| Integer Overflow or Wraparound | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Read | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Locking | |
| CVE-2022-49737 | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Access of Uninitialized Pointer | |
| Heap-based Buffer Overflow | |
| CVE-2024-31082 | |
| Buffer Over-read | |
| Use After Free | |
| Buffer Over-read | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Heap-based Buffer Overflow | |
| CVE-2024-0408 | |
| Out-of-bounds Write | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Read | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Use After Free | |
| Improper Resource Shutdown or Release | |
| Out-of-Bounds | |
| Improper Resource Shutdown or Release | |
| Out-of-bounds Write | |
| Improper Protection for Out of Bounds Signal Level Alerts | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Integer Underflow | |
| Heap-based Buffer Overflow | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Improper Initialization | |
| Incorrect Authorization | |
| Information Exposure | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Privilege Management | |
| Improper Initialization | |
| Out-of-Bounds | |
| Divide By Zero | |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| CVE-2014-8091 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2014-8093 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2014-8092 | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Link Following | |
| Race Condition | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Numeric Errors | |
| Numeric Errors | |
| Numeric Errors | |
| Numeric Errors | |
| Numeric Errors | |
| Out-of-Bounds | |
| Information Exposure | |
| CVE-2007-5760 | |
| CVE-2007-6428 | |
| Out-of-bounds Write | |
| CVE-2007-3920 | |
| Out-of-Bounds | |
| CVE-2007-2437 | |
| CVE-2007-1003 | |
| CVE-2006-6102 | |
| CVE-2006-6103 | |
| CVE-2006-6101 | |
| CVE-2006-4447 | |
| CVE-2006-1526 | |
| CVE-2006-0745 | |