| Use After Free | [5.5,5.10.235)[5.11.0,5.15.179)[6.0.0,6.1.131)[6.2.0,6.6.79)[6.7.0,6.12.16)[6.13.0,6.13.4) |
| Use After Free | [,5.15)[6.0-rc1,6.12.28)[6.13-rc1,6.14.6)[6.15-rc1,6.15-rc5) |
| Out-of-bounds Write | [2.6.26,4.19.324)[5.4,5.4.286)[5.10,5.10.230)[5.15,5.15.172)[6.1,6.1.117)[6.6,6.6.61)[6.11,6.11.8)[6.12,6.12.1) |
| Improper Control of Speculative Execution with Observable Side Effects | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Race Condition | |
| Denial of Service (DoS) | |
| Improper Check for Unusual or Exceptional Conditions | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| Race Condition | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| NULL Pointer Dereference | |
| Improper Privilege Management | |
| Improper Input Validation | |
| Improper Input Validation | |
| Resource Exhaustion | [5.2,5.4.119)[5.10,5.10.37)[5.11,5.11.21)[5.12,5.12.4) |
| Out-of-bounds Write | [4.14.113,4.14.233)[4.19.19,4.19.190)[5.0,5.4.117)[5.10,5.10.35)[5.11,5.11.19)[5.12,5.12.2) |
| Memory Leak | [4.5,4.9.269)[4.14,4.14.233)[4.19,4.19.191)[5.4,5.4.118)[5.10,5.10.36)[5.11,5.11.20)[5.12,5.12.3) |
| Resource Exhaustion | [5.10,5.10.37)[5.11,5.11.21)[5.12,5.12.4) |
| Resource Exhaustion | [4.20,5.4.118)[5.10,5.10.36)[5.11,5.11.20)[5.12,5.12.3) |
| Out-of-bounds Write | [5.10,5.10.36)[5.11,5.11.20)[5.12,5.12.3) |
| Resource Exhaustion | [5.11.0,5.11.20)[5.12.0,5.12.3) |
| Allocation of Resources Without Limits or Throttling | [5.1,5.4.119)[5.10.0,5.10.37)[5.11.0,5.11.21)[5.12.0,5.12.4) |
| Out-of-bounds Write | [5.8,5.10.36)[5.11.0,5.11.20)[5.12.0,5.12.3) |
| Out-of-bounds Write | |
| Resource Exhaustion | [5.10,5.10.37)[5.11.0,5.11.21)[5.12.0,5.12.4) |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| Use After Free | |
| Use After Free | |
| Buffer Overflow | |
| Integer Overflow or Wraparound | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Buffer Overflow | |
| Out-of-bounds Read | |
| Use After Free | |
| Improper Control of a Resource Through its Lifetime | |
| Information Exposure | |
| Incorrect Permission Assignment for Critical Resource | |
| Improper Input Validation | |
| Improper Restriction of Operations within the Bounds of a Memory Buffer | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Lock Order Reversal | |
| Improper Restriction of Operations within the Bounds of a Memory Buffer | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Deadlock | |
| Improper Restriction of Operations within the Bounds of a Memory Buffer | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Resource Exhaustion | |
| Race Condition | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Resource Exhaustion | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| Race Condition | |
| Use After Free | |
| Race Condition | |
| Out-of-bounds Read | |
| Buffer Overflow | |
| Use After Free | |
| Improper Null Termination | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Double Free | |
| Denial of Service (DoS) | |
| Stack-based Buffer Overflow | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Control of a Resource Through its Lifetime | |
| Use After Free | |
| Observable Timing Discrepancy | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Race Condition | |
| Use After Free | |
| Information Exposure | |
| Improper Check or Handling of Exceptional Conditions | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| Race Condition | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| Allocation of Resources Without Limits or Throttling | |
| Off-by-one Error | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Integer Underflow | |
| Use After Free | |
| NULL Pointer Dereference | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| Transmission of Private Resources into a New Sphere ('Resource Leak') | |
| Out-of-bounds Read | |
| Use After Free | |
| Double Free | |
| Exposure of Sensitive Information to an Unauthorized Actor | |
| Out-of-bounds Write | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Race Condition | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Insufficient Encryption Strength | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Insufficient Granularity of Access Control | |
| NULL Pointer Dereference | |
| Out-of-Bounds Read | |
| Out-of-bounds Read | |
| Use of Out-of-range Pointer Offset | |
| NULL Pointer Dereference | |
| Buffer Overflow | |
| Out-of-bounds Read | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds Write | |
| NULL Pointer Dereference | |
| Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Buffer Overflow | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| Improper Ownership Management | |
| Release of Invalid Pointer or Reference | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Use After Free | |
| Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Use of Out-of-range Pointer Offset | |
| Integer Overflow or Wraparound | |
| Information Exposure | |
| Race Condition | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access Restriction Bypass | |
| Use After Free | |
| Stack-based Buffer Overflow | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Privilege Escalation | |
| Race Condition | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Race Condition | |
| Denial of Service (DoS) | |
| Improper Resource Locking | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Off-by-one Error | |
| Out-of-bounds Read | |
| Deadlock | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Denial of Service (DoS) | |
| Privilege Escalation | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Incorrect Bitwise Shift of Integer | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| Race Condition | |
| Privilege Escalation | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Execution with Unnecessary Privileges | |
| Use After Free | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Division by zero | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Update of Reference Count | |
| Improper Resource Locking | |
| Race Condition | |
| Time-of-check Time-of-use (TOCTOU) Race Condition | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Validation of Array Index | |
| Use After Free | |
| Missing Release of Memory after Effective Lifetime | |
| Denial of Service (DoS) | |
| Incorrect Authorization | |
| Information Exposure | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Double Free | |
| Information Exposure | |
| Missing Release of Memory after Effective Lifetime | |
| Information Exposure | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Use After Free | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Improper Initialization | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Excessive Platform Resource Consumption within a Loop | |
| Race Condition | |
| Use After Free | |
| Buffer Overflow | |
| Improper Cleanup on Thrown Exception | |
| Use After Free | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Integer Underflow (Wrap or Wraparound) | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Denial of Service (DoS) | |
| Stack-based Buffer Overflow | |
| NULL Pointer Dereference | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Heap-based Buffer Overflow | |
| Uninitialized Memory Exposure | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Unchecked Return Value | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Stack-based Buffer Overflow | |
| Denial of Service (DoS) | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Locking | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Use After Free | |
| User After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Race Condition | |
| Buffer Overflow | |
| Out-of-bounds Write | |
| Race Condition | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Access Control | |
| NULL Pointer Dereference | |
| Use After Free | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Information Exposure | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Access Control | |
| Incomplete Cleanup | |
| NULL Pointer Dereference | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| Race Condition | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Exposure of Sensitive Information Through Data Queries | |
| Incorrect Calculation of Buffer Size | |
| Use After Free | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | |
| Race Condition | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Resource Shutdown or Release | |
| NULL Pointer Dereference | |
| Use After Free | |
| Out-of-bounds Read | |
| Information Exposure | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Improper Validation of Integrity Check Value | |
| NULL Pointer Dereference | |
| Use After Free | |
| Out-of-bounds Write | |
| Arbitrary Code Execution | |
| Race Condition | |
| Improper Preservation of Permissions | |
| Out-of-bounds Write | |
| Use After Free | |
| Buffer Overflow | |
| Double Free | |
| Double Free | |
| Use After Free | |
| Information Exposure | |
| Improper Restriction of Operations within the Bounds of a Memory Buffer | |
| Race Condition | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Incomplete Cleanup | |
| NULL Pointer Dereference | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Privilege Escalation | |
| Buffer Overflow | |
| Race Condition | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Race Condition | |
| Out-of-Bounds | |
| Heap-based Buffer Overflow | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use of Insufficiently Random Values | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Incomplete Cleanup | |
| Integer Overflow or Wraparound | |
| Information Exposure | |
| Information Exposure | |
| Out-of-bounds Write | |
| Use After Free | |
| Race Condition | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Access Control | |
| Use After Free | |
| Information Exposure | |
| Access Restriction Bypass | |
| Use of Uninitialized Variable | |
| Use After Free | |
| Privilege Escalation | |
| Information Exposure | |
| Double Free | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Double Free | |
| Double Free | |
| Double Free | |
| Information Exposure | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Improper Input Validation | |
| Session Fixation | |
| Out-of-bounds Write | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Double Free | |
| Integer Underflow | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Missing Initialization of Resource | |
| Buffer Overflow | |
| Missing Initialization of Resource | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Improper Data Handling | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Privilege Escalation | |
| Access Restriction Bypass | |
| Information Exposure | |
| CVE-2005-0750 | |
| Race Condition | |
| Security Features | |
| Information Exposure | |
| Race Condition | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Integer Underflow | |
| Code | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Race Condition | |
| Information Exposure | |
| Resource Management Errors | |
| Race Condition | [,2.6.27.24)[2.6.29.0,2.6.29.4)[2.6.0,2.6.30) |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Use After Free | |
| Authentication Bypass | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | |
| Race Condition | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Timing Attack | |
| Access Restriction Bypass | |
| Race Condition | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Privilege Escalation | |
| Security Features | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Incorrect Authorization | |
| Information Exposure | [2.4.0,2.4.35.3)[2.6.0,2.6.24) |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Double Free | |
| Use After Free | |
| Information Exposure | |
| CVE-2007-1497 | |
| CVE-2009-0834 | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Initialization | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Cryptographic Issues | |
| Information Exposure | |
| Error Handling | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Information Exposure | |
| CVE-2005-0839 | |
| Out-of-bounds Write | |
| Information Exposure | |
| Out-of-bounds Read | |
| Access Restriction Bypass | |
| Privilege Escalation | |
| Integer Overflow or Wraparound | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Information Exposure | |
| Access Restriction Bypass | |
| Information Exposure | |
| Information Exposure | |
| Out-of-bounds Read | |
| Use of Uninitialized Resource | |
| Resource Management Errors | |
| Use After Free | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Double Free | |
| Improper Input Validation | |
| Improper Access Control | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Access Restriction Bypass | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Use After Free | |
| Use After Free | |
| Authentication Bypass | |
| Use After Free | |
| Improper Access Control | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Use After Free | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Memory Leak | |
| Incorrect Calculation | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Use After Free | |
| Memory Leak | |
| Missing Initialization of Resource | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Race Condition | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Information Exposure | |
| Improper Input Validation | |
| Missing Initialization of Resource | |
| Use After Free | |
| Error Handling | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| CVE-2021-29264 | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Symlink Attack | |
| Improper Input Validation | |
| Improper Input Validation | |
| Memory Leak | |
| Improper Input Validation | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Divide By Zero | |
| Race Condition | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Race Condition | |
| Information Exposure | |
| Resource Management Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Use After Free | |
| Memory Leak | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Buffer Overflow | |
| Resource Management Errors | |
| Information Exposure | |
| Code | |
| Improper Input Validation | |
| Memory Leak | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Data Handling | |
| Resource Management Errors | |
| Race Condition | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Race Condition | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| CVE-2005-4351 | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Race Condition | [3.0.0,3.19.8][4.0.0,5.0) |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Race Condition | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Memory Leak | |
| Use After Free | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Buffer Overflow | |
| Buffer Overflow | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| CVE-2021-42252 | |
| Resource Management Errors | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Race Condition | |
| Access Restriction Bypass | |
| Information Exposure | |
| Access Restriction Bypass | |
| CVE-2001-1572 | |
| Insecure Randomness | |
| Information Exposure | |
| Access Restriction Bypass | |
| Use After Free | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| CVE-2009-4538 | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Use After Free | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Race Condition | |
| Improper Access Control | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | |
| Improper Action Name Cleanup | [3.2,4.9.135)[4.9.136,4.14.78)[4.14.79,4.18.16)[4.18.17,4.19) |
| Memory Leak | |
| Buffer Overflow | |
| Race Condition | |
| Resource Management Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Resource Management Errors | [,2.6.25.19)[2.6.26.0,2.6.26.7)[2.6.27.0,2.6.27.3) |
| CVE-2001-1391 | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Memory Leak | |
| Resource Management Errors | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Privilege Escalation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Access Control | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Authentication | |
| Out-of-Bounds | |
| Information Exposure | |
| Race Condition | |
| Improper Input Validation | |
| Error Handling | |
| Denial of Service (DoS) | |
| Race Condition | |
| Improper Input Validation | |
| Buffer Overflow | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Resource Management Errors | |
| CVE-1999-0138 | |
| Memory Leak | |
| CVE-2004-0003 | |
| CVE-2020-26541 | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| CVE-2000-0289 | |
| Denial of Service (DoS) | |
| Race Condition | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Off-by-one Error | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Double Free | |
| Improper Input Validation | |
| Privilege Escalation | |
| Buffer Overflow | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Race Condition | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | |
| Resource Management Errors | |
| Use After Free | [,4.14.91)[4.15.0,4.19.13) |
| Denial of Service (DoS) | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| CVE-2008-0001 | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Unchecked Return Value | |
| CVE-2021-26934 | |
| Information Exposure | |
| Use After Free | |
| Use of Uninitialized Resource | |
| Resource Management Errors | |
| CVE-2001-1397 | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Race Condition | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Security Features | |
| Resource Management Errors | |
| Use After Free | |
| CVE-2002-0429 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Memory Leak | |
| Code | |
| Out-of-bounds Read | |
| CVE-2001-1390 | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Security Features | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cryptographic Issues | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| CVE-2001-1395 | |
| Divide By Zero | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Access Control | |
| NULL Pointer Dereference | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Improper Initialization | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Race Condition | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Use After Free | |
| User Enumeration | |
| Improper Initialization | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Security Features | |
| Access Restriction Bypass | |
| Missing Initialization of Resource | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Code | |
| Cryptographic Issues | |
| Resource Management Errors | |
| Improper Input Validation | |
| Privilege Escalation | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Information Exposure | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Race Condition | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Memory Leak | |
| Information Exposure | |
| Use After Free | |
| User Enumeration | |
| Information Exposure | |
| Memory Leak | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Use After Free | |
| Race Condition | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-bounds Read | |
| Race Condition | |
| Double Free | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| CVE-2002-1573 | |
| Out-of-Bounds | |
| User Enumeration | |
| Access Restriction Bypass | |
| Race Condition | |
| Improper Data Handling | |
| NULL Pointer Dereference | |
| Use After Free | [4.14,4.14.166)[4.19,4.19.97)[5.0,5.2.1) |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Access Control | |
| Missing Initialization of Resource | |
| Denial of Service (DoS) | [3.10.1,3.11)[4.18.1,4.19) |
| Privilege Escalation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Buffer Overflow | |
| Resource Management Errors | [,2.6.27.19)[2.6.28.0,2.6.28.7) |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Input Validation | |
| Resource Management Errors | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Improper Validation of Array Index | |
| Information Exposure | |
| CVE-2001-0317 | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Use After Free | |
| Race Condition | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| NULL Pointer Dereference | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Security Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| CVE-2010-1088 | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Access Restriction Bypass | |
| Race Condition | |
| Race Condition | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Use After Free | |
| Improper Access Control | |
| Use After Free | |
| Race Condition | |
| Insecure Default | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| CVE-2001-1399 | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Improper Verification of Cryptographic Signature | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Management Errors | |
| Improper Input Validation | |
| Incorrect Authorization | |
| CVE-2004-0887 | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Information Exposure | |
| Information Exposure | |
| CVE-2004-0496 | |
| Information Exposure | |
| Use After Free | |
| Access Restriction Bypass | |
| Code | |
| Missing Initialization of Resource | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | [2.6.0,3.0.0)[3.10.0,3.11)[4.14.0,4.14.55) |
| Denial of Service (DoS) | |
| Privilege Escalation | |
| Improper Access Control | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2006-0096 | |
| Denial of Service (DoS) | |
| Use After Free | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | [,2.4.36.6)[2.6.25.0,2.6.25.5) |
| Buffer Overflow | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Race Condition | [4.3,4.4.179)[4.9,4.9.169)[4.14,4.14.112)[4.19,4.19.35)[5.0,5.0.8) |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | [,2.6.27.53)[2.6.32,2.6.32.21)[2.6.34,2.6.34.6)[2.6.35,2.6.35.4) |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Cryptographic Issues | |
| NULL Pointer Dereference | |
| Buffer Overflow | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Improper Input Validation | [,3.2.102)[3.3,4.1.51)[4.3,4.9.87)[4.10,4.14.25)[4.15,4.15.8) |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Code | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Memory Leak | |
| Access Restriction Bypass | |
| Use After Free | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Input Validation | [,2.6.27.19)[2.6.28.0,2.6.28.7) |
| NULL Pointer Dereference | |
| CVE-2007-0958 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| User Enumeration | |
| Resource Management Errors | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Double Free | |
| Buffer Overflow | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Information Exposure | |
| Information Exposure | |
| Memory Leak | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Race Condition | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Race Condition | |
| Information Exposure | |
| Out-of-bounds Read | [5.10,5.10.37)[5.11,5.11.21)[5.12,5.12.4) |
| Use After Free | |
| Memory Leak | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Memory Leak | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Improper Initialization | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-Bounds | [4.1.0,4.1.49)[4.4.0,4.4.107)[4.9.0,4.9.71)[4.14.0,4.14.8) |
| Information Exposure | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| CVE-2007-2480 | |
| Improper Input Validation | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | [2.6.19,4.4.267)[4.5,4.9.267)[4.10,4.14.231)[4.15,4.19.188)[4.20,5.4.113)[5.5,5.10.31)[5.11,5.12) |
| Race Condition | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Privilege Escalation | [3.0.0,3.19.8][4.0.0,5.0) |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Race Condition | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Race Condition | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Information Exposure | |
| Improper Input Validation | [2.4.0,2.4.35)[2.6.0,2.6.21) |
| Information Exposure | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Use After Free | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Access Restriction Bypass | |
| Information Exposure | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| CVE-2007-3848 | |
| Improper Validation of Array Index | [4.19,4.19.25)[4.20,4.20.12) |
| Memory Leak | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Missing Initialization of Resource | |
| Race Condition | |
| Information Exposure | |
| Race Condition | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Race Condition | |
| Use After Free | |
| Denial of Service (DoS) | |
| Missing Initialization of Resource | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Information Exposure | |
| Resource Management Errors | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Cryptographic Issues | |
| Race Condition | |
| Access of Uninitialized Pointer | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| CVE-1999-1341 | [2.2.0,2.2.14)[2.3.0,2.3.18) |
| Denial of Service (DoS) | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Divide By Zero | |
| Denial of Service (DoS) | |
| CVE-2006-3626 | |
| Out-of-bounds Write | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Information Exposure | |
| Race Condition | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Use After Free | |
| Information Exposure | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Double Free | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Race Condition | |
| Information Exposure | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Code | |
| Access Restriction Bypass | |
| Race Condition | |
| CVE-2005-0204 | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Buffer Overflow | |
| Race Condition | |
| Resource Management Errors | |
| Incorrect Calculation | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Privilege Escalation | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Information Exposure | |
| Memory Leak | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Use After Free | |
| Insecure Default | |
| Access Restriction Bypass | |
| Race Condition | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| CVE-2021-26930 | |
| Information Exposure | |
| CVE-2006-1052 | |
| Improper Input Validation | |
| Memory Leak | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Out-of-Bounds | [4.4,4.4.195)[4.9,4.9.197)[4.14,4.14.142)[4.19,4.19.70)[5.2,5.2.12) |
| Access Restriction Bypass | |
| Memory Leak | |
| Information Exposure | |
| Race Condition | |
| Access Restriction Bypass | |
| Race Condition | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Resource Management Errors | |
| Integer Overflow or Wraparound | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Use After Free | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | [,2.6.27.22)[2.6.28.0,2.6.28.10) |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | [,2.4.37.6)[2.6.0,2.6.13) |
| Information Exposure | |
| Race Condition | |
| Memory Leak | |
| Information Exposure | |
| Race Condition | |
| Memory Leak | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Race Condition | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Divide By Zero | |
| Denial of Service (DoS) | [,2.6.27.13)[2.6.28,2.6.28.2) |
| Resource Management Errors | |
| NULL Pointer Dereference | |
| Memory Leak | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Unauthorized File Access | |
| NULL Pointer Dereference | |
| Race Condition | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Information Exposure | |
| Release of Invalid Pointer or Reference | |
| Improper Input Validation | |
| Race Condition | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Resource Management Errors | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| CVE-2005-0937 | |
| Cross-site Scripting (XSS) | |
| Race Condition | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Race Condition | |
| Race Condition | |
| Access Restriction Bypass | |
| Use After Free | |
| Error Handling | |
| Buffer Overflow | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Information Exposure | |
| Use After Free | |
| Use After Free | [4.18,4.19.18)[4.20,4.20.5) |
| CVE-2006-1242 | |
| Improper Access Control | |
| Race Condition | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | [,5.4.101)[5.5.0,5.10.19)[5.11,5.11.2) |
| NULL Pointer Dereference | |
| CVE-2002-0704 | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| CVE-2002-1976 | |
| Access Restriction Bypass | |
| Race Condition | |
| Resource Management Errors | |
| Privilege Escalation | |
| Privilege Escalation | [3.0.0,3.19.8][4.0.0,5.0) |
| Information Exposure | |
| Memory Leak | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Race Condition | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | [3.0.0,3.19.8][4.0.0,5.0) |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Race Condition | |
| Race Condition | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Information Exposure | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Authentication | |
| Resource Management Errors | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Code | |
| Improper Access Control | |
| Access Restriction Bypass | [,2.4.36.5)[2.6.25.0,2.6.25.3) |
| Access Restriction Bypass | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Initialization | |
| Out-of-bounds Read | [4.14,4.14.75)[4.15,4.15.18][4.16,4.16.18][4.17,4.17.9][4.18,4.18.13) |
| Race Condition | |
| Information Exposure | |
| Remote Code Execution (RCE) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | |
| Resource Management Errors | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | [4.7,4.9.191)[4.14,4.14.141)[4.19,4.19.69)[5.2,5.2.11) |
| Race Condition | |
| Memory Leak | |
| CVE-2013-0311 | |
| Information Exposure | |
| Denial of Service (DoS) | [2.4.0,2.4.33.1)[2.6.0,2.6.17.9) |
| Denial of Service (DoS) | |
| Use After Free | |
| Denial of Service (DoS) | |
| Improper Access Control | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Access Control | |
| Buffer Overflow | |
| CVE-2004-0997 | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Brute Force | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| CVE-1999-0401 | |
| Use After Free | |
| Race Condition | |
| Denial of Service (DoS) | |
| Race Condition | |
| Resource Management Errors | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Use After Free | |
| Incorrect Authorization | |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Memory Leak | |
| NULL Pointer Dereference | |
| CVE-2004-2135 | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Use After Free | [,4.9.190)[4.14.0,4.14.139) |
| Improper Input Validation | [,2.6.27.19)[2.6.28.0,2.6.28.7) |
| Denial of Service (DoS) | |
| CVE-2007-2453 | |
| Information Exposure | |
| Code | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Security Features | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Resource Management Errors | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Time of Check Time of Use (TOCTOU) | |
| Use After Free | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Race Condition | |
| Double Free | |
| Use After Free | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| CVE-2004-2136 | |
| Use After Free | |
| NULL Pointer Dereference | |
| Privilege Escalation | |
| Out-of-Bounds | |
| CVE-2002-0510 | |
| CVE-1999-1018 | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Improper Validation of Array Index | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Information Exposure | |
| Race Condition | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| CVE-2021-38198 | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Buffer Overflow | [2.6.34,3.16.74)[4.4,4.4.193)[4.9,4.9.193)[4.14,4.14.144)[4.19,4.19.73)[5.2,5.2.15) |
| Insertion of Sensitive Information into Log File | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Privilege Escalation | [3.16,3.16.71)[4.4,4.4.185)[4.9,4.9.185)[4.10,4.14.133)[4.19,4.19.58)[5.1,5.1.17) |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Race Condition | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Race Condition | |
| Resource Management Errors | |
| Resource Management Errors | |
| Information Exposure | |
| Resource Management Errors | |
| Information Exposure | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Information Exposure | |
| Memory Leak | |
| Resource Management Errors | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Use After Free | |
| Access Restriction Bypass | |
| Information Exposure | |
| Security Features | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Access Restriction Bypass | |
| Information Exposure | |
| Access Restriction Bypass | |
| Use After Free | |
| Access Restriction Bypass | |
| Use After Free | |
| Memory Leak | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| CVE-2011-1019 | |
| Access Restriction Bypass | |
| Privilege Escalation | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Race Condition | |
| Information Exposure | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Improper Input Validation | [,2.6.27.19)[2.6.28.0,2.6.28.7) |
| CVE-2002-0499 | |
| Incorrect Calculation | |
| Out-of-bounds Write | |
| Race Condition | |
| Information Exposure | |
| Information Exposure | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Use After Free | |
| Race Condition | |
| Denial of Service (DoS) | |
| Race Condition | [,4.4.133)[4.5,4.9.103)[4.10,4.14.44)[4.15,4.16.12) |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Memory Leak | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Off-by-one Error | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Handling of Exceptional Conditions | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Incorrect Type Conversion or Cast | |
| NULL Pointer Dereference | |
| Resource Management Errors | |
| Race Condition | |
| Information Exposure | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Integer Underflow | |
| Race Condition | |
| Information Exposure | |
| Information Exposure | |
| Privilege Escalation | |
| Information Exposure | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Memory Leak | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Symlink Attack | |
| Security Features | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| CVE-2006-2071 | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Buffer Overflow | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Memory Leak | |
| Out-of-bounds Write | |
| Race Condition | |
| Information Exposure | |
| Race Condition | |
| Access Restriction Bypass | |
| Resource Management Errors | [2.4.0,2.4.36.5)[2.6.0,2.6.25.3) |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Information Exposure | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Access Control | |
| Information Exposure | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Information Exposure | |
| CVE-2017-5669 | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Race Condition | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Insecure Default | |
| Race Condition | |
| Information Exposure | |
| Use After Free | |
| Memory Leak | |
| Use After Free | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Use After Free | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | [2.6.12.1,4.14.130)[4.19,4.19.56)[5.1,5.1.15) |
| Use After Free | |
| Denial of Service (DoS) | [4.4,4.4.182)[4.9,4.9.182)[4.14,4.14.127)[4.19,4.19.52)[5.1,5.1.11) |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| CVE-2020-29534 | [5.1,5.8.18)[5.9.0,5.9.3) |
| Race Condition | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Use of Uninitialized Resource | |
| Information Exposure | |
| Use After Free | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | [,4.4.182)[4.5,4.9.182)[4.10,4.14.127)[4.15,4.19.52)[4.20,5.1.11) |
| Improper Handling of Exceptional Conditions | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Access Control | |
| Information Exposure | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Information Exposure | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| CVE-2001-1396 | |
| Information Exposure | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Race Condition | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Improper Input Validation | [5.4,5.4.72)[5.8.0,5.8.16)[5.9.0,5.9.14) |
| Improper Access Control | |
| Buffer Overflow | |
| NULL Pointer Dereference | |
| Cryptographic Issues | |
| Access Restriction Bypass | |
| Race Condition | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Access Control | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Insecure Default | |
| Race Condition | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Improper Initialization | |
| Code | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Insecure Default | |
| Race Condition | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Privilege Escalation | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Race Condition | |
| Denial of Service (DoS) | |
| Memory Leak | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| CVE-2010-4648 | |
| Race Condition | |
| Race Condition | |
| Out-of-bounds Read | |
| Buffer Overflow | |
| Information Exposure | [4.4.0,4.4.114)[4.9.0,4.9.79)[4.14.0,4.14.8) |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Initialization | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | [3.0.0,3.19.8][4.0.0,5.0) |
| Information Exposure | |
| Memory Leak | |
| Race Condition | [4.4.0,4.4.221)[4.9.0,4.9.221)[4.14,4.14.178)[4.19,4.19.119)[5.0,5.3) |
| Information Exposure | |
| Out-of-Bounds | |
| Race Condition | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Improper Access Control | |
| Information Exposure | |
| Out-of-bounds Write | |
| Integer Underflow | |
| Information Exposure | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use After Free | [4.19,4.19.38)[5.0,5.0.5) |
| Resource Management Errors | |
| Use After Free | |
| Memory Leak | |
| Out-of-Bounds | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| NULL Pointer Dereference | [4.9,4.9.162)[4.14,4.14.105)[4.19,4.19.27)[4.20,4.20.14) |
| Resources Downloaded over Insecure Protocol | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Memory Leak | |
| Resource Management Errors | |
| Information Exposure | |
| Incorrect Authorization | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Information Exposure | |
| Memory Leak | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| CVE-2004-0949 | |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-Bounds | |
| Information Exposure | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Race Condition | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Race Condition | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Insecure Encryption | |
| Denial of Service (DoS) | |
| Divide By Zero | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Race Condition | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Race Condition | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Information Exposure | |
| CVE-2001-1398 | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Information Exposure | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | [5.7,5.10.37)[5.11,5.11.21)[5.12,5.12.4) |
| NULL Pointer Dereference | |
| Information Exposure | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Insecure Encryption | |
| Integer Overflow or Wraparound | |
| CVE-2006-1523 | |
| Resource Management Errors | |
| Information Exposure | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | |
| Race Condition | |
| Denial of Service (DoS) | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Divide By Zero | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Code | |
| Use After Free | |
| Divide By Zero | |
| CVE-2014-8134 | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Memory Leak | |
| Access Restriction Bypass | |
| CVE-2010-1162 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Resource Management Errors | |
| Information Exposure | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Race Condition | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Memory Leak | |
| CVE-2010-2537 | |
| Divide By Zero | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Improper Access Control | |
| Remote Code Execution (RCE) | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Race Condition | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Information Exposure | |
| Race Condition | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Race Condition | |
| Race Condition | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Insecure Randomness | |
| Use After Free | |
| Double Free | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Authentication | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Race Condition | |
| Access Restriction Bypass | |
| Information Exposure | |
| Information Exposure | |
| NULL Pointer Dereference | [4.1.0,4.1.49)[4.4.0,4.4.107)[4.9.0,4.9.71)[4.14.0,4.14.8) |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Memory Leak | [2.4.0,2.5.0)[2.6.0,2.6.31.1) |
| NULL Pointer Dereference | |
| Double Free | |
| CVE-2003-0476 | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Improper Data Handling | |
| Use After Free | |
| Improper Authentication | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Memory Leak | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| CVE-1999-1166 | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Improper Check for Unusual or Exceptional Conditions | |
| Integer Underflow | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Information Exposure | |
| Information Exposure | |
| Privilege Escalation | |
| Buffer Overflow | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| CVE-2004-0495 | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Privilege Escalation | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Use After Free | |
| Resource Management Errors | |
| Out-of-bounds Read | |
| Race Condition | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| Incorrect Comparison | |
| CVE-2004-0415 | |
| Resource Management Errors | |
| Integer Overflow or Wraparound | [4.4,4.4.180)[4.9,4.9.172)[4.14,4.14.115)[4.19,4.19.38)[5.0,5.0.11) |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Use After Free | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Race Condition | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Verification of Cryptographic Signature | |
| Race Condition | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Insecure Default | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-bounds Write | |
| Missing Initialization of Resource | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Information Exposure | |
| Information Exposure | |
| Resource Management Errors | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | [4.1.0,4.1.49)[4.4.0,4.4.108)[4.9.0,4.9.72)[4.14.0,4.14.9) |
| Denial of Service (DoS) | |
| Race Condition | |
| Access Restriction Bypass | |
| Cryptographic Issues | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Race Condition | |
| Denial of Service (DoS) | |
| Improper Action Name Cleanup | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Arbitrary Command Injection | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Security Features | |
| Use After Free | |
| Access Restriction Bypass | |
| Race Condition | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Insecure Default | |
| Integer Overflow or Wraparound | |
| Information Exposure | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | [,4.19.19)[4.20.0,4.20.6) |
| Use After Free | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-bounds Write | [5.8,5.10.37)[5.11,5.11.21)[5.12,5.12.4) |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Directory Traversal | |
| Information Exposure | |
| Access Restriction Bypass | |
| CVE-2006-0557 | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | [,2.6.20.13)[2.6.21,2.6.21.4) |
| Information Exposure | |
| Information Exposure | |
| Race Condition | |
| Improper Access Control | |
| Resource Management Errors | |
| Use After Free | |
| Memory Leak | |
| Denial of Service (DoS) | [2.0.0,2.0.39][2.1.0,2.2.0) |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Use of Uninitialized Resource | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Use After Free | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Double Free | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Authorization | |
| Resource Management Errors | |
| Insertion of Sensitive Information into Log File | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Race Condition | |
| Out-of-Bounds | |
| Use After Free | |
| User Enumeration | |
| Improper Access Control | [4.4.111,4.4.120)[4.9.76,4.9.86)[4.14.8,4.14.24)[4.15.1,4.15.8) |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Information Exposure | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Integer Overflow or Wraparound | |
| Resource Management Errors | |
| CVE-2004-1073 | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Code | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Cryptographic Issues | |
| Resource Management Errors | |
| Information Exposure | |
| Access Restriction Bypass | |
| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Use After Free | |
| Memory Leak | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| CVE-2005-1264 | |
| Denial of Service (DoS) | |
| CVE-2005-2801 | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Use After Free | |
| Resource Management Errors | |
| Improper Input Validation | |
| Improper Data Handling | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Out-of-bounds Read | |
| Memory Leak | |
| Access Restriction Bypass | |
| Use of Externally-Controlled Format String | |
| Denial of Service (DoS) | |
| Cryptographic Issues | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Authentication Bypass | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Use After Free | |
| Privilege Escalation | |
| NULL Pointer Dereference | |
| Use After Free | |
| Denial of Service (DoS) | |
| CVE-2010-2066 | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Access Restriction Bypass | [3.0.0,3.18.67)[4.0.0,5.0) |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Race Condition | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | [2.6.11_rc1_bk6,2.6.15.5] |
| Improper Input Validation | |
| Information Exposure | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Race Condition | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Improper Check for Unusual or Exceptional Conditions | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| Access Restriction Bypass | |
| Race Condition | |
| Denial of Service (DoS) | [2.2.1,2.2.20)[2.4.1,2.4.12) |
| Information Exposure | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use After Free | |
| CVE-2001-0316 | |
| Access Restriction Bypass | |
| Information Exposure | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| CVE-2004-1058 | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Operation on a Resource after Expiration or Release | |
| Out-of-bounds Write | |
| Use After Free | [4.9.0,4.9.233)[4.14,4.14.194)[4.19,4.19.140) |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Access Control | |
| Information Exposure | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| CVE-2005-2873 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Race Condition | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Information Exposure | |
| CVE-2021-27363 | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Improper Input Validation | |
| CVE-2005-0180 | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Access Restriction Bypass | |
| Missing Initialization of Resource | [2.4.0,2.4.37.6)[2.6.0,2.6.31) |
| CVE-2001-0851 | |
| Resource Management Errors | |
| NULL Pointer Dereference | |
| Race Condition | |
| Type Confusion | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Race Condition | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-bounds Write | [2.6.27,3.15.10][3.16,3.16.74)[4.4,4.4.194)[4.9,4.9.194)[4.14,4.14.146)[4.19,4.19.75)[5.2,5.2.17)[5.3,5.3.1) |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Information Exposure | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| CVE-2004-0077 | |
| Information Exposure | |
| Memory Leak | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Access Control | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Improper Access Control | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Resource Management Errors | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| CVE-1999-1352 | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Memory Leak | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Improper Access Control | |
| Improper Input Validation | |
| Directory Traversal | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| CVE-2004-0228 | |
| Race Condition | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Information Exposure | |
| Improper Data Handling | |
| Off-by-one Error | |
| Denial of Service (DoS) | [2.6.29.rc2-git1,2.6.30.9] |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Access Control | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Integer Underflow | |
| Buffer Overflow | |
| Information Exposure | |
| Use After Free | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Incorrect Authorization | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Race Condition | |
| Resource Management Errors | |
| Information Exposure | |
| Use After Free | [4.10,4.14.103)[4.19,4.19.25)[4.20,4.20.12) |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Information Exposure | |
| User Enumeration | |
| Denial of Service (DoS) | |
| Memory Leak | [3.17,3.18.137)[4.4,4.4.177)[4.9,4.9.164)[4.14,4.14.107)[4.19,4.19.30)[4.20,4.20.17)[5.0,5.0.3) |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Privilege Escalation | |
| Improper Data Handling | |
| Information Exposure | |
| Memory Leak | [4.7,4.9.163)[4.14,4.14.106)[4.19,4.19.28)[4.20,4.20.15)[5.0,5.0.1) |
| Improper Input Validation | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Memory Leak | |
| Out-of-Bounds | |
| Race Condition | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Resource Management Errors | |
| Race Condition | |
| Improper Data Handling | |
| Improper Validation of Array Index | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Error Handling | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Memory Leak | |
| Information Exposure | |
| Out-of-bounds Write | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Information Exposure | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| CVE-2004-1144 | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Double Free | |
| Use After Free | [,4.19.21)[4.19.22,4.20.8) |
| Use After Free | |
| Out-of-Bounds | |
| Resource Management Errors | |
| CVE-2003-0127 | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Buffer Overflow | |
| Information Exposure | [,2.6.27.53)[2.6.32,2.6.32.21)[2.6.34,2.6.34.6)[2.6.35,2.6.35.4) |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Buffer Overflow | |
| Improper Validation of Array Index | |
| Access Restriction Bypass | |
| Out-of-bounds Write | [3.10,3.11)[4.14,4.14.82)[4.18,4.18.20) |
| Integer Overflow or Wraparound | |
| Error Handling | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Memory Leak | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Deserialization of Untrusted Data | |
| Remote Code Execution (RCE) | |
| Access Restriction Bypass | |
| Improper Data Handling | |
| Resource Management Errors | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Resource Management Errors | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Improper Authorization | |
| Resource Management Errors | |
| Improper Input Validation | |
| CVE-2006-5871 | |
| Race Condition | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Race Condition | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| CVE-2003-0246 | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Buffer Overflow | |
| Improper Data Handling | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Memory Leak | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | [,2.6.28][2.6.28,2.6.30.1) |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Out-of-bounds Write | |
| Symlink Attack | |
| Improper Input Validation | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Race Condition | |
| Improper Input Validation | |
| Race Condition | |
| Resource Management Errors | |
| Access Restriction Bypass | (2.0.1,2.0.19)[2.2.0,2.2.19) |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Memory Leak | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Data Handling | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Directory Traversal | |
| Out-of-bounds Read | |
| Use of Externally-Controlled Format String | |
| Out-of-Bounds | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Information Exposure | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Divide By Zero | |
| Denial of Service (DoS) | |
| Incorrect Authorization | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Memory Leak | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Memory Leak | |
| Privilege Dropping / Lowering Errors | |
| Use After Free | |
| Privilege Escalation | |
| NULL Pointer Dereference | |
| Directory Traversal | |
| Privilege Escalation | |
| Access Restriction Bypass | |
| Resource Management Errors | [,2.6.16.23)[2.6.17.0,2.6.17.3) |
| Off-by-one Error | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Use After Free | |
| Cryptographic Issues | |
| Information Exposure | |
| Access Restriction Bypass | |
| Race Condition | |
| Improper Input Validation | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Denial of Service (DoS) | [,2.6.11.8)[2.6.0,2.6.12) |
| Improper Input Validation | |
| Denial of Service (DoS) | [4.13,4.14.93)[4.19,4.19.15)[4.20,4.20.2) |
| Privilege Escalation | |
| Race Condition | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Data Handling | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Buffer Overflow | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Memory Leak | |
| NULL Pointer Dereference | |
| Race Condition | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Divide By Zero | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Buffer Access with Incorrect Length Value | |
| Out-of-Bounds | |
| Memory Leak | |
| Out-of-Bounds | |
| Improper Access Control | |
| Double Free | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Error Handling | |
| Out-of-bounds Read | |
| CVE-2019-20811 | |
| Access Restriction Bypass | |
| Use After Free | |
| Memory Leak | |
| CVE-2020-11669 | |
| Denial of Service (DoS) | |
| Race Condition | |
| Resources Downloaded over Insecure Protocol | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Race Condition | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | [,4.4.182)[4.5,4.9.182)[4.10,4.14.127)[4.15,4.19.52)[4.20,5.1.11) |
| Denial of Service (DoS) | |
| Information Exposure | |
| Operation on a Resource after Expiration or Release | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| CVE-2004-0497 | |
| Memory Leak | |
| Out-of-Bounds | |
| Race Condition | |
| Resource Management Errors | |
| Authentication Bypass | |
| Denial of Service (DoS) | |
| Memory Leak | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2004-0186 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Insufficient Verification of Data Authenticity | |