| Link Following | |
| Insufficient Verification of Data Authenticity | |
| Reachable Assertion | |
| Out-of-Bounds | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Double Free | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| CVE-2013-6051 | |
| Out-of-Bounds | |
| CVE-2012-1820 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2010-1674 | |
| CVE-2010-2949 | |
| Out-of-Bounds | |
| CVE-2009-1572 | |
| CVE-2007-4826 | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Authentication | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |