Unchecked Return Value | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Integer Overflow or Wraparound | |
Double Free | |
Information Exposure | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | [4.3,4.3.8)[4.4,4.4.5)[5.0,5.1.6)[6.0,6.1.2)[7.0,7.0.2) |
Buffer Overflow | |
Heap-based Buffer Overflow | |
Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Improper Validation of Array Index | |
Use After Free | |
Heap-based Buffer Overflow | |
Off-by-one Error | |
Heap-based Buffer Overflow | |
Integer Overflow or Wraparound | |
Integer Overflow to Buffer Overflow | |
Integer Overflow or Wraparound | |
Buffer Overflow | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Use After Free | [,4.4.3)[5.0,5.0.2)[5.1-dev,5.1.2) |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Heap-based Buffer Overflow | |
Buffer Overflow | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Buffer Overflow | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Buffer Overflow | |
Denial of Service (DoS) | |
Buffer Overflow | |
Buffer Overflow | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Divide By Zero | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Improper Input Validation | |
Out-of-bounds Write | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
Denial of Service (DoS) | |
Improper Input Validation | |
Memory Leak | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-bounds Read | |
Divide By Zero | |
Buffer Overflow | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Buffer Overflow | |
Out-of-Bounds | |
Unchecked Return Value | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Resource Management Errors | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Code | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Buffer Overflow | |
Code | |
Improper Input Validation | |
Denial of Service (DoS) | |
Buffer Overflow | |
Out-of-bounds Write | |
Memory Leak | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Input Validation | |
Integer Overflow or Wraparound | [,0.10.14)[1.1,1.1.12)[1.2,1.2.7)[2.0,2.0.5)[2.1,2.1.5)[2.2,2.2.4) |
Out-of-Bounds | |
CVE-2011-3944 | |
Resource Management Errors | |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2012-2792 | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Integer Underflow | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Memory Leak | |
Memory Leak | |
Out-of-Bounds | |
Code | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Unchecked Return Value | |
Use of Uninitialized Resource | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Buffer Overflow | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Memory Leak | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
Remote Code Execution (RCE) | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Buffer Overflow | |
Out-of-Bounds | |
CVE-2012-2785 | |
Out-of-Bounds | [,2.8.12)[3.0,3.0.8)[3.1,3.1.8)[3.2,3.2.5)[3.3,3.3.1) |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Divide By Zero | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Buffer Overflow | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-Bounds | |
Buffer Overflow | |
Memory Leak | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Divide By Zero | |
Race Condition | |
Out-of-bounds Read | |
Resource Management Errors | |
Buffer Overflow | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | [,2.8.12)[3.0,3.0.8)[3.1,3.1.8)[3.2,3.2.5)[3.3,3.3.1) |
Out-of-Bounds | |
Improper Input Validation | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
CVE-2011-3950 | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Memory Leak | |
NULL Pointer Dereference | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Buffer Overflow | |
Out-of-bounds Read | |
Improper Validation of Array Index | |
Out-of-Bounds | |
NULL Pointer Dereference | |
CVE-2012-2780 | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Double Free | |
Out-of-bounds Read | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Remote Code Execution (RCE) | |
Improper Data Handling | |
CVE-2013-0858 | |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | [,2.8.12)[3.0,3.1.9)[3.2,3.2.6)[3.3,3.3.2) |
Out-of-Bounds | |
Improper Input Validation | |
Improper Validation of Array Index | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Validation of Array Index | [,2.8.16)[3.2,3.2.15)[3.4,3.4.7)[4.0,4.0.5)[4.1,4.1.5) |
Out-of-bounds Write | |
Memory Leak | |
Resource Management Errors | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-Bounds | [,2.8.12)[3.0.0,3.0.8)[3.1.0,3.1.8)[3.2.0,3.2.5)[3.3.0,3.3.1) |
Use After Free | |
Memory Leak | |
Out-of-bounds Read | |
CVE-2012-2795 | |
Out-of-Bounds | |
CVE-2013-0870 | |
Divide By Zero | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Out-of-Bounds | |
Buffer Overflow | |
Buffer Overflow | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Input Validation | |
Unchecked Return Value | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Improper Input Validation | |
Out-of-Bounds | |
CVE-2012-2782 | |
Out-of-Bounds | |
Divide By Zero | |
Out-of-bounds Write | |
Improper Input Validation | |
NULL Pointer Dereference | [,3.4.7)[4.0,4.0.5)[4.1,4.1.5) |
Improper Input Validation | |
Out-of-Bounds | |
Code | |
Out-of-Bounds | |
Divide By Zero | |
Out-of-bounds Read | |
CVE-2012-2771 | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2012-2778 | |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Memory Leak | |
Out-of-Bounds | |
Integer Underflow | |
Resource Management Errors | |
Improper Input Validation | |
Buffer Overflow | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-bounds Write | |
CVE-2012-2781 | |
Improper Input Validation | |
Buffer Overflow | |
Out-of-bounds Read | |
Memory Leak | |
Denial of Service (DoS) | |
CVE-2021-3566 | |
Resource Management Errors | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-Bounds | |
CVE-2011-3949 | |
Memory Leak | |
Buffer Overflow | |
Denial of Service (DoS) | |
Memory Leak | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Memory Leak | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-Bounds | |
Information Exposure | |
CVE-2012-2773 | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Memory Leak | |
Out-of-Bounds | [,0.5.6)[0.5.0,0.5.7)[0.6.0,0.6.4)[0.6.0,0.6.4)[0.7.0,0.7.3)[0.7.0,0.7.9)[0.8.0,0.8.8) |
Denial of Service (DoS) | |
Out-of-Bounds | [,2.0.7)[2.2.0,2.2.15)[2.4.0,2.4.8)[2.5.0,2.5.6)[2.6.0,2.6.2)[10.0,10.7)[11.0,11.4) |
Out-of-Bounds | [,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11) |
CVE-2012-2783 | |
CVE-2012-2784 | |
CVE-2012-2788 | |
CVE-2012-2776 | |
CVE-2012-2787 | |
CVE-2012-2798 | |
Out-of-Bounds | |
Out-of-Bounds | [,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11) |
Denial of Service (DoS) | [,0.5.6)[0.5.0,0.5.7)[0.6.0,0.6.4)[0.6.0,0.6.4)[0.7.0,0.7.3)[0.7.0,0.7.9)[0.8.0,0.8.8) |
Resource Management Errors | [,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11) |
Out-of-Bounds | [,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11) |
CVE-2011-3937 | |
CVE-2012-2791 | |
CVE-2012-2794 | |
CVE-2012-2779 | |
CVE-2012-2801 | |
Out-of-Bounds | |
Improper Input Validation | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Out-of-Bounds | [,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11) |
CVE-2012-2772 | |
CVE-2012-2777 | |
CVE-2012-2775 | |
CVE-2012-2804 | |
Out-of-Bounds | |
Improper Input Validation | [,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11) |
Out-of-Bounds | |
Out-of-Bounds | [,0.5.6)[0.5.0,0.5.7)[0.6.0,0.6.4)[0.6.0,0.6.4)[0.7.0,0.7.3)[0.7.0,0.7.9)[0.8.0,0.8.8) |
Out-of-Bounds | [,0.5.6)[0.5.0,0.5.7)[0.6.0,0.6.4)[0.6.0,0.6.4)[0.7.0,0.7.3)[0.7.0,0.7.9)[0.8.0,0.8.8) |
Resource Management Errors | |
CVE-2012-2790 | |
CVE-2012-2800 | |
CVE-2012-2802 | |
CVE-2012-2786 | |
CVE-2012-2796 | |
CVE-2012-2797 | |
Improper Input Validation | [,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11) |
Out-of-Bounds | |
CVE-2012-2789 | |
NULL Pointer Dereference | |