| Integer Overflow or Wraparound | |
| Heap-based Buffer Overflow | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Buffer Underflow | |
| Off-by-one Error | |
| Improper Verification of Source of a Communication Channel | |
| Buffer Underflow | |
| Off-by-one Error | |
| Improper Verification of Source of a Communication Channel | |
| Buffer Underflow | |
| Off-by-one Error | |
| Improper Verification of Source of a Communication Channel | |
| Buffer Underflow | |
| Off-by-one Error | |
| Improper Verification of Source of a Communication Channel | |
| Buffer Underflow | |
| Off-by-one Error | |
| Improper Verification of Source of a Communication Channel | |
| Buffer Underflow | |
| Off-by-one Error | |
| Improper Verification of Source of a Communication Channel | |
| Buffer Underflow | |
| Off-by-one Error | |
| Improper Verification of Source of a Communication Channel | |
| Buffer Underflow | |
| Integer Overflow or Wraparound | |
| Off-by-one Error | |
| Improper Verification of Source of a Communication Channel | |
| CVE-2022-32816 | |
| CVE-2022-32816 | |
| CVE-2022-32816 | |
| CVE-2022-32816 | |
| CVE-2022-32816 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Resource Exhaustion | |
| Deserialization of Untrusted Data | |
| Resource Exhaustion | |
| Deserialization of Untrusted Data | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Missing Authorization | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |
| Not Failing Securely ('Failing Open') | |