| Allocation of Resources Without Limits or Throttling | |
| CVE-2023-50868 | |
| CVE-2023-7008 | |
| Improper Validation of Integrity Check Value | |
| Improper Validation of Integrity Check Value | |
| Improper Validation of Integrity Check Value | |
| CVE-2023-26604 | |
| CVE-2022-4415 | |
| Off-by-one Error | |
| Use After Free | |
| Uncontrolled Recursion | |
| Allocation of Resources Without Limits or Throttling | |
| Authentication Bypass | |
| Use After Free | |
| Missing Release of Resource after Effective Lifetime | |
| CVE-2019-15718 | |
| Incorrect Privilege Assignment | |
| Privilege Chaining | |
| Improper Authorization | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Race Condition | |
| Deserialization of Untrusted Data | |
| Out-of-Bounds | |
| CVE-2012-1101 | |
| Race Condition | |
| CVE-2018-6954 | |
| Link Following | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Link Following | |
| Integer Overflow or Wraparound | |
| CVE-2013-4393 | |
| Incorrect Default Permissions | |
| Link Following | |
| CVE-2013-4327 | |
| Race Condition | |