| Buffer Access with Incorrect Length Value | |
| Improper Privilege Management | |
| LDAP Injection | |
| Information Exposure | |
| Improper Input Validation | |
| Memory Leak | |
| Access Restriction Bypass | |
| OS Command Injection | |
| Files or Directories Accessible to External Parties | |
| Improper Privilege Management | |
| Race Condition | |
| LDAP Injection | |
| OS Command Injection | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Memory Leak | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Files or Directories Accessible to External Parties | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |