| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Link Following | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Link Following | |
| Link Following | |
| Link Following | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |