Insufficient Granularity of Access Control | [,8.1.30)[8.2.0,8.2.24)[8.3.0,8.3.12) |
Improper Handling of Length Parameter Inconsistency | [,8.1.30)[8.2.0,8.2.24)[8.3.0,8.3.12) |
Command Injection | [,8.1.30)[8.2.0,8.2.24)[8.3.0,8.3.12) |
Command Injection | [,8.1.29)[8.2.0,8.2.20)[8.3.0,8.3.8) |
Timing Attack | [,8.1.29)[8.2.0,8.2.20)[8.3.0,8.3.8) |
Command Injection | [,8.1.29)[8.2.0,8.2.20)[8.3.0,8.3.8) |
Command Injection | [,8.1.28)[8.2.0,8.2.18)[8.3.0,8.3.6) |
Out-of-bounds Write | [7.3.0,7.3.31][7.4.0,7.4.25)[8.0.0,8.0.12) |
CVE-2021-21707 | [7.3.0,7.3.33)[7.4.0,7.4.26)[8.0.0,8.0.13) |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Directory Traversal | |
Denial of Service (DoS) | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-bounds Read | [,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1) |
Arbitrary Code Execution | |
Out-of-Bounds | |
Improper Input Validation | [4.0.0,4.4.8)[5.0.0,5.2.4) |
Out-of-bounds Read | [7.1.0,7.1.29)[7.2.0,7.2.18)[7.3.0,7.3.5) |
Out-of-Bounds | |
Information Exposure | |
Denial of Service (DoS) | |
Directory Traversal | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,5.6.33)[7.0.0,7.0.27)(7.1.0,7.1.13) |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Use After Free | [7.2.0,7.2.33)[7.3.0,7.3.21)[7.4.0,7.4.9) |
Integer Overflow or Wraparound | |
Information Exposure | [,5.6.37)[7.0.0,7.0.31)[7.1.0,7.1.20)[7.2.0,7.2.8) |
Regular Expression Denial of Service (ReDoS) | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Out-of-bounds Read | [7.2.0,7.2.27)[7.3.0,7.3.14) |
Access Restriction Bypass | |
Access Restriction Bypass | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Use of Externally-Controlled Format String | |
Out-of-Bounds | [,5.5.35)[5.6.0,5.6.21)[7.0.0,7.0.6) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Use of Externally-Controlled Format String | |
Remote Code Execution (RCE) | |
Out-of-bounds Read | [7.2.0,7.2.9)[7.3.0,7.3.16)[7.4.0,7.4.4) |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CRLF Injection | |
Access Restriction Bypass | |
Directory Traversal | |
Out-of-Bounds | [7.3.0,7.3.29)[7.4.0,7.4.21)[8.0.0,8.0.8) |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2020-7066 | [7.2.0,7.2.29)[7.3.0,7.3.16)[7.4.0,7.4.4) |
Denial of Service (DoS) | |
Information Exposure | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | [,5.6.33)[7.0.0,7.0.27)(7.1.0,7.1.13) |
Integer Overflow or Wraparound | |
Improper Input Validation | [7.3.0,7.3.27)[7.4.0,7.4.15)[8.0.0,8.0.2) |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Symlink Attack | |
Out-of-Bounds | |
Improper Input Validation | [,5.4.35)[5.5.0,5.5.19)[5.6.0,5.6.3)[5.0,5.22) |
Use After Free | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Input Validation | |
CVE-2007-2844 | |
Out-of-Bounds | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
CVE-2004-0959 | |
Denial of Service (DoS) | |
Improper Input Validation | |
Information Exposure | |
CVE-2007-1583 | |
Access Restriction Bypass | |
Deserialization of Untrusted Data | |
Denial of Service (DoS) | |
Out-of-Bounds | |
CVE-2006-4625 | |
Symlink Attack | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Denial of Service (DoS) | |
Use After Free | |
NULL Pointer Dereference | [7.2.0,7.2.29)[7.3.0,7.3.15)[7.4.0,7.4.3) |
Access Restriction Bypass | |
Use After Free | |
Improper Data Handling | |
Improper Input Validation | |
Arbitrary Code Execution | |
Improper Input Validation | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
Denial of Service (DoS) | |
NULL Pointer Dereference | [5.0.0,5.6.40)[7.0.0,7.3.0) |
Improper Input Validation | |
Out-of-bounds Read | |
Use of Externally-Controlled Format String | |
Improper Input Validation | |
Improper Input Validation | [,5.5.32)[5.6.0,5.6.18)[7.0.0,7.0.3) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Cryptographic Issues | |
Information Exposure | |
Denial of Service (DoS) | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Arbitrary Code Execution | |
CVE-2007-1378 | |
Buffer Overflow | |
Out-of-Bounds | |
Information Exposure | |
Arbitrary Code Execution | |
Remote Code Execution (RCE) | |
Arbitrary Code Execution | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-bounds Read | [7.2.0,7.2.27)[7.3.0,7.3.14)[7.4.0,7.4.2) |
Integer Overflow or Wraparound | [7.2.0,7.2.31)[7.3.0,7.3.18)[7.4.0,7.4.6) |
Denial of Service (DoS) | |
Resource Management Errors | |
Use of Externally-Controlled Format String | |
Out-of-Bounds | |
Integer Overflow or Wraparound | [,5.6.37)[7.0.0,7.0.31)[7.1.0,7.1.20)[7.2.0,7.2.8) |
CVE-1999-0068 | |
Improper Input Validation | |
Out-of-Bounds | |
Information Exposure | |
Arbitrary Code Injection | |
Improper Input Validation | |
Out-of-Bounds | |
CVE-2002-0484 | |
Use of Uninitialized Resource | [7.1.0,7.1.30)[7.2.0,7.2.19)[7.3.0,7.3.6) |
Improper Input Validation | |
Symlink Attack | |
Arbitrary Code Execution | |
Resource Management Errors | |
Improper Input Validation | [,5.5.34)[5.6.0,5.6.20)[7.0.0,7.0.5) |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-Bounds | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-bounds Read | [,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5) |
Integer Overflow or Wraparound | [5.6.0,5.6.27)[7.0.0,7.0.12) |
Improper Input Validation | |
Improper Access Control | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Out-of-Bounds | [7.1.0,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3) |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | [4.0.0,4.3.10)[5.0.0,5.0.3) |
Arbitrary Code Execution | |
Cryptographic Issues | |
Denial of Service (DoS) | |
Resource Management Errors | |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
Out-of-bounds Read | |
Improper Input Validation | |
Arbitrary Code Execution | |
Improper Input Validation | |
Access Restriction Bypass | |
SQL Injection | |
Denial of Service (DoS) | |
Out-of-bounds Read | [,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1) |
Resource Management Errors | |
Code | |
Double Free | |
Out-of-Bounds | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Access Restriction Bypass | |
Out-of-Bounds | [,5.4.42)[5.5.0,5.5.26)[5.6.0,5.6.10) |
Resource Management Errors | |
Arbitrary Code Injection | [7.2.0,7.2.27)[7.3.0,7.3.14) |
Information Exposure | |
Cross-site Scripting (XSS) | |
CVE-2006-2563 | |
Information Exposure | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-bounds Read | [7.1.0,7.1.28)[7.2.9,7.2.17)[7.3.0,7.3.4) |
Access Restriction Bypass | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Directory Traversal | |
Resource Management Errors | |
Improper Data Handling | |
Out-of-bounds Read | |
Resource Management Errors | |
Deserialization of Untrusted Data | [4.0.0,4.4.5)[5.0.0,5.2.1) |
Out-of-Bounds | |
Improper Input Validation | |
Denial of Service (DoS) | |
Use of Externally-Controlled Format String | |
CVE-2015-8880 | |
Out-of-bounds Read | [7.2.0,7.2.30)[7.3.0,7.3.17)[7.4.0,7.4.5) |
CVE-2007-2728 | |
Improper Input Validation | [7.3.0,7.3.29)[7.4.0,7.4.21)[8.0.0,8.0.8) |
XML External Entity (XXE) Injection | [5.5.0,5.5.22)[5.6.0,5.6.6) |
Integer Overflow or Wraparound | |
Arbitrary Code Execution | |
Use of Externally-Controlled Format String | |
Out-of-bounds Read | [7.1.0,7.1.31)[7.2.0,7.2.21)[7.3.0,7.3.8) |
Improper Input Validation | |
Improper Input Validation | [,5.5.34)[5.6.0,5.6.20)[7.0.0,7.0.5) |
Information Exposure | |
Information Exposure | |
CVE-2019-11044 | [7.2.0,7.2.27)[7.3.0,7.3.14) |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-Bounds | |
Race Condition | |
Remote Code Execution (RCE) | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Arbitrary Code Execution | |
SQL Injection | |
Information Exposure | |
Denial of Service (DoS) | |
Authentication Bypass | |
CVE-2007-2727 | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-Bounds | |
Directory Traversal | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Improper Input Validation | |
Use of Externally-Controlled Format String | |
Buffer Overflow | |
NULL Pointer Dereference | |
Access Restriction Bypass | |
Authentication Bypass | |
Out-of-bounds Read | |
CVE-2009-3292 | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Arbitrary Code Execution | |
CVE-2007-0910 | |
Directory Traversal | [7.3.0,7.3.31)[7.4.0,7.4.24)[8.0.0,8.0.11) |
Denial of Service (DoS) | |
Out-of-bounds Read | [7.1.0,7.1.30)[7.2.0,7.2.19)[7.3.0,7.3.6) |
CVE-2005-3389 | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
CVE-2007-5898 | |
Argument Injection | [5.6.0,5.6.39)[7.0.0,7.0.33)[7.1.0,7.1.25)[7.2.0,7.2.13) |
Improper Input Validation | |
NULL Pointer Dereference | [7.3.0,7.3.27)[7.4.0,7.4.15)[8.0.0,8.0.2) |
Arbitrary Code Execution | |
Use After Free | |
Out-of-bounds Write | [7.1.0,7.1.33)[7.2.0,7.2.24)[7.3.0,7.3.11) |
CVE-2007-4658 | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Information Exposure | |
Out-of-Bounds | |
CVE-2007-3205 | |
Denial of Service (DoS) | |
Information Exposure | |
Directory Traversal | |
Improper Input Validation | |
Out-of-bounds Read | [7.2.0,7.2.29)[7.3.0,7.3.15)[7.4.0,7.4.3) |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Arbitrary Code Injection | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-bounds Read | [7.1.0,7.1.28)[7.2.9,7.2.17)[7.3.0,7.3.4) |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Race Condition | |
Improper Input Validation | |
Remote Code Execution (RCE) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | [,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5) |
Denial of Service (DoS) | [5.4.0,5.4.44)[5.5.0,5.5.28)[5.6.0,5.6.12) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | |
Improper Input Validation | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Resource Management Errors | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Cryptographic Issues | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Buffer Overflow | |
Integer Overflow or Wraparound | |
Directory Traversal | |
NULL Pointer Dereference | [7.0.0,7.0.27)[7.1.0,7.1.13)[7.2.0,7.2.1) |
Information Exposure | [,5.6.35)[7.0.0,7.0.29)[7.1.0,7.1.16)[7.2.0,7.2.4) |
Improper Input Validation | |
NULL Pointer Dereference | [,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5) |
Use After Free | |
Out-of-Bounds | |
Cryptographic Issues | [5.4.0,5.4.44)[5.5.0,5.5.28)[5.6.0,5.6.12) |
Out-of-Bounds | [,4.4.7)[5.1.0,5.1.6][5.2.0,5.2.2) |
Deserialization of Untrusted Data | |
CVE-2005-3392 | |
Improper Input Validation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | [,5.5.34)[5.6.0,5.6.20)[7.0.0,7.0.5) |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-bounds Read | [,5.6.39)[7.0.0,7.0.33)[7.1.0,7.1.25)[7.2.0,7.2.13) |
Information Exposure | |
Remote Code Execution (RCE) | |
Arbitrary Code Execution | |
CVE-2007-1452 | |
Use After Free | |
Denial of Service (DoS) | |
Improper Input Validation | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Memory Leak | |
Buffer Overflow | |
Arbitrary Code Execution | |
Resource Management Errors | |
Double Free | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Double Free | |
Out-of-Bounds | [,5.6.34)[7.0.0,7.0.28)[7.1.0,7.1.15)[7.2.0,7.2.3) |
Improper Input Validation | |
Use After Free | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
SQL Injection | |
CVE-1999-0238 | |
Out-of-Bounds | |
Information Exposure | |
Insecure Encryption | [7.2.0,7.2.34)[7.3.0,7.3.23)[7.4.0,7.4.11) |
Denial of Service (DoS) | [5.5.0,5.5.22)[5.6.0,5.6.6) |
Remote Code Execution (RCE) | [4.0.0,4.3.10)[5.0.0,5.0.3) |
Access Restriction Bypass | |
Improper Input Validation | |
Out-of-Bounds | |
Access Restriction Bypass | |
Use After Free | |
Arbitrary Code Execution | |
Improper Data Handling | |
Out-of-Bounds | |
Out-of-bounds Read | [,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1) |
CRLF Injection | |
Server-side Request Forgery (SSRF) | |
Out-of-Bounds | |
NULL Pointer Dereference | [,5.6.30)[7.0.0,7.0.15)[7.1.0,7.1.1) |
Out-of-Bounds | [5.5.0,5.5.21)[5.6.0,5.6.5) |
Denial of Service (DoS) | |
Out-of-Bounds | [,5.4.37)[5.5.0,5.5.21)[5.6.0,5.6.5) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | [5.6.0,5.6.25)[7.0.0,7.0.9) |
Directory Traversal | |
Out-of-Bounds | |
Directory Traversal | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
CVE-2002-0986 | |
Access Restriction Bypass | |
Information Exposure | |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | [,5.6.38)[7.0.0,7.0.32)[7.1.0,7.1.22)[7.2.0,7.2.10) |
Information Exposure | |
Out-of-Bounds | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | |
Arbitrary Code Execution | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | [5.5.0,5.5.28)[5.6.0,5.6.12) |
Out-of-Bounds | |
Use After Free | |
Resource Management Errors | |
Out-of-Bounds | [,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3) |
Directory Traversal | |
CVE-2006-3017 | |
Use After Free | |
Cross-site Scripting (XSS) | |
NULL Pointer Dereference | |
Resource Management Errors | |
Out-of-Bounds | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Symlink Attack | |
Access Restriction Bypass | [4.0.0,4.4.8)[5.0.0,5.2.4) |
Improper Access Control | |
Out-of-Bounds | |
Use After Free | |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-bounds Read | [7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.2) |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Authentication Bypass | |
CVE-2005-3054 | |
Arbitrary Code Execution | [,5.4.44)[5.5.0,5.5.28)[5.6.0,5.6.12) |
CVE-2000-0967 | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-bounds Read | [7.2.0,7.2.27)[7.3.0,7.3.14) |
Out-of-bounds Read | [7.1.0,7.1.31)[7.2.0,7.2.21)[7.3.0,7.3.8) |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Cross-site Scripting (XSS) | [,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5) |
Information Exposure | |
Buffer Overflow | |
Remote Code Execution (RCE) | |
Out-of-bounds Read | |
Arbitrary Code Execution | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2007-1376 | |
Denial of Service (DoS) | |
Resource Management Errors | |
Resource Management Errors | |
Integer Overflow or Wraparound | [7.1.0,7.1.30)[7.2.0,7.2.19)[7.3.0,7.3.6) |
Improper Input Validation | |
CVE-2007-4670 | |
Directory Traversal | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
CRLF Injection | |
Out-of-Bounds | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Command Injection | |
Access Restriction Bypass | |
Information Exposure | |
Improper Preservation of Permissions | [7.2.0,7.2.29)[7.3.0,7.3.15)[7.4.0,7.4.3) |
Out-of-Bounds | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Arbitrary Code Execution | |
Use After Free | |
Out-of-bounds Read | [,5.6.37)[7.0.0,7.0.31)[7.1.0,7.1.20)[7.2.0,7.2.8) |
Integer Overflow or Wraparound | |
Resource Management Errors | |
Access Restriction Bypass | |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-bounds Read | [7.2.0,7.2.27)[7.3.0,7.3.14)[7.4.0,7.4.2) |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Resource Management Errors | |
Improper Check for Unusual or Exceptional Conditions | |
Out-of-Bounds | |
Cryptographic Issues | |
Access Restriction Bypass | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Out-of-bounds Read | [,5.6.32)[7.0.0,7.0.25)[7.1.0,7.1.11) |
Improper Input Validation | |
Arbitrary Code Execution | |
Buffer Overflow | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | [4.0.0,4.4.8)[5.0.0,5.2.4) |
Out-of-bounds Write | |
Out-of-Bounds | [,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3) |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | [,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3) |
CVE-2009-3293 | |
Out-of-Bounds | |
CVE-2001-1385 | |
Access Restriction Bypass | |
Double Free | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | |
Arbitrary Code Execution | |
Access Restriction Bypass | [4.0.0,4.4.8)[5.0.0,5.2.4) |
Symlink Attack | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-bounds Read | [,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1) |
Out-of-Bounds | [4.0.0,4.4.5)[5.0.0,5.2.1) |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-bounds Write | [7.3.0,7.3.16)[7.4.0,7.4.4) |
Denial of Service (DoS) | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Buffer Overflow | |
Out-of-bounds Read | [7.2.0,7.2.27)[7.3.0,7.3.14) |
Out-of-Bounds | [,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3) |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Out-of-bounds Write | [,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14) |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Use of Insecure Cookies | [7.2.0,7.2.34)[7.3.0,7.3.23)[7.4.0,7.4.11) |
Denial of Service (DoS) | |
Improper Input Validation | [4.0.0,4.4.5)[5.0.0,5.2.1) |
Out-of-Bounds | |
Out-of-bounds Write | |