| CVE-2025-8677 | |
| CVE-2025-40780 | |
| CVE-2025-40778 | |
| CVE-2025-40777 | |
| CVE-2025-40775 | |
| CVE-2024-11187 | |
| CVE-2024-12705 | |
| CVE-2024-1975 | |
| CVE-2024-4076 | |
| CVE-2024-0760 | |
| CVE-2024-1737 | |
| CVE-2023-50868 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2023-4408 | |
| Reachable Assertion | |
| CVE-2023-5679 | |
| Out-of-bounds Write | |
| Reachable Assertion | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-bounds Write | |
| Reachable Assertion | |
| Use After Free | |
| CVE-2022-3736 | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| CVE-2022-2795 | |
| CVE-2022-3080 | |
| Out-of-bounds Read | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Improper Resource Shutdown or Release | |
| HTTP Request Smuggling | |
| CVE-2021-25219 | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Buffer Overflow | |
| Improper Privilege Management | |
| Reachable Assertion | |
| Improper Privilege Management | |
| Improper Input Validation | |
| Reachable Assertion | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Reachable Assertion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Race Condition | |
| Allocation of Resources Without Limits or Throttling | |
| Missing Release of Resource after Effective Lifetime | |
| Incorrect Permission Assignment for Critical Resource | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Incorrect Authorization | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Reachable Assertion | |
| NULL Pointer Dereference | |
| Reachable Assertion | |
| Improper Input Validation | |
| CVE-2017-3143 | |
| Information Exposure | |
| Reachable Assertion | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Reachable Assertion | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Data Handling | |
| Code | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| CVE-2013-4854 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Numeric Errors | |
| CVE-2012-4244 | |
| Improper Input Validation | |
| Numeric Errors | |
| CVE-2012-1033 | |
| CVE-2011-4313 | |
| CVE-2011-2465 | |
| CVE-2011-2464 | |
| Numeric Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Data Handling | |
| CVE-2010-0290 | |
| CVE-2010-0382 | |
| Improper Input Validation | |
| CVE-2009-4022 | |
| Configuration | |
| Improper Authentication | |
| Insufficient Entropy | |
| CVE-2007-2925 | |
| CVE-2007-2926 | |
| CVE-2007-2241 | |
| CVE-2007-0493 | |
| Improper Data Handling | |
| CVE-2006-4096 | |
| CVE-2006-4095 | |
| CVE-2006-2073 | |
| CVE-2006-0987 | |
| CVE-2005-0034 | |