| Inclusion of Functionality from Untrusted Control Sphere | |
| Incorrect Authorization | |
| Privilege Context Switching Error | |
| Privilege Escalation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Double Free | |
| Improper Access Control | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Symlink Attack | |
| Arbitrary Code Execution | |
| CVE-2006-0151 | |
| Exposure of Sensitive System Information to an Unauthorized Control Sphere | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Off-by-one Error | [1.8.2,1.8.32)[1.9.0,1.9.5) |
| CVE-2004-1051 | |
| Symlink Attack | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | [,1.6.9p21)[1.7.0,1.7.2p4) |
| Out-of-bounds Write | |
| CVE-2010-2956 | |
| Access Restriction Bypass | |
| Improper Handling of Exceptional Conditions | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Use of Externally-Controlled Format String | |
| Symlink Attack | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Access Restriction Bypass | [1.3.5,1.7.10p6)[1.8.0,1.8.6p7) |
| Information Exposure | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | [,1.7.9p1)[1.8.0,1.8.4p5) |
| Arbitrary Command Injection | |
| CVE-1999-0958 | |
| CVE-2005-1993 | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Access Restriction Bypass | [1.3.5,1.7.10p6)[1.8.0,1.8.6p7) |
| Improper Input Validation | |