Heap-based Buffer Overflow | |
CVE-2024-31082 | |
Buffer Over-read | |
Buffer Over-read | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Out-of-bounds Write | |
CVE-2024-0408 | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Use After Free | |
Improper Resource Shutdown or Release | |
Out-of-Bounds | |
Improper Resource Shutdown or Release | |
Out-of-bounds Write | |
Improper Protection for Out of Bounds Signal Level Alerts | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Integer Underflow | |
Heap-based Buffer Overflow | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Improper Initialization | |
Incorrect Authorization | |
Information Exposure | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Privilege Management | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Initialization | |
Divide By Zero | |
Access Restriction Bypass | |
Information Exposure | |
CVE-2014-8093 | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
CVE-2014-8091 | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2014-8092 | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Numeric Errors | |
Resource Management Errors | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
Link Following | |
Race Condition | |
Improper Input Validation | |
Access Restriction Bypass | |
Numeric Errors | |
Numeric Errors | |
Numeric Errors | |
Numeric Errors | |
Numeric Errors | |
Numeric Errors | |
CVE-2007-5760 | |
Out-of-Bounds | |
CVE-2007-6428 | |
Out-of-bounds Write | |
Information Exposure | |
CVE-2007-3920 | |
Out-of-Bounds | |
CVE-2007-2437 | |
CVE-2007-1003 | |
CVE-2006-6101 | |
CVE-2006-6102 | |
CVE-2006-6103 | |
CVE-2006-4447 | |
CVE-2006-1526 | |
CVE-2006-0745 | |