|
Link Following
| |
|
Insufficient Verification of Data Authenticity
| |
|
Reachable Assertion
| |
|
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
|
Double Free
| |
|
Out-of-Bounds
| |
|
Out-of-bounds Read
| |
|
Improper Input Validation
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Improper Input Validation
| |
|
Access Restriction Bypass
| |
|
Out-of-Bounds
| |
|
CVE-2013-6051
| |
|
Out-of-Bounds
| |
|
CVE-2012-1820
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Resource Management Errors
| |
|
Out-of-Bounds
| |
|
Resource Management Errors
| |
|
Out-of-Bounds
| |
|
Resource Management Errors
| |
|
Resource Management Errors
| |
|
CVE-2010-1674
| |
|
CVE-2010-2949
| |
|
Out-of-Bounds
| |
|
CVE-2009-1572
| |
|
CVE-2007-4826
| |
|
Improper Input Validation
| |
|
Resource Management Errors
| |
|
Improper Authentication
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Resource Management Errors
| |