In general, that means "we found a bug, it causes crashes. A clever person might be able to turn it into something even more powerful but we don't have the time to study it ourselves".
Yes, it means buffer overread. Yes, it means a UAF. It also means a refcount overflow, and a double-free, and a (insert your class of bug here). The reason for this is that many bugs are first found because they cause crashes due to messing with memory. An innocent, accidentally found bug, or one found with dynamic analysis (fuzzing) won't just happen to come out with a perfectly formed code execution exploit, complete with shellcode and printf("w00t w00t\n");. It often takes a lot of work to turn a bug that causes a crash into something that causes such predictable memory corruption that it hijacks the program in a way you want. So as a result, they're almost all "crashes, that might, with effort, be able to be used for code exec".
If you are asking from a defender's point of view, it means "this is a severe arbitrary code execution vulnerability so fix it NOW".
If you're asking from a vendor's point of view, it means "aw, it's nothing, just a little crash, nothing to see here folks btw quick someone get me PR department".