CVE-2024-4317
| |
Integer Overflow or Wraparound
| |
Function Call With Incorrect Argument Type
| |
Resource Exhaustion
| |
Buffer Overflow
| |
SQL Injection
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Incomplete Cleanup
| |
Insufficiently Protected Credentials
| |
SQL Injection
| |
Improper Initialization
| |
Improper Authentication
| |
Insufficiently Protected Credentials
| |
Integer Overflow or Wraparound
| |
Incorrect Calculation of Buffer Size
| |
Incorrect Calculation of Buffer Size
| |
Information Exposure
| |
Unchecked Error Condition
| |
Use After Free
| |
Improper Synchronization
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Improper Synchronization
| |
Integer Overflow or Wraparound
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
SQL Injection
| |
Information Exposure
| |
Out-of-bounds Read
| |
Permissive Whitelist
| |
Improper Input Validation
| |
SQL Injection
| |
Improper Input Validation
| |
Missing Authorization
| |
Improper Authorization
| |
Link Following
| |
Link Following
| |
Improper Input Validation
| |
Untrusted Pointer Dereference
| |
Incorrect Authorization
| |