Uncontrolled Recursion
| |
Allocation of Resources Without Limits or Throttling
| |
Authentication Bypass
| |
Improper Input Validation
| |
Use After Free
| |
Missing Release of Resource after Effective Lifetime
| |
Privilege Chaining
| |
Incorrect Privilege Assignment
| |
Improper Authorization
| |
Out-of-Bounds
| |
Memory Leak
| |
Allocation of Resources Without Limits or Throttling
| |
Allocation of Resources Without Limits or Throttling
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Deserialization of Untrusted Data
| |
Out-of-Bounds
| |
CVE-2012-1101
| |
Race Condition
| |
CVE-2018-6954
| |
Link Following
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Improper Input Validation
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Link Following
| |
Link Following
| |
CVE-2013-4393
| |
Integer Overflow or Wraparound
| |
Incorrect Default Permissions
| |
CVE-2013-4327
| |
Race Condition
| |