| Missing Authorization | |
| Improper Handling of Exceptional Conditions | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2020-11742 | |
| Improper Input Validation | |
| Memory Leak | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Race Condition | |
| Out-of-Bounds | |
| Incorrect Calculation | |
| Improper Input Validation | |
| CVE-2019-11135 | |
| Improper Input Validation | |
| Race Condition | |
| Incorrect Permission Assignment for Critical Resource | |
| Use of Externally-Controlled Format String | |
| OS Command Injection | |
| Off-by-one Error | |
| Improper Privilege Management | |
| Race Condition | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Input Validation | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Information Exposure | |
| CVE-2019-11091 | |
| Information Exposure | |
| Information Exposure | |
| Incomplete Cleanup | |
| Information Exposure | |
| Improper Input Validation | |
| CVE-2018-19965 | |
| Interpretation Conflict | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| CVE-2018-3646 | |
| Information Exposure | |
| CVE-2018-12891 | |
| CVE-2018-12893 | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Information Exposure | |
| Information Exposure | |
| CVE-2018-10982 | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Race Condition | |
| Information Exposure | |
| Out-of-bounds Write | |
| CVE-2018-7541 | |
| Resource Exhaustion | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2017-17566 | |
| Improper Input Validation | |
| Error Handling | |
| Information Exposure | |
| Improper Check for Unusual or Exceptional Conditions | |
| Use After Free | |
| Out-of-Bounds | |
| Resource Exhaustion | |
| CVE-2017-15594 | |
| CVE-2017-15590 | |
| Exposure of Resource to Wrong Sphere | |
| Information Exposure | |
| Resource Exhaustion | |
| Race Condition | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Out-of-bounds Read | |
| Race Condition | |
| CVE-2017-14319 | |
| Buffer Overflow | |
| Incorrect Calculation | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2017-10913 | |
| NULL Pointer Dereference | |
| Race Condition | |
| Race Condition | |
| CVE-2017-10912 | |
| Resource Exhaustion | |
| CVE-2017-10919 | |
| Improper Input Validation | |
| CVE-2017-8903 | |
| Incorrect Calculation | |
| CVE-2017-8904 | |
| Information Exposure | |
| Improper Validation of Array Index | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Information Exposure | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Race Condition | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Use After Free | |
| Improper Access Control | |
| CVE-2016-5242 | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Resource Exhaustion | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Improper Access Control | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| CVE-2016-2271 | |
| Improper Input Validation | |
| Code | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Data Handling | |
| Code | |
| Security Features | |
| Security Features | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Data Handling | |
| Resource Management Errors | |
| Code | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| CVE-2015-4163 | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Incorrect Authorization | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Code | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Information Exposure | |
| Information Exposure | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2015-0361 | |
| Code | |
| Code | |
| Code | |
| Code | |
| Improper Input Validation | |
| Improper Input Validation | |
| Code | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Race Condition | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| CVE-2014-3968 | |
| CVE-2014-3967 | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2013-4369 | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Information Exposure | |
| Access Restriction Bypass | |
| Buffer Overflow | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Numeric Errors | |
| CVE-2013-2196 | |
| Numeric Errors | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2013-0153 | |
| Configuration | |
| Buffer Overflow | |
| CVE-2012-5514 | |
| Resource Management Errors | |
| Improper Input Validation | |
| Configuration | |
| CVE-2012-5510 | |
| CVE-2012-5515 | |
| Out-of-Bounds | |
| Resource Management Errors | |
| CVE-2012-0218 | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
| Access Restriction Bypass | |
| CVE-2012-2934 | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
| Resource Management Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Numeric Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Configuration | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Configuration | |
| CVE-2012-4536 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
| Out-of-Bounds | <4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 |
| Resource Management Errors | |
| Numeric Errors | |
| Access Restriction Bypass | |
| CVE-2010-4255 | |
| Resource Management Errors | |