Improper Authentication | |
Stack-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
CVE-2012-1820 | |
Stack-based Buffer Overflow | |
CVE-2010-1674 | |
Resource Management Errors | |
Stack-based Buffer Overflow | |
CVE-2010-2949 | |
Use After Free | |
Off-by-one Error | |
Improper Handling of Syntactically Invalid Structure | |
Improper Validation of Integrity Check Value | |
Allocation of Resources Without Limits or Throttling | |
Incorrect Calculation | |
Improper Input Validation | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Reachable Assertion | |