| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Reachable Assertion | |
| Reachable Assertion | |
| Use After Free | |
| Incorrect Calculation | |
| Off-by-one Error | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| SQL Injection | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Reachable Assertion | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Handling of Length Parameter Inconsistency | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Read | |
| Integer Underflow | |
| Release of Invalid Pointer or Reference | |
| Reachable Assertion | |
| Release of Invalid Pointer or Reference | |
| Reachable Assertion | |
| Reachable Assertion | |
| Improper Access Control | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Validation of Certificate with Host Mismatch | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |