| Truncation of Security-relevant Information | |
| Arbitrary Code Injection | |
| CVE-2023-35812 | |
| Improper Check for Dropped Privileges | |
| Directory Traversal | |
| Improper Encoding or Escaping of Output | |
| Incorrect Authorization | |
| Race Condition | |
| Incorrect Permission Assignment for Critical Resource | |
| Improper Input Validation | |
| Key Management Errors | |
| Information Exposure | |
| Out-of-Bounds | |
| Untrusted Search Path | |
| Access Restriction Bypass | |
| Security Features | |
| CVE-2016-3115 | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| ALAS-2014-319 | |
| Improper Input Validation | |
| Numeric Errors | |