| Memory Leak | |
| Memory Leak | |
| Out-of-bounds Read | |
| CVE-2022-3080 | |
| Memory Leak | |
| CVE-2022-2795 | |
| HTTP Request Smuggling | |
| Improper Resource Shutdown or Release | |
| CVE-2021-25219 | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Buffer Overflow | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Reachable Assertion | |
| Improper Input Validation | |
| Reachable Assertion | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Resource Exhaustion | |
| Reachable Assertion | |
| Resource Exhaustion | |
| Reachable Assertion | |
| Insufficient Verification of Data Authenticity | |
| Race Condition | |
| Reachable Assertion | |
| Allocation of Resources Without Limits or Throttling | |
| Missing Release of Resource after Effective Lifetime | |
| Incorrect Permission Assignment for Critical Resource | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Information Exposure | |
| Reachable Assertion | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |