Improper Input Validation | |
Out-of-bounds Write | |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') | |
Uncontrolled Recursion | |
Denial of Service (DoS) | |
Expired Pointer Dereference | |
Uncontrolled Recursion | |
Reachable Assertion | |
Use After Free | |
Buffer Over-read | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Improper Handling of Structural Elements | |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
Heap-based Buffer Overflow | |
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') | |
Information Exposure | |
Buffer Overflow | |
Denial of Service (DoS) | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Buffer Overflow | |
Out-of-bounds Write | |
Improper Input Validation | [,3.1.22)[3.2.0,3.2.4)[3.3.0.0,3.3.0.2) |
Denial of Service (DoS) | [2.6.stable1,2.6.stable11] |
Memory Leak | |
Denial of Service (DoS) | |
Improper Input Validation | |
Arbitrary Code Injection | |
Denial of Service (DoS) | [,3.1.15)[3.2.0.0,3.2.0.11) |
Integer Overflow or Wraparound | [3.0,3.5.28][4.0,4.11)[5.0,5.0.2) |
Improper Data Handling | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2005-1345 | [2.5.stable1,2.5.stable9] |
Integer Overflow or Wraparound | |
Cross-site Request Forgery (CSRF) | [2.0,2.7][3.0,3.5.28][4.0,4.9) |
Out-of-bounds Write | |
HTTP Request Smuggling | [2.0,2.7)[3.1,3.5.28][4.0,4.12)[5.0,5.0.3) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
HTTP Request Smuggling | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Synchronization | |
Improper Input Validation | |
CVE-2005-0174 | |
Improper Input Validation | |
Improper Input Validation | |
Denial of Service (DoS) | [2.0,2.7.STABLE8)[3.0,3.0.STABLE24) |
NULL Pointer Dereference | |
Privilege Escalation | |
Insufficient Verification of Data Authenticity | |
Improper Input Validation | |
Information Exposure | |
Information Exposure | [2.0,2.7][3.0,3.5.28][4.0,4.8) |
Out-of-Bounds | |
Denial of Service (DoS) | |
Memory Leak | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
CVE-2005-0175 | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Information Exposure | |
Information Exposure | [2.0,2.7][3.0,3.5.28][4.0,4.9) |
Memory Leak | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | [,3.1.8)[3.2.0.0,3.2.0.2) |
Insufficient Verification of Data Authenticity | |
CVE-2005-0626 | [2.5.stable5,2.5.stable7] |
Denial of Service (DoS) | |
Improper Input Validation | [,3.2.14)[3.3.0,3.3.14)[3.4.0,3.4.13)[3.5.0,3.5.4) |
Improper Input Validation | |
CRLF Injection | |
Access Restriction Bypass | [2.5.stable1,2.5.stable7] |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Input Validation | |
Denial of Service (DoS) | |
Resource Management Errors | [2.6.stable1,2.6.stable6] |
CVE-2005-1711 | |
HTTP Request Smuggling | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Missing Authentication | |
Denial of Service (DoS) | |
HTTP Request Smuggling | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Improper Data Handling | |
Out-of-Bounds | [2.5.stable1,2.5.stable6] |
Improper Input Validation | |
NULL Pointer Dereference | [3.1,3.5.28][4.0,4.12)[5.0,5.0.3) |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |