| CVE-2022-37660 | |
| Uncontrolled Search Path Element | |
| Improper Authentication | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | |
| CVE-2021-27803 | |
| Out-of-bounds Write | |
| Incorrect Default Permissions | |
| Insufficient Entropy | |
| Improper Input Validation | <2:2.9+git20200213+877d9a0-1 |
| Improper Input Validation | |
| Origin Validation Error | |
| Information Exposure | |
| NULL Pointer Dereference | <2:2.7+git20190128+0c1e29f-5 |
| Improper Authentication | <2:2.7+git20190128+0c1e29f-4 |
| Information Exposure | <2:2.7+git20190128+0c1e29f-4 |
| Use of a Broken or Risky Cryptographic Algorithm | <2:2.7+git20190128+0c1e29f-4 |
| Improper Authentication | <2:2.7+git20190128+0c1e29f-4 |
| Improper Authentication | <2:2.7+git20190128+0c1e29f-4 |
| Improper Authentication | <2:2.7+git20190128+0c1e29f-4 |
| Insufficient Entropy in PRNG | |
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Improper Data Handling | |
| Improper Input Validation | |
| Information Exposure | |
| Numeric Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2015-4146 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |