| Use of Weak Hash | |
| Resource Exhaustion | |
| Improper Input Validation | |
| Improper Input Validation | |
| Missing Release of Memory after Effective Lifetime | |
| Resource Exhaustion | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Double Free | |
| CVE-2004-0971 | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Cryptographic Issues | |
| Improper Input Validation | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Cryptographic Issues | |
| Cryptographic Issues | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Buffer Overflow | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Buffer Overflow | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Buffer Overflow | |