Multiple memory corruptions, use-after-free, integer overflows, array index overflow, code execution, etc.
vulners.com/securityvulns/securityvulns:doc:24307
vulners.com/securityvulns/securityvulns:doc:24308
vulners.com/securityvulns/securityvulns:doc:24309
vulners.com/securityvulns/securityvulns:doc:24310
vulners.com/securityvulns/securityvulns:doc:24311
vulners.com/securityvulns/securityvulns:doc:24312
vulners.com/securityvulns/securityvulns:doc:24313
vulners.com/securityvulns/securityvulns:doc:24314
vulners.com/securityvulns/securityvulns:doc:24315
vulners.com/securityvulns/securityvulns:doc:24316
vulners.com/securityvulns/securityvulns:doc:24317
vulners.com/securityvulns/securityvulns:doc:24318
vulners.com/securityvulns/securityvulns:doc:24319
vulners.com/securityvulns/securityvulns:doc:24320
vulners.com/securityvulns/securityvulns:doc:24321
vulners.com/securityvulns/securityvulns:doc:24322
vulners.com/securityvulns/securityvulns:doc:24323
vulners.com/securityvulns/securityvulns:doc:24324
vulners.com/securityvulns/securityvulns:doc:24325
vulners.com/securityvulns/securityvulns:doc:24326
vulners.com/securityvulns/securityvulns:doc:24327
vulners.com/securityvulns/securityvulns:doc:24328