Arbitrary Code Injection
| |
Buffer Overflow
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
Credentials Management
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Double Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Resource Injection
| |
Improper Input Validation
| |
Double Free
| |
Credentials Management
| |
Out-of-bounds Read
| |
Heap-based Buffer Overflow
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
CVE-2018-1000007
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Information Exposure
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Improper Authentication
| |
Cryptographic Issues
| |
Improper Authorization
| |
Use After Free
| |
Improper Input Validation
| |
Improper Authentication
| |
Information Exposure
| |
Out-of-Bounds
| |
Access Restriction Bypass
| |
Improper Access Control
| |
Out-of-Bounds
| |
CVE-2014-8150
| |
Cryptographic Issues
| |
Cryptographic Issues
| |
Information Exposure
| |
Improper Authentication
| |
Cryptographic Issues
| |
Improper Authentication
| |
Improper Input Validation
| |
Cryptographic Issues
| |
Out-of-Bounds
| |
Information Exposure
| |
Out-of-Bounds
| |
SQL Injection
| |
Improper Input Validation
| |
Credentials Management
| |
Access Restriction Bypass
| |
Cryptographic Issues
| |
Cross-site Request Forgery (CSRF)
| |
CVE-2007-3564
| |
CVE-2006-1061
| |
Numeric Errors
| |
Out-of-Bounds
| |
CVE-2005-0490
| |