Integer Overflow or Wraparound | |
Improper Locking | |
Information Exposure | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Improper Resource Locking | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Use After Free | |
Access of Uninitialized Pointer | |
Stack-based Buffer Overflow | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Heap-based Buffer Overflow | |
Buffer Over-read | |
Buffer Over-read | |
Buffer Over-read | |
Use After Free | |
Improper Neutralization of Null Byte or NUL Character | |
Out-of-bounds Write | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Out-of-Bounds Write | |
Improper Restriction of Operations within the Bounds of a Memory Buffer | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-Bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Buffer Overflow | |
Missing Release of Memory after Effective Lifetime | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Race Condition | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Heap-based Buffer Overflow | |
Out-of-Bounds | |
Access Restriction Bypass | |
Integer Underflow | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Integer Underflow | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Improper Input Validation | |
Integer Underflow | |
Symlink Attack | |
Information Exposure | |
Out-of-Bounds | |
Improper Input Validation | |
Divide By Zero | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Write | |
Integer Underflow | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Initialization | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Heap-based Buffer Overflow | |
Allocation of Resources Without Limits or Throttling | |
Resource Management Errors | |
Out-of-bounds Write | |
Heap-based Buffer Overflow | |