| CVE-2025-30232 |  | 
| CVE-2023-42117 |  | 
| CVE-2023-42119 |  | 
| CVE-2023-42115 |  | 
| Insufficient Verification of Data Authenticity |  | 
| CVE-2024-39929 |  | 
| Out-of-bounds Read |  | 
| CVE-2023-42116 |  | 
| CVE-2023-42114 |  | 
| Integer Overflow or Wraparound |  | 
| CVE-2020-28015 |  | 
| Arbitrary Argument Injection |  | 
| Improper Privilege Management |  | 
| Out-of-Bounds |  | 
| CVE-2020-28021 |  | 
| Improper Privilege Management |  | 
| Improper Initialization |  | 
| Out-of-bounds Read |  | 
| CVE-2019-15846 |  | 
| Improper Data Handling |  | 
| Out-of-bounds Write |  | 
| Integer Overflow or Wraparound |  | 
| Link Following |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| CVE-2020-28014 |  | 
| Out-of-bounds Read |  | 
| Buffer Overflow |  | 
| Improper Input Validation |  | 
| Improper Resource Shutdown or Release |  | 
| Integer Overflow or Wraparound |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Exposure of Resource to Wrong Sphere |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  |