| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Buffer Overflow | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Reachable Assertion | |
| Improper Input Validation | |
| Reachable Assertion | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Resource Exhaustion | |
| Reachable Assertion | |
| Resource Exhaustion | |
| Reachable Assertion | |
| Insufficient Verification of Data Authenticity | |
| Race Condition | |
| Reachable Assertion | |
| Allocation of Resources Without Limits or Throttling | |
| Missing Release of Resource after Effective Lifetime | |
| Incorrect Permission Assignment for Critical Resource | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Information Exposure | |
| Reachable Assertion | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |