| NULL Pointer Dereference | [,8.1.33)[8.2.0RC1,8.2.29)[8.3.0RC1,8.3.23)[8.4.0RC1,8.4.10) |
| NULL Pointer Dereference | [,8.1.33)[8.2.0RC1,8.2.29)[8.3.0RC1,8.3.23)[8.4.0RC1,8.4.10) |
| Server-side Request Forgery (SSRF) | [,8.1.33)[8.2.0RC1,8.2.29)[8.3.0RC1,8.3.23)[8.4.0RC1,8.4.10) |
| Incorrect Calculation of Buffer Size | [,8.1.32)[8.2.0,8.2.28)[8.3.0,8.3.19)[8.4.0,8.4.5) |
| Improper Input Validation | [,8.1.32)[8.2.0,8.2.28)[8.3.0,8.3.19)[8.4.0,8.4.5) |
| Improper Input Validation | [,8.1.32)[8.2.0,8.2.28)[8.3.0,8.3.19)[8.4.0,8.4.5) |
| Improper Input Validation | [,8.1.32)[8.2.0,8.2.28)[8.3.0,8.3.19)[8.4.0,8.4.5) |
| Improper Input Validation | [,8.1.32)[8.2.0,8.2.28)[8.3.0,8.3.19)[8.4.0,8.4.5) |
| Use After Free | [8.3.0,8.3.19)[8.4.0,8.4.5) |
| Heap-based Buffer Overflow | [8.1.0,8.1.31)[8.2.0,8.2.26)[8.3.0,8.3.14) |
| Improper Input Validation | [8.1.0,8.1.31)[8.2.0,8.2.26)[8.3.0,8.3.14) |
| Out-of-bounds Write | [8.1.0,8.1.31)[8.2.0,8.2.26)[8.3.0,8.3.14) |
| Information Exposure | [8.1.0,8.1.31)[8.2.0,8.2.26)[8.3.0,8.3.14) |
| Out-of-bounds Write | [,8.1.31)[8.2.0,8.2.26)[8.3.0,8.3.14) |
| Insufficient Granularity of Access Control | [,8.1.30)[8.2.0,8.2.24)[8.3.0,8.3.12) |
| Improper Handling of Length Parameter Inconsistency | [,8.1.30)[8.2.0,8.2.24)[8.3.0,8.3.12) |
| Command Injection | [,8.1.30)[8.2.0,8.2.24)[8.3.0,8.3.12) |
| Command Injection | [,8.1.29)[8.2.0,8.2.20)[8.3.0,8.3.8) |
| Timing Attack | [,8.1.29)[8.2.0,8.2.20)[8.3.0,8.3.8) |
| Command Injection | [,8.1.29)[8.2.0,8.2.20)[8.3.0,8.3.8) |
| Command Injection | [,8.1.28)[8.2.0,8.2.18)[8.3.0,8.3.6) |
| Buffer Overflow | |
| Out-of-bounds Write | [7.3.0,7.3.31][7.4.0,7.4.25)[8.0.0,8.0.12) |
| CVE-2021-21707 | [7.3.0,7.3.33)[7.4.0,7.4.26)[8.0.0,8.0.13) |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Directory Traversal | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Out-of-bounds Read | [,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1) |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Improper Input Validation | [4.0.0,4.4.8)[5.0.0,5.2.4) |
| Out-of-bounds Read | [7.1.0,7.1.29)[7.2.0,7.2.18)[7.3.0,7.3.5) |
| Out-of-Bounds | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Directory Traversal | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | [,5.6.33)[7.0.0,7.0.27)(7.1.0,7.1.13) |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Use After Free | [7.2.0,7.2.33)[7.3.0,7.3.21)[7.4.0,7.4.9) |
| Integer Overflow or Wraparound | |
| Information Exposure | [,5.6.37)[7.0.0,7.0.31)[7.1.0,7.1.20)[7.2.0,7.2.8) |
| Regular Expression Denial of Service (ReDoS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Read | [7.2.0,7.2.27)[7.3.0,7.3.14) |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Use of Externally-Controlled Format String | |
| Out-of-Bounds | [,5.5.35)[5.6.0,5.6.21)[7.0.0,7.0.6) |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Use of Externally-Controlled Format String | |
| Remote Code Execution (RCE) | |
| Out-of-bounds Read | [7.2.0,7.2.9)[7.3.0,7.3.16)[7.4.0,7.4.4) |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| CRLF Injection | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Out-of-Bounds | [7.3.0,7.3.29)[7.4.0,7.4.21)[8.0.0,8.0.8) |
| Out-of-Bounds | |
| Improper Input Validation | |
| CVE-2020-7066 | [7.2.0,7.2.29)[7.3.0,7.3.16)[7.4.0,7.4.4) |
| Denial of Service (DoS) | |
| Information Exposure | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | [,5.6.33)[7.0.0,7.0.27)(7.1.0,7.1.13) |
| Integer Overflow or Wraparound | |
| Improper Input Validation | [7.3.0,7.3.27)[7.4.0,7.4.15)[8.0.0,8.0.2) |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Symlink Attack | |
| Out-of-Bounds | |
| Improper Input Validation | [,5.4.35)[5.5.0,5.5.19)[5.6.0,5.6.3)[5.0,5.22) |
| Use After Free | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| CVE-2007-2844 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| CVE-2004-0959 | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Information Exposure | |
| CVE-2007-1583 | |
| Access Restriction Bypass | |
| Deserialization of Untrusted Data | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| CVE-2006-4625 | |
| Symlink Attack | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Use After Free | |
| NULL Pointer Dereference | [7.2.0,7.2.29)[7.3.0,7.3.15)[7.4.0,7.4.3) |
| Access Restriction Bypass | |
| Use After Free | |
| Improper Data Handling | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | [5.0.0,5.6.40)[7.0.0,7.3.0) |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Use of Externally-Controlled Format String | |
| Improper Input Validation | |
| Improper Input Validation | [,5.5.32)[5.6.0,5.6.18)[7.0.0,7.0.3) |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Cryptographic Issues | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| CVE-2007-1378 | |
| Buffer Overflow | |
| Out-of-Bounds | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Remote Code Execution (RCE) | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-bounds Read | [7.2.0,7.2.27)[7.3.0,7.3.14)[7.4.0,7.4.2) |
| Integer Overflow or Wraparound | [7.2.0,7.2.31)[7.3.0,7.3.18)[7.4.0,7.4.6) |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use of Externally-Controlled Format String | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | [,5.6.37)[7.0.0,7.0.31)[7.1.0,7.1.20)[7.2.0,7.2.8) |
| CVE-1999-0068 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Information Exposure | |
| Arbitrary Code Injection | |
| Improper Input Validation | |
| Out-of-Bounds | |
| CVE-2002-0484 | |
| Use of Uninitialized Resource | [7.1.0,7.1.30)[7.2.0,7.2.19)[7.3.0,7.3.6) |
| Improper Input Validation | |
| Symlink Attack | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Improper Input Validation | [,5.5.34)[5.6.0,5.6.20)[7.0.0,7.0.5) |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | [,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5) |
| Integer Overflow or Wraparound | [5.6.0,5.6.27)[7.0.0,7.0.12) |
| Improper Input Validation | |
| Improper Access Control | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Out-of-Bounds | [7.1.0,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3) |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | [4.0.0,4.3.10)[5.0.0,5.0.3) |
| Arbitrary Code Execution | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| SQL Injection | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | [,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1) |
| Resource Management Errors | |
| Code | |
| Double Free | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Access Restriction Bypass | |
| Out-of-Bounds | [,5.4.42)[5.5.0,5.5.26)[5.6.0,5.6.10) |
| Resource Management Errors | |
| Arbitrary Code Injection | [7.2.0,7.2.27)[7.3.0,7.3.14) |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| CVE-2006-2563 | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-bounds Read | [7.1.0,7.1.28)[7.2.9,7.2.17)[7.3.0,7.3.4) |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Directory Traversal | |
| Resource Management Errors | |
| Improper Data Handling | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Deserialization of Untrusted Data | [4.0.0,4.4.5)[5.0.0,5.2.1) |
| Out-of-Bounds | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Use of Externally-Controlled Format String | |
| CVE-2015-8880 | |
| Out-of-bounds Read | [7.2.0,7.2.30)[7.3.0,7.3.17)[7.4.0,7.4.5) |
| CVE-2007-2728 | |
| Improper Input Validation | [7.3.0,7.3.29)[7.4.0,7.4.21)[8.0.0,8.0.8) |
| XML External Entity (XXE) Injection | [5.5.0,5.5.22)[5.6.0,5.6.6) |
| Integer Overflow or Wraparound | |
| Arbitrary Code Execution | |
| Use of Externally-Controlled Format String | |
| Out-of-bounds Read | [7.1.0,7.1.31)[7.2.0,7.2.21)[7.3.0,7.3.8) |
| Improper Input Validation | |
| Improper Input Validation | [,5.5.34)[5.6.0,5.6.20)[7.0.0,7.0.5) |
| Information Exposure | |
| Information Exposure | |
| CVE-2019-11044 | [7.2.0,7.2.27)[7.3.0,7.3.14) |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-Bounds | |
| Race Condition | |
| Remote Code Execution (RCE) | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Arbitrary Code Execution | |
| SQL Injection | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| CVE-2007-2727 | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Directory Traversal | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Use of Externally-Controlled Format String | |
| Buffer Overflow | |
| NULL Pointer Dereference | |
| Access Restriction Bypass | |
| Authentication Bypass | |
| Out-of-bounds Read | |
| CVE-2009-3292 | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| CVE-2007-0910 | |
| Directory Traversal | [7.3.0,7.3.31)[7.4.0,7.4.24)[8.0.0,8.0.11) |
| Denial of Service (DoS) | |
| Out-of-bounds Read | [7.1.0,7.1.30)[7.2.0,7.2.19)[7.3.0,7.3.6) |
| CVE-2005-3389 | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| CVE-2007-5898 | |
| Argument Injection | [5.6.0,5.6.39)[7.0.0,7.0.33)[7.1.0,7.1.25)[7.2.0,7.2.13) |
| Improper Input Validation | |
| NULL Pointer Dereference | [7.3.0,7.3.27)[7.4.0,7.4.15)[8.0.0,8.0.2) |
| Arbitrary Code Execution | |
| Use After Free | |
| Out-of-bounds Write | [7.1.0,7.1.33)[7.2.0,7.2.24)[7.3.0,7.3.11) |
| CVE-2007-4658 | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2007-3205 | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Directory Traversal | |
| Improper Input Validation | |
| Out-of-bounds Read | [7.2.0,7.2.29)[7.3.0,7.3.15)[7.4.0,7.4.3) |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Out-of-bounds Read | [7.1.0,7.1.28)[7.2.9,7.2.17)[7.3.0,7.3.4) |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Race Condition | |
| Improper Input Validation | |
| Remote Code Execution (RCE) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | [,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5) |
| Denial of Service (DoS) | [5.4.0,5.4.44)[5.5.0,5.5.28)[5.6.0,5.6.12) |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Resource Management Errors | |
| NULL Pointer Dereference | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Integer Overflow or Wraparound | |
| Directory Traversal | |
| NULL Pointer Dereference | [7.0.0,7.0.27)[7.1.0,7.1.13)[7.2.0,7.2.1) |
| Information Exposure | [,5.6.35)[7.0.0,7.0.29)[7.1.0,7.1.16)[7.2.0,7.2.4) |
| Improper Input Validation | |
| NULL Pointer Dereference | [,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5) |
| Use After Free | |
| Out-of-Bounds | |
| Cryptographic Issues | [5.4.0,5.4.44)[5.5.0,5.5.28)[5.6.0,5.6.12) |
| Out-of-Bounds | [,4.4.7)[5.1.0,5.1.6][5.2.0,5.2.2) |
| Deserialization of Untrusted Data | |
| CVE-2005-3392 | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | [,5.5.34)[5.6.0,5.6.20)[7.0.0,7.0.5) |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-bounds Read | [,5.6.39)[7.0.0,7.0.33)[7.1.0,7.1.25)[7.2.0,7.2.13) |
| Information Exposure | |
| Remote Code Execution (RCE) | |
| Arbitrary Code Execution | |
| CVE-2007-1452 | |
| Use After Free | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Memory Leak | |
| Buffer Overflow | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Double Free | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Double Free | |
| Out-of-Bounds | [,5.6.34)[7.0.0,7.0.28)[7.1.0,7.1.15)[7.2.0,7.2.3) |
| Improper Input Validation | |
| Use After Free | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| SQL Injection | |
| CVE-1999-0238 | |
| Out-of-Bounds | |
| Information Exposure | |
| Insecure Encryption | [7.2.0,7.2.34)[7.3.0,7.3.23)[7.4.0,7.4.11) |
| Denial of Service (DoS) | [5.5.0,5.5.22)[5.6.0,5.6.6) |
| Remote Code Execution (RCE) | [4.0.0,4.3.10)[5.0.0,5.0.3) |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Use After Free | |
| Arbitrary Code Execution | |
| Improper Data Handling | |
| Out-of-Bounds | |
| Out-of-bounds Read | [,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1) |
| CRLF Injection | |
| Server-side Request Forgery (SSRF) | |
| Out-of-Bounds | |
| NULL Pointer Dereference | [,5.6.30)[7.0.0,7.0.15)[7.1.0,7.1.1) |
| Out-of-Bounds | [5.5.0,5.5.21)[5.6.0,5.6.5) |
| Denial of Service (DoS) | |
| Out-of-Bounds | [,5.4.37)[5.5.0,5.5.21)[5.6.0,5.6.5) |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | [5.6.0,5.6.25)[7.0.0,7.0.9) |
| Directory Traversal | |
| Out-of-Bounds | |
| Directory Traversal | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| CVE-2002-0986 | |
| Access Restriction Bypass | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | [,5.6.38)[7.0.0,7.0.32)[7.1.0,7.1.22)[7.2.0,7.2.10) |
| Information Exposure | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | [5.5.0,5.5.28)[5.6.0,5.6.12) |
| Out-of-Bounds | |
| Use After Free | |
| Resource Management Errors | |
| Out-of-Bounds | [,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3) |
| Directory Traversal | |
| CVE-2006-3017 | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| NULL Pointer Dereference | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Symlink Attack | |
| Access Restriction Bypass | [4.0.0,4.4.8)[5.0.0,5.2.4) |
| Improper Access Control | |
| Out-of-Bounds | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-bounds Read | [7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.2) |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Authentication Bypass | |
| CVE-2005-3054 | |
| Arbitrary Code Execution | [,5.4.44)[5.5.0,5.5.28)[5.6.0,5.6.12) |
| CVE-2000-0967 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-bounds Read | [7.2.0,7.2.27)[7.3.0,7.3.14) |
| Out-of-bounds Read | [7.1.0,7.1.31)[7.2.0,7.2.21)[7.3.0,7.3.8) |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Cross-site Scripting (XSS) | [,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5) |
| Information Exposure | |
| Buffer Overflow | |
| Remote Code Execution (RCE) | |
| Out-of-bounds Read | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2007-1376 | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Resource Management Errors | |
| Integer Overflow or Wraparound | [7.1.0,7.1.30)[7.2.0,7.2.19)[7.3.0,7.3.6) |
| Improper Input Validation | |
| CVE-2007-4670 | |
| Directory Traversal | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| CRLF Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Command Injection | |
| Access Restriction Bypass | |
| Information Exposure | |
| Improper Preservation of Permissions | [7.2.0,7.2.29)[7.3.0,7.3.15)[7.4.0,7.4.3) |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Use After Free | |
| Out-of-bounds Read | [,5.6.37)[7.0.0,7.0.31)[7.1.0,7.1.20)[7.2.0,7.2.8) |
| Integer Overflow or Wraparound | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-bounds Read | [7.2.0,7.2.27)[7.3.0,7.3.14)[7.4.0,7.4.2) |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Improper Check for Unusual or Exceptional Conditions | |
| Out-of-Bounds | |
| Cryptographic Issues | |
| Access Restriction Bypass | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | [,5.6.32)[7.0.0,7.0.25)[7.1.0,7.1.11) |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Buffer Overflow | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | [4.0.0,4.4.8)[5.0.0,5.2.4) |
| Out-of-bounds Write | |
| Out-of-Bounds | [,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3) |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | [,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3) |
| CVE-2009-3293 | |
| Out-of-Bounds | |
| CVE-2001-1385 | |
| Access Restriction Bypass | |
| Double Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | [4.0.0,4.4.8)[5.0.0,5.2.4) |
| Symlink Attack | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-bounds Read | [,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1) |
| Out-of-Bounds | [4.0.0,4.4.5)[5.0.0,5.2.1) |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-bounds Write | [7.3.0,7.3.16)[7.4.0,7.4.4) |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Buffer Overflow | |
| Out-of-bounds Read | [7.2.0,7.2.27)[7.3.0,7.3.14) |
| Out-of-Bounds | [,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3) |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Out-of-bounds Write | [,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14) |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Use of Insecure Cookies | [7.2.0,7.2.34)[7.3.0,7.3.23)[7.4.0,7.4.11) |
| Denial of Service (DoS) | |
| Improper Input Validation | [4.0.0,4.4.5)[5.0.0,5.2.1) |
| Out-of-Bounds | |
| Out-of-bounds Write | |