |
Denial of Service (DoS) | |
Unauthorized File Access | |
NULL Pointer Dereference | |
Race Condition | |
Access Restriction Bypass | |
Improper Access Control | |
Access Restriction Bypass | |
Information Exposure | |
Release of Invalid Pointer or Reference | |
Improper Input Validation | |
Race Condition | |
Out-of-bounds Read | |
Resource Management Errors | |
Cryptographic Issues | |
Denial of Service (DoS) | |
Information Exposure | |
Resource Management Errors | |
Information Exposure | |
Integer Overflow or Wraparound | |
CVE-2005-0937 | |
Cross-site Scripting (XSS) | |
Race Condition | |
Out-of-bounds Write | |
Resource Management Errors | |
Race Condition | |
Race Condition | |
Access Restriction Bypass | |
Use After Free | |
Error Handling | |
Buffer Overflow | |
Access Restriction Bypass | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Information Exposure | |
Use After Free | |
Use After Free | [4.18,4.19.18)[4.20,4.20.5) |
CVE-2006-1242 | |
Improper Access Control | |
Race Condition | |
Denial of Service (DoS) | |
Out-of-bounds Read | [,5.4.101)[5.5.0,5.10.19)[5.11,5.11.2) |
NULL Pointer Dereference | |
CVE-2002-0704 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2002-1976 | |
Access Restriction Bypass | |
Race Condition | |
Resource Management Errors | |
Privilege Escalation | |
Privilege Escalation | [3.0.0,3.19.8][4.0.0,5.0) |
Information Exposure | |
Memory Leak | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Race Condition | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Improper Input Validation | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Improper Input Validation | |
NULL Pointer Dereference | |
Out-of-bounds Write | [3.0.0,3.19.8][4.0.0,5.0) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Race Condition | |
Race Condition | |
NULL Pointer Dereference | |
Information Exposure | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Resource Management Errors | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Authentication | |
Resource Management Errors | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Code | |
Improper Access Control | |
Access Restriction Bypass | [,2.4.36.5)[2.6.25.0,2.6.25.3) |
Access Restriction Bypass | |
Use After Free | |
Out-of-Bounds | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Initialization | |
Out-of-bounds Read | [4.14,4.14.75)[4.15,4.15.18][4.16,4.16.18][4.17,4.17.9][4.18,4.18.13) |
Race Condition | |
Information Exposure | |
Remote Code Execution (RCE) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Use After Free | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | |
Resource Management Errors | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Access Restriction Bypass | |
Denial of Service (DoS) | [4.7,4.9.191)[4.14,4.14.141)[4.19,4.19.69)[5.2,5.2.11) |
Race Condition | |
Memory Leak | |
CVE-2013-0311 | |
Information Exposure | |
Denial of Service (DoS) | [2.4.0,2.4.33.1)[2.6.0,2.6.17.9) |
Denial of Service (DoS) | |
Use After Free | |
Denial of Service (DoS) | |
Improper Access Control | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Input Validation | |
Information Exposure | |
Improper Access Control | |
Buffer Overflow | |
CVE-2004-0997 | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Resource Management Errors | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Brute Force | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-1999-0401 | |
Use After Free | |
Race Condition | |
Denial of Service (DoS) | |
Race Condition | |
Resource Management Errors | |
Information Exposure | |
Arbitrary Code Execution | |
Use After Free | |
Incorrect Authorization | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-Bounds | |
Use After Free | |
Denial of Service (DoS) | |
Resource Management Errors | |
Memory Leak | |
NULL Pointer Dereference | |
CVE-2004-2135 | |
Access Restriction Bypass | |
Resource Management Errors | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Improper Input Validation | |
Use After Free | [,4.9.190)[4.14.0,4.14.139) |
Improper Input Validation | [,2.6.27.19)[2.6.28.0,2.6.28.7) |
Denial of Service (DoS) | |
CVE-2007-2453 | |
Information Exposure | |
Code | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
Resource Management Errors | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Security Features | |
Information Exposure | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Resource Management Errors | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Resource Management Errors | |
Memory Leak | |
NULL Pointer Dereference | |
Improper Input Validation | |
Access Restriction Bypass | |
Time of Check Time of Use (TOCTOU) | |
Use After Free | |
Buffer Overflow | |
Denial of Service (DoS) | |
Race Condition | |
Double Free | |
Use After Free | |
Out-of-Bounds | |
Access Restriction Bypass | |
CVE-2004-2136 | |
Use After Free | |
NULL Pointer Dereference | |
Privilege Escalation | |
Out-of-Bounds | |
CVE-2002-0510 | |
CVE-1999-1018 | |
Resource Management Errors | |
Out-of-bounds Write | |
Resource Management Errors | |
Improper Validation of Array Index | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Access Restriction Bypass | |
Information Exposure | |
Race Condition | |
Improper Access Control | |
Denial of Service (DoS) | |
Resource Management Errors | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
Out-of-Bounds | |
Access Restriction Bypass | |
CVE-2021-38198 | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Buffer Overflow | [2.6.34,3.16.74)[4.4,4.4.193)[4.9,4.9.193)[4.14,4.14.144)[4.19,4.19.73)[5.2,5.2.15) |
Insertion of Sensitive Information into Log File | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Privilege Escalation | [3.16,3.16.71)[4.4,4.4.185)[4.9,4.9.185)[4.10,4.14.133)[4.19,4.19.58)[5.1,5.1.17) |
Information Exposure | |
Integer Overflow or Wraparound | |
Race Condition | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | |
Denial of Service (DoS) | |
Race Condition | |
Resource Management Errors | |
Resource Management Errors | |
Information Exposure | |
Resource Management Errors | |
Information Exposure | |
Resource Management Errors | |
Out-of-Bounds | |
Information Exposure | |
Memory Leak | |
Resource Management Errors | |
Information Exposure | |
Denial of Service (DoS) | |
Information Exposure | |
Resource Management Errors | |
Denial of Service (DoS) | |
Use After Free | |
Access Restriction Bypass | |
Information Exposure | |
Security Features | |
Out-of-Bounds | |
Buffer Overflow | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
Use After Free | |
Access Restriction Bypass | |
Use After Free | |
Memory Leak | |
Resource Management Errors | |
Denial of Service (DoS) | |
CVE-2011-1019 | |
Access Restriction Bypass | |
Privilege Escalation | |
Out-of-bounds Read | |
Out-of-Bounds | |
Information Exposure | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Information Exposure | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Race Condition | |
Information Exposure | |
Out-of-bounds Write | |
Resource Management Errors | |
Arbitrary Code Execution | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-Bounds | |
Improper Input Validation | [,2.6.27.19)[2.6.28.0,2.6.28.7) |
CVE-2002-0499 | |
Incorrect Calculation | |
Out-of-bounds Write | |
Race Condition | |
Information Exposure | |
Information Exposure | |
Resource Management Errors | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Use After Free | |
Race Condition | |
Denial of Service (DoS) | |
Race Condition | [,4.4.133)[4.5,4.9.103)[4.10,4.14.44)[4.15,4.16.12) |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Memory Leak | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Off-by-one Error | |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Handling of Exceptional Conditions | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Incorrect Type Conversion or Cast | |
NULL Pointer Dereference | |
Resource Management Errors | |
Race Condition | |
Information Exposure | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Integer Underflow | |
Race Condition | |
Information Exposure | |
Information Exposure | |
Privilege Escalation | |
Information Exposure | |
Information Exposure | |
NULL Pointer Dereference | |
Information Exposure | |
Memory Leak | |
Out-of-Bounds | |
Improper Input Validation | |
Resource Management Errors | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Symlink Attack | |
Security Features | |
Out-of-Bounds | |
Access Restriction Bypass | |
Information Exposure | |
Denial of Service (DoS) | |
Information Exposure | |
Use After Free | |
Information Exposure | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
CVE-2006-2071 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Input Validation | |
Access Restriction Bypass | |
Buffer Overflow | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-Bounds | |
Memory Leak | |
Out-of-bounds Write | |
Race Condition | |
Information Exposure | |
Race Condition | |
Access Restriction Bypass | |
Resource Management Errors | [2.4.0,2.4.36.5)[2.6.0,2.6.25.3) |
Out-of-bounds Write | |
Out-of-bounds Write | |
Information Exposure | |
Access Restriction Bypass | |
Improper Access Control | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Resource Management Errors | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Improper Access Control | |
Information Exposure | |
Buffer Overflow | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | |
CVE-2017-5669 | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Race Condition | |
Access Restriction Bypass | |
Directory Traversal | |
Denial of Service (DoS) | |
Buffer Overflow | |
Insecure Default | |
Race Condition | |
Information Exposure | |
Use After Free | |
Memory Leak | |
Use After Free | |
Access Restriction Bypass | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Access Restriction Bypass | |
Resource Management Errors | |
Use After Free | |
Access Restriction Bypass | |
Access Restriction Bypass | |
NULL Pointer Dereference | [2.6.12.1,4.14.130)[4.19,4.19.56)[5.1,5.1.15) |
Use After Free | |
Denial of Service (DoS) | [4.4,4.4.182)[4.9,4.9.182)[4.14,4.14.127)[4.19,4.19.52)[5.1,5.1.11) |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2020-29534 | [5.1,5.8.18)[5.9.0,5.9.3) |
Race Condition | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Use of Uninitialized Resource | |
Information Exposure | |
Use After Free | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | [,4.4.182)[4.5,4.9.182)[4.10,4.14.127)[4.15,4.19.52)[4.20,5.1.11) |
Improper Handling of Exceptional Conditions | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Improper Access Control | |
Information Exposure | |
Information Exposure | |
Out-of-Bounds | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Resource Management Errors | |
Information Exposure | |
Improper Input Validation | |
NULL Pointer Dereference | |
CVE-2001-1396 | |
Information Exposure | |
Resource Management Errors | |
Out-of-Bounds | |
Race Condition | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Improper Input Validation | [5.4,5.4.72)[5.8.0,5.8.16)[5.9.0,5.9.14) |
Improper Access Control | |
Buffer Overflow | |
NULL Pointer Dereference | |
Cryptographic Issues | |
Access Restriction Bypass | |
Race Condition | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Access Control | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Insecure Default | |
Race Condition | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Buffer Overflow | |
Improper Initialization | |
Code | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Resource Management Errors | |
Insecure Default | |
Race Condition | |
Denial of Service (DoS) | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Improper Input Validation | |
Privilege Escalation | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Race Condition | |
Denial of Service (DoS) | |
Memory Leak | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Access Restriction Bypass | |
CVE-2010-4648 | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
Buffer Overflow | |
Information Exposure | [4.4.0,4.4.114)[4.9.0,4.9.79)[4.14.0,4.14.8) |
Out-of-Bounds | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | |
Improper Initialization | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Cryptographic Issues | |
Denial of Service (DoS) | |
Out-of-bounds Write | [3.0.0,3.19.8][4.0.0,5.0) |
Information Exposure | |
Memory Leak | |
Race Condition | [4.4.0,4.4.221)[4.9.0,4.9.221)[4.14,4.14.178)[4.19,4.19.119)[5.0,5.3) |
Information Exposure | |
Out-of-Bounds | |
Race Condition | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Information Exposure | |
Improper Access Control | |
Information Exposure | |
Out-of-bounds Write | |
Integer Underflow | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Use After Free | [4.19,4.19.38)[5.0,5.0.5) |
Resource Management Errors | |
Use After Free | |
Memory Leak | |
Out-of-Bounds | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
NULL Pointer Dereference | [4.9,4.9.162)[4.14,4.14.105)[4.19,4.19.27)[4.20,4.20.14) |
Resources Downloaded over Insecure Protocol | |
Access Restriction Bypass | |
Improper Input Validation | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-Bounds | |
Memory Leak | |
Resource Management Errors | |
Information Exposure | |
Incorrect Authorization | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Authentication Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Information Exposure | |
Memory Leak | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Improper Input Validation | |
Resource Management Errors | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
CVE-2004-0949 | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Information Exposure | |
Denial of Service (DoS) | |
Resource Management Errors | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Improper Input Validation | |
Race Condition | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Race Condition | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Insecure Encryption | |
Denial of Service (DoS) | |
Divide By Zero | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-Bounds | |
Resource Management Errors | |
Race Condition | |
Access Restriction Bypass | |
Resource Management Errors | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Race Condition | |
Access Restriction Bypass | |
Out-of-Bounds | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Information Exposure | |
CVE-2001-1398 | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Management Errors | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Out-of-bounds Write | [5.7,5.10.37)[5.11,5.11.21)[5.12,5.12.4) |
NULL Pointer Dereference | |
Information Exposure | |
Out-of-Bounds | |
Resource Management Errors | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Insecure Encryption | |
Integer Overflow or Wraparound | |
CVE-2006-1523 | |
Resource Management Errors | |
Information Exposure | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | |
Race Condition | |
Denial of Service (DoS) | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-Bounds | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Buffer Overflow | |
Divide By Zero | |
Information Exposure | |
Denial of Service (DoS) | |
Resource Management Errors | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Code | |
Use After Free | |
Divide By Zero | |
CVE-2014-8134 | |
NULL Pointer Dereference | |
Information Exposure | |
Memory Leak | |
Access Restriction Bypass | |
CVE-2010-1162 | |
Improper Input Validation | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Resource Management Errors | |
Information Exposure | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Race Condition | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Memory Leak | |
CVE-2010-2537 | |
Divide By Zero | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Improper Access Control | |
Remote Code Execution (RCE) | |
Improper Input Validation | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Information Exposure | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Out-of-Bounds | |
Race Condition | |
Denial of Service (DoS) | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Information Exposure | |
Race Condition | |
Denial of Service (DoS) | |
Improper Input Validation | |
Race Condition | |
Race Condition | |
Access Restriction Bypass | |
Out-of-Bounds | |
Insecure Randomness | |
Use After Free | |
Double Free | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Information Exposure | |
Improper Authentication | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Resource Management Errors | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Race Condition | |
Access Restriction Bypass | |
Information Exposure | |
Information Exposure | |
NULL Pointer Dereference | [4.1.0,4.1.49)[4.4.0,4.4.107)[4.9.0,4.9.71)[4.14.0,4.14.8) |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Integer Overflow or Wraparound | |
Memory Leak | [2.4.0,2.5.0)[2.6.0,2.6.31.1) |
NULL Pointer Dereference | |
Double Free | |
CVE-2003-0476 | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Improper Data Handling | |
Use After Free | |
Improper Authentication | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Memory Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-1999-1166 | |
Improper Input Validation | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Improper Check for Unusual or Exceptional Conditions | |
Integer Underflow | |
Use After Free | |
Denial of Service (DoS) | |
Resource Management Errors | |
Information Exposure | |
Information Exposure | |
Privilege Escalation | |
Buffer Overflow | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2004-0495 | |
Use After Free | |
Information Exposure | |
Use After Free | |
Resource Management Errors | |
Access Restriction Bypass | |
Privilege Escalation | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Use After Free | |
Resource Management Errors | |
Out-of-bounds Read | |
Race Condition | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Use After Free | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
Incorrect Comparison | |
CVE-2004-0415 | |
Resource Management Errors | |
Integer Overflow or Wraparound | [4.4,4.4.180)[4.9,4.9.172)[4.14,4.14.115)[4.19,4.19.38)[5.0,5.0.11) |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Use After Free | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Race Condition | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Verification of Cryptographic Signature | |
Race Condition | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Access Control | |
Denial of Service (DoS) | |
Insecure Default | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-bounds Write | |
Missing Initialization of Resource | |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | |
Information Exposure | |
Resource Management Errors | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | [4.1.0,4.1.49)[4.4.0,4.4.108)[4.9.0,4.9.72)[4.14.0,4.14.9) |
Denial of Service (DoS) | |
Race Condition | |
Access Restriction Bypass | |
Cryptographic Issues | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Race Condition | |
Denial of Service (DoS) | |
Improper Action Name Cleanup | |
Resource Management Errors | |
Access Restriction Bypass | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Input Validation | |
Arbitrary Command Injection | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Security Features | |
Use After Free | |
Access Restriction Bypass | |
Race Condition | |
Information Exposure | |
Denial of Service (DoS) | |
Information Exposure | |
Insecure Default | |
Integer Overflow or Wraparound | |
Information Exposure | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,4.19.19)[4.20.0,4.20.6) |
Use After Free | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Out-of-bounds Write | [5.8,5.10.37)[5.11,5.11.21)[5.12,5.12.4) |
Integer Overflow or Wraparound | |
Use After Free | |
Directory Traversal | |
Information Exposure | |
Access Restriction Bypass | |
CVE-2006-0557 | |
Access Restriction Bypass | |
Out-of-Bounds | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,2.6.20.13)[2.6.21,2.6.21.4) |
Information Exposure | |
Information Exposure | |
Race Condition | |
Improper Access Control | |
Resource Management Errors | |
Use After Free | |
Memory Leak | |
Denial of Service (DoS) | [2.0.0,2.0.39][2.1.0,2.2.0) |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Use of Uninitialized Resource | |
Denial of Service (DoS) | |
Resource Management Errors | |
Access Restriction Bypass | |
Use After Free | |
Buffer Overflow | |
Denial of Service (DoS) | |
Double Free | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Authorization | |
Resource Management Errors | |
Insertion of Sensitive Information into Log File | |
Out-of-bounds Write | |
Out-of-Bounds | |
Race Condition | |
Out-of-Bounds | |
Use After Free | |
User Enumeration | |
Improper Access Control | [4.4.111,4.4.120)[4.9.76,4.9.86)[4.14.8,4.14.24)[4.15.1,4.15.8) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Information Exposure | |
NULL Pointer Dereference | |
Resource Management Errors | |
Arbitrary Code Execution | |
Information Exposure | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Arbitrary Code Execution | |
Integer Overflow or Wraparound | |
Resource Management Errors | |
CVE-2004-1073 | |
Information Exposure | |
Denial of Service (DoS) | |
Code | |
Out-of-Bounds | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Cryptographic Issues | |
Resource Management Errors | |
Information Exposure | |
Access Restriction Bypass | |
Use After Free | |
Information Exposure | |
Out-of-Bounds | |
Buffer Overflow | |
Use After Free | |
Memory Leak | |
Information Exposure | |
Denial of Service (DoS) | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-bounds Read | |
CVE-2005-1264 | |
Denial of Service (DoS) | |
CVE-2005-2801 | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Resource Management Errors | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Use After Free | |
Resource Management Errors | |
Improper Input Validation | |
Improper Data Handling | |
NULL Pointer Dereference | |
Information Exposure | |
Out-of-bounds Read | |
Memory Leak | |
Access Restriction Bypass | |
Use of Externally-Controlled Format String | |
Denial of Service (DoS) | |
Cryptographic Issues | |
Information Exposure | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-bounds Read | |
Resource Management Errors | |
Authentication Bypass | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Improper Input Validation | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Use After Free | |
Privilege Escalation | |
NULL Pointer Dereference | |
Use After Free | |
Denial of Service (DoS) | |
CVE-2010-2066 | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | [3.0.0,3.18.67)[4.0.0,5.0) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Race Condition | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [2.6.11_rc1_bk6,2.6.15.5] |
Improper Input Validation | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Race Condition | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Check for Unusual or Exceptional Conditions | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
Access Restriction Bypass | |
Race Condition | |
Denial of Service (DoS) | [2.2.1,2.2.20)[2.4.1,2.4.12) |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Use After Free | |
CVE-2001-0316 | |
Access Restriction Bypass | |
Information Exposure | |
Improper Input Validation | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-Bounds | |
Denial of Service (DoS) | |
CVE-2004-1058 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Operation on a Resource after Expiration or Release | |
Out-of-bounds Write | |
Use After Free | [4.9.0,4.9.233)[4.14,4.14.194)[4.19,4.19.140) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Use After Free | |
Improper Access Control | |
Information Exposure | |
Improper Input Validation | |
NULL Pointer Dereference | |
CVE-2005-2873 | |
Resource Management Errors | |
Resource Management Errors | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Access Restriction Bypass | |
Resource Management Errors | |
Race Condition | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Information Exposure | |
CVE-2021-27363 | |
Access Restriction Bypass | |
Resource Management Errors | |
Improper Input Validation | |
CVE-2005-0180 | |
Integer Overflow or Wraparound | |
Use After Free | |
Access Restriction Bypass | |
Missing Initialization of Resource | [2.4.0,2.4.37.6)[2.6.0,2.6.31) |
CVE-2001-0851 | |
Resource Management Errors | |
NULL Pointer Dereference | |
Race Condition | |
Type Confusion | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Race Condition | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-bounds Write | [2.6.27,3.15.10][3.16,3.16.74)[4.4,4.4.194)[4.9,4.9.194)[4.14,4.14.146)[4.19,4.19.75)[5.2,5.2.17)[5.3,5.3.1) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
CVE-2004-0077 | |
Information Exposure | |
Memory Leak | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Access Control | |
Out-of-bounds Read | |
Improper Input Validation | |
Denial of Service (DoS) | |
Buffer Overflow | |
Improper Access Control | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Resource Management Errors | |
Improper Input Validation | |
Access Restriction Bypass | |
CVE-1999-1352 | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Memory Leak | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Resource Management Errors | |
Denial of Service (DoS) | |
Improper Access Control | |
Improper Input Validation | |
Directory Traversal | |
Out-of-Bounds | |
Improper Input Validation | |
Access Restriction Bypass | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
CVE-2004-0228 | |
Race Condition | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Information Exposure | |
Information Exposure | |
Improper Data Handling | |
Off-by-one Error | |
Denial of Service (DoS) | [2.6.29.rc2-git1,2.6.30.9] |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Improper Access Control | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Access Restriction Bypass | |
NULL Pointer Dereference | |
Improper Input Validation | |
Integer Underflow | |
Buffer Overflow | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Resource Management Errors | |
Improper Input Validation | |
Improper Input Validation | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Improper Input Validation | |
Incorrect Authorization | |
Access Restriction Bypass | |
Out-of-Bounds | |
Race Condition | |
Resource Management Errors | |
Information Exposure | |
Use After Free | [4.10,4.14.103)[4.19,4.19.25)[4.20,4.20.12) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Information Exposure | |
User Enumeration | |
Denial of Service (DoS) | |
Memory Leak | [3.17,3.18.137)[4.4,4.4.177)[4.9,4.9.164)[4.14,4.14.107)[4.19,4.19.30)[4.20,4.20.17)[5.0,5.0.3) |
Cross-site Scripting (XSS) | |
Information Exposure | |
Privilege Escalation | |
Improper Data Handling | |
Information Exposure | |
Memory Leak | [4.7,4.9.163)[4.14,4.14.106)[4.19,4.19.28)[4.20,4.20.15)[5.0,5.0.1) |
Improper Input Validation | |
Improper Access Control | |
Denial of Service (DoS) | |
Memory Leak | |
Out-of-Bounds | |
Race Condition | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Resource Management Errors | |
Resource Management Errors | |
Race Condition | |
Improper Data Handling | |
Improper Validation of Array Index | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Error Handling | |
Information Exposure | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Information Exposure | |
Memory Leak | |
Information Exposure | |
Out-of-bounds Write | |
Information Exposure | |
Denial of Service (DoS) | |
Information Exposure | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
CVE-2004-1144 | |
Improper Input Validation | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Information Exposure | |
Double Free | |
Use After Free | [,4.19.21)[4.19.22,4.20.8) |
Use After Free | |
Out-of-Bounds | |
Resource Management Errors | |
CVE-2003-0127 | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Buffer Overflow | |
Information Exposure | [,2.6.27.53)[2.6.32,2.6.32.21)[2.6.34,2.6.34.6)[2.6.35,2.6.35.4) |
Access Restriction Bypass | |
Out-of-bounds Write | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Information Exposure | |
Buffer Overflow | |
Improper Validation of Array Index | |
Access Restriction Bypass | |
Out-of-bounds Write | [3.10,3.11)[4.14,4.14.82)[4.18,4.18.20) |
Integer Overflow or Wraparound | |
Error Handling | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Memory Leak | |
Improper Access Control | |
Access Restriction Bypass | |
Deserialization of Untrusted Data | |
Remote Code Execution (RCE) | |
Access Restriction Bypass | |
Improper Data Handling | |
Resource Management Errors | |
Improper Input Validation | |
NULL Pointer Dereference | |
Information Exposure | |
Resource Management Errors | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Improper Authorization | |
Resource Management Errors | |
Improper Input Validation | |
CVE-2006-5871 | |
Race Condition | |
Improper Input Validation | |
Denial of Service (DoS) | |
Race Condition | |
Improper Access Control | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2003-0246 | |
Denial of Service (DoS) | |
Information Exposure | |
Buffer Overflow | |
Improper Data Handling | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Memory Leak | |
Out-of-Bounds | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,2.6.28][2.6.28,2.6.30.1) |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Out-of-bounds Write | |
Symlink Attack | |
Improper Input Validation | |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Resource Management Errors | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Race Condition | |
Improper Input Validation | |
Race Condition | |
Resource Management Errors | |
Access Restriction Bypass | (2.0.1,2.0.19)[2.2.0,2.2.19) |
Out-of-bounds Write | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Memory Leak | |
Access Restriction Bypass | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Data Handling | |
Information Exposure | |
Denial of Service (DoS) | |
Improper Input Validation | |
Directory Traversal | |
Out-of-bounds Read | |
Use of Externally-Controlled Format String | |
Out-of-Bounds | |
Improper Input Validation | |
NULL Pointer Dereference | |
Information Exposure | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Access Restriction Bypass | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Divide By Zero | |
Denial of Service (DoS) | |
Incorrect Authorization | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Improper Input Validation | |
Memory Leak | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Memory Leak | |
Privilege Dropping / Lowering Errors | |
Use After Free | |
Privilege Escalation | |
NULL Pointer Dereference | |
Directory Traversal | |
Privilege Escalation | |
Access Restriction Bypass | |
Resource Management Errors | [,2.6.16.23)[2.6.17.0,2.6.17.3) |
Off-by-one Error | |
Buffer Overflow | |
Denial of Service (DoS) | |
Use After Free | |
Cryptographic Issues | |
Information Exposure | |
Access Restriction Bypass | |
Race Condition | |
Improper Input Validation | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-Bounds | |
Denial of Service (DoS) | [,2.6.11.8)[2.6.0,2.6.12) |
Improper Input Validation | |
Denial of Service (DoS) | [4.13,4.14.93)[4.19,4.19.15)[4.20,4.20.2) |
Privilege Escalation | |
Race Condition | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Data Handling | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Buffer Overflow | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | |
Memory Leak | |
NULL Pointer Dereference | |
Race Condition | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Divide By Zero | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Resource Management Errors | |
Access Restriction Bypass | |
Buffer Access with Incorrect Length Value | |
Out-of-Bounds | |
Memory Leak | |
Out-of-Bounds | |
Improper Access Control | |
Double Free | |
Out-of-Bounds | |
Resource Management Errors | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Error Handling | |
Out-of-bounds Read | |
CVE-2019-20811 | |
Access Restriction Bypass | |
Use After Free | |
Memory Leak | |
CVE-2020-11669 | |
Denial of Service (DoS) | |
Race Condition | |
Resources Downloaded over Insecure Protocol | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Race Condition | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | [,4.4.182)[4.5,4.9.182)[4.10,4.14.127)[4.15,4.19.52)[4.20,5.1.11) |
Denial of Service (DoS) | |
Information Exposure | |
Operation on a Resource after Expiration or Release | |
Improper Input Validation | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Out-of-Bounds | |
NULL Pointer Dereference | |
CVE-2004-0497 | |
Memory Leak | |
Out-of-Bounds | |
Race Condition | |
Resource Management Errors | |
Authentication Bypass | |
Denial of Service (DoS) | |
Memory Leak | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-bounds Write | |
Information Exposure | |
CVE-2004-0186 | |
Improper Input Validation | |
Out-of-Bounds | |
Insufficient Verification of Data Authenticity | |