Improper Resource Shutdown or Release | |
Reachable Assertion | |
Reachable Assertion | |
Resource Exhaustion | |
Allocation of Resources Without Limits or Throttling | |
Incorrect Permission Assignment for Critical Resource | |
Use of a Broken or Risky Cryptographic Algorithm | |
Incorrect Authorization | |
Reachable Assertion | |
Use After Free | |
Reachable Assertion | |
Reachable Assertion | |
NULL Pointer Dereference | |
Reachable Assertion | |
Improper Input Validation | |
CVE-2017-3143 | |
Reachable Assertion | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Reachable Assertion | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Data Handling | |
Code | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2013-4854 | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Numeric Errors | |
CVE-2012-4244 | |
Improper Input Validation | |
Numeric Errors | |
CVE-2012-1033 | |
CVE-2011-4313 | |
CVE-2011-2465 | |
CVE-2011-2464 | |
Numeric Errors | |
Resource Management Errors | |
Resource Management Errors | |
Improper Input Validation | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Data Handling | |
Improper Input Validation | |
CVE-2010-0290 | |
CVE-2010-0382 | |
CVE-2009-4022 | |
Configuration | |
Improper Authentication | |
Insufficient Entropy | |
CVE-2007-2925 | |
CVE-2007-2926 | |
CVE-2007-2241 | |
CVE-2007-0493 | |
Improper Data Handling | |
CVE-2006-4096 | |
CVE-2006-4095 | |
CVE-2006-2073 | |
CVE-2006-0987 | |
CVE-2005-0034 | |