Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | [,4.2.8p10)[4.3.0,4.3.94) |
Improper Input Validation | |
Use After Free | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Improper Input Validation | |
Improper Authentication | |
Improper Input Validation | |
CVE-2014-9293 | |
Improper Input Validation | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Improper Access Control | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | [,4.2.8p10)[4.3.0,4.3.94) |
NULL Pointer Dereference | |
Insecure Randomness | |
Out-of-Bounds | [,4.2.8p10)[4.3.0,4.3.94) |
Out-of-Bounds | [,4.2.8p10)[4.3.0,4.3.94) |
Improper Input Validation | [,4.2.8p10)[4.3.0,4.3.94) |
Out-of-bounds Write | |
Out-of-Bounds | |
Denial of Service (DoS) | |
CVE-2014-9294 | |
Improper Authentication | [4.2.0,4.2.8)[4.3.0,4.3.90) |
Out-of-Bounds | |
Improper Data Handling | |
Improper Authentication | [4.2.6,4.2.8)[4.3.0,4.3.77) |
Improper Access Control | |
Improper Input Validation | |
Memory Leak | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Code | |
Denial of Service (DoS) | |
Memory Leak | |
Improper Input Validation | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Improper Input Validation | [,4.2.8p10)[4.3.0,4.3.94) |
Out-of-Bounds | [,4.2.4p7)[4.2.0,4.2.5p74) |
Out-of-bounds Write | [4.0.0,4.2.8p12)[4.3.0,4.2.8p16) |
Race Condition | [4.2.0,4.2.8)[4.3.0,4.3.93) |
Resource Management Errors | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Improper Input Validation | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Improper Input Validation | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Improper Input Validation | |
Remote Code Execution (RCE) | [,4.2.8p10)[4.3.0,4.3.94) |
Improper Input Validation | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Improper Input Validation | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Integer Overflow or Wraparound | |
Directory Traversal | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Improper Input Validation | |
Improper Input Validation | |
Improper Authentication | [4.2.0,4.2.8)[4.3.0,4.3.93) |
Access Restriction Bypass | [4.2.0,4.2.8)[4.3.0,4.3.92) |
NULL Pointer Dereference | |
Buffer Overflow | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Denial of Service (DoS) | [4.2.0,4.2.8)[4.3.0,4.3.93) |
Security Features | |
NULL Pointer Dereference | |
Improper Data Handling | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Data Handling | |
Time and State | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [4.2.6,4.2.8)[4.3.0,4.3.94) |
Improper Input Validation | |
NULL Pointer Dereference | |
Incorrect Calculation | |
Improper Input Validation | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Improper Input Validation | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Source Code | |
Improper Input Validation | |
Denial of Service (DoS) | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Buffer Overflow | [4.2.0,4.2.8)[4.3.0,4.3.77) |
Code | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Code | |
Race Condition | [4.2.0,4.2.8)[4.3.0,4.3.93) |
Security Features | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Security Features | |