| Unchecked Return Value | |
| CVE-2025-40363 | |
| Logging of Excessive Data | |
| CVE-2025-40319 | |
| Detection of Error Condition Without Action | |
| Race Condition | |
| Out-of-bounds Write | |
| Improper Validation of Specified Index, Position, or Offset in Input | |
| CVE-2025-40259 | |
| Deadlock | |
| Time-of-check Time-of-use (TOCTOU) | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Race Condition | |
| Improper Input Validation | |
| CVE-2025-68224 | |
| CVE-2025-68171 | |
| CVE-2025-68185 | |
| CVE-2025-68200 | |
| CVE-2025-68173 | |
| CVE-2025-40361 | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2025-40360 | |
| Expired Pointer Dereference | |
| Use After Free | |
| Time-of-check Time-of-use (TOCTOU) | |
| CVE-2025-68227 | |
| CVE-2025-40297 | |
| CVE-2025-68214 | |
| CVE-2025-40292 | |
| CVE-2025-68231 | |
| Missing Release of Resource after Effective Lifetime | |
| Expired Pointer Dereference | |
| Race Condition | |
| CVE-2025-40214 | |
| Integer Overflow or Wraparound | |
| Use of Uninitialized Resource | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| CVE-2025-40272 | |
| Use After Free | |
| Race Condition | |
| Time-of-check Time-of-use (TOCTOU) | |
| CVE-2025-40324 | |
| Time-of-check Time-of-use (TOCTOU) | |
| Out-of-bounds Read | |
| CVE-2025-40313 | |
| Out-of-bounds Write | |
| CVE-2025-40281 | |
| Operation on a Resource after Expiration or Release | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| NULL Pointer Dereference | |