Integer Overflow or Wraparound | |
CVE-2023-50868 | |
Allocation of Resources Without Limits or Throttling | |
CVE-2023-28450 | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improperly Implemented Security Check for Standard | |
Heap-based Buffer Overflow | |
Authentication Bypass | |
Improperly Implemented Security Check for Standard | |
Improperly Implemented Security Check for Standard | |
Heap-based Buffer Overflow | |
Out-of-bounds Write | |
Heap-based Buffer Overflow | |
Improper Access Control | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Read | |
Improperly Implemented Security Check for Standard | |
Out-of-Bounds | |
Missing Release of Resource after Effective Lifetime | |
Improper Input Validation | |
Integer Underflow | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Data Handling | |
Improper Input Validation | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2008-3350 | |
Improper Input Validation | |
Insufficient Entropy | |
CVE-2006-2017 | |
CVE-2005-0876 | |
CVE-2005-0877 | |