Use After Free
| |
XML External Entity (XXE) Injection
| |
Race Condition
| |
Authentication Bypass by Primary Weakness
| |
Uncontrolled Recursion
| |
Improper Input Validation
| |
Improper Input Validation
| |
Resource Exhaustion
| |
Directory Traversal
| |
Incorrect Type Conversion or Cast
| |
Arbitrary Code Injection
| |
Unchecked Return Value
| |
Resource Exhaustion
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Improper Input Validation
| |
Improper Input Validation
| |
Protection Mechanism Failure
| |
Improper Neutralization of Special Elements
| |
Resource Exhaustion
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Buffer Overflow
| |
HTTP Request Smuggling
| |
Eval Injection
| |
Improper Input Validation
| |
HTTP Response Splitting
| |
HTTP Response Splitting
| |
Cross-site Scripting (XSS)
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
HTTP Response Splitting
| |
HTTP Response Splitting
| |
Exposed Dangerous Method or Function
| |
HTTP Response Splitting
| |
Improper Input Validation
| |
Improper Input Validation
| |
Heap-based Buffer Overflow
| |
Encoding Error
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Insufficient Verification of Data Authenticity
| |
Improper Handling of Highly Compressed Data (Data Amplification)
| |
Improper Validation of Array Index
| |
Encoding Error
| |
Improper Initialization
| |
Cryptographic Issues
| |
Information Exposure
| |
Out-of-Bounds
| |