| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Heap-based Buffer Overflow | |
| Object Model Violation: Just One of Equals and Hashcode Defined | |
| CVE-2025-53066 | |
| Inappropriate Encoding for Output Context | |
| Heap-based Buffer Overflow | |
| Information Exposure | |
| Heap-based Buffer Overflow | |
| Missing Required Cryptographic Step | |
| Heap-based Buffer Overflow | |
| Buffer Overflow | |
| Information Exposure | |
| Signed to Unsigned Conversion Error | |
| Signed to Unsigned Conversion Error | |
| Uncontrolled Memory Allocation | |
| Integer Overflow or Wraparound | |
| Improper Handling of Length Parameter Inconsistency | |
| CVE-2024-21147 | |
| Out-of-bounds Read | |
| CVE-2024-21140 | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| CVE-2024-21131 | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | |
| Improper Output Neutralization for Logs | |
| Reliance on Reverse DNS Resolution for a Security-Critical Action | |
| Improper Input Validation | |
| Covert Timing Channel | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Information Exposure Through Log Files | |
| Out-of-Bounds | |
| Improper Certificate Validation | |
| Out-of-Bounds | |