| CVE-2025-62291 | |
| Buffer Overflow | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Validation of Integrity Check Value | |
| Out-of-Bounds | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Weak Password Requirements | |
| Missing Initialization of Resource | |
| Out-of-bounds Write | |
| Improper Verification of Cryptographic Signature | |
| Improper Data Handling | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Access Restriction Bypass | |
| Information Exposure | |
| Improper Data Handling | |
| CVE-2014-2891 | |
| Improper Authentication | |
| Out-of-Bounds | |
| CVE-2013-6076 | |
| Out-of-Bounds | |
| Improper Authentication | |
| Improper Authentication | |
| Arbitrary Code Injection | |
| Cryptographic Issues | |
| Improper Input Validation | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Input Validation | |
| Resource Management Errors | |