Link Following | |
Insufficient Verification of Data Authenticity | |
Reachable Assertion | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Double Free | |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-Bounds | |
CVE-2013-6051 | |
Out-of-Bounds | |
CVE-2012-1820 | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
CVE-2010-1674 | |
CVE-2010-2949 | |
Out-of-Bounds | |
CVE-2009-1572 | |
CVE-2007-4826 | |
Improper Input Validation | |
Resource Management Errors | |
Improper Authentication | |
Improper Input Validation | |
Improper Input Validation | |
Resource Management Errors | |