| Race Condition | |
| CVE-2023-26604 | |
| Use After Free | |
| Resource Exhaustion | |
| Execution with Unnecessary Privileges | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Memory Leak | |
| Race Condition | |
| Reachable Assertion | |
| Incorrect Check of Function Return Value | |
| Improper Input Validation | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Incorrect Calculation of Buffer Size | |
| CVE-2023-26604 | |
| Information Exposure | |
| Deadlock | |
| Off-by-one Error | |
| Use After Free | |
| Uncontrolled Recursion | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Execution with Unnecessary Privileges | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Resource Exhaustion | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Incorrect Check of Function Return Value | |
| Expected Behavior Violation | |
| Incorrect Authorization | |
| Link Following | |
| Time-of-check Time-of-use (TOCTOU) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| Missing Authentication for Critical Function | |
| Time-of-check Time-of-use (TOCTOU) | |