| Race Condition | |
| Race Condition | |
| CVE-2023-26604 | |
| Information Exposure | |
| Off-by-one Error | |
| CVE-2023-26604 | |
| Information Exposure | |
| Off-by-one Error | |
| CVE-2023-26604 | |
| Information Exposure | |
| Off-by-one Error | |
| CVE-2023-26604 | |
| Information Exposure | |
| Off-by-one Error | |
| Man-in-the-Middle (MitM) | |
| Resource Exhaustion | |
| CVE-2023-26604 | |
| CVE-2023-26604 | |
| CVE-2023-26604 | |
| CVE-2023-26604 | |
| CVE-2023-26604 | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Off-by-one Error | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Out-of-bounds Write | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Privilege Chaining | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |