| Improper Neutralization of Null Byte or NUL Character | |
| Improper Handling of Invalid Use of Special Elements | |
| Expected Behavior Violation | |
| Allocation of Resources Without Limits or Throttling | |
| Detection of Error Condition Without Action | |
| Observable Timing Discrepancy | |
| Race Condition | |
| Improper Isolation or Compartmentalization | |
| OS Command Injection | |
| Missing Critical Step in Authentication | |
| Authentication Bypass by Capture-replay | |
| Arbitrary Code Injection | |
| Allocation of Resources Without Limits or Throttling | |
| Double Free | |
| Information Exposure | |
| CVE-2001-0872 | |
| Buffer Overflow | |
| Access Restriction Bypass | |
| CVE-2001-1382 | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Directory Traversal | |
| Information Exposure | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Race Condition | |
| Out-of-Bounds | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| CVE-2005-2797 | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| CVE-2000-0999 | |
| Information Exposure | |
| Inappropriate Encoding for Output Context | |
| Access Restriction Bypass | |
| Improper Privilege Management | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Observable Timing Discrepancy | |
| Improper Authentication | |
| Resource Management Errors | |
| Cryptographic Issues | |
| Improper Authentication | |
| Access Restriction Bypass | |
| Insufficiently Protected Credentials | |
| Security Features | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Untrusted Search Path | |
| CRLF Injection | |
| Directory Traversal | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| User Enumeration | |
| Double Free | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Information Exposure | |
| Insufficiently Protected Credentials | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Information Exposure | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Incorrect Authorization | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| CVE-2001-0529 | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Remote Code Execution (RCE) | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Privilege Escalation | |
| Access Restriction Bypass | |
| Information Exposure | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Race Condition | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Key Management Errors | |
| Access Restriction Bypass | |
| Command Injection | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| CVE-2000-0525 | |
| Race Condition | |