| CVE-2025-8677 |  | 
| CVE-2025-40780 |  | 
| CVE-2025-40778 |  | 
| CVE-2025-40777 |  | 
| CVE-2025-40775 |  | 
| CVE-2024-11187 |  | 
| CVE-2024-12705 |  | 
| CVE-2024-1975 |  | 
| CVE-2024-4076 |  | 
| CVE-2024-0760 |  | 
| CVE-2024-1737 |  | 
| CVE-2023-50868 |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| CVE-2023-4408 |  | 
| Reachable Assertion |  | 
| CVE-2023-5679 |  | 
| Out-of-bounds Write |  | 
| Reachable Assertion |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Out-of-bounds Write |  | 
| Reachable Assertion |  | 
| Use After Free |  | 
| CVE-2022-3736 |  | 
| Memory Leak |  | 
| Memory Leak |  | 
| Memory Leak |  | 
| CVE-2022-2795 |  | 
| CVE-2022-3080 |  | 
| Out-of-bounds Read |  | 
| Reachable Assertion |  | 
| Reachable Assertion |  | 
| Reachable Assertion |  | 
| Improper Resource Shutdown or Release |  | 
| HTTP Request Smuggling |  | 
| CVE-2021-25219 |  | 
| Reachable Assertion |  | 
| Reachable Assertion |  | 
| Reachable Assertion |  | 
| Buffer Overflow |  | 
| Improper Privilege Management |  | 
| Reachable Assertion |  | 
| Improper Privilege Management |  | 
| Improper Input Validation |  | 
| Reachable Assertion |  | 
| Improper Resource Shutdown or Release |  | 
| Reachable Assertion |  | 
| Reachable Assertion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Race Condition |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Incorrect Authorization |  | 
| Reachable Assertion |  | 
| Use After Free |  | 
| Reachable Assertion |  | 
| Reachable Assertion |  | 
| NULL Pointer Dereference |  | 
| Reachable Assertion |  | 
| Improper Input Validation |  | 
| CVE-2017-3143 |  | 
| Information Exposure |  | 
| Reachable Assertion |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Reachable Assertion |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Data Handling |  | 
| Code |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| CVE-2013-4854 |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Numeric Errors |  | 
| CVE-2012-4244 |  | 
| Improper Input Validation |  | 
| Numeric Errors |  | 
| CVE-2012-1033 |  | 
| CVE-2011-4313 |  | 
| CVE-2011-2465 |  | 
| CVE-2011-2464 |  | 
| Numeric Errors |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Improper Data Handling |  | 
| CVE-2010-0290 |  | 
| CVE-2010-0382 |  | 
| Improper Input Validation |  | 
| CVE-2009-4022 |  | 
| Configuration |  | 
| Improper Authentication |  | 
| Insufficient Entropy |  | 
| CVE-2007-2925 |  | 
| CVE-2007-2926 |  | 
| CVE-2007-2241 |  | 
| CVE-2007-0493 |  | 
| Improper Data Handling |  | 
| CVE-2006-4096 |  | 
| CVE-2006-4095 |  | 
| CVE-2006-2073 |  | 
| CVE-2006-0987 |  | 
| CVE-2005-0034 |  |