| CVE-2025-30722 | |
| CVE-2025-30693 | |
| Improper Resource Shutdown or Release | |
| Insecure Automated Optimizations | |
| Insecure Automated Optimizations | |
| CVE-2025-30722 | |
| CVE-2025-30693 | |
| Improper Resource Shutdown or Release | |
| Insecure Automated Optimizations | |
| Insecure Automated Optimizations | |
| CVE-2025-30722 | |
| CVE-2025-30693 | |
| Improper Resource Shutdown or Release | |
| Insecure Automated Optimizations | |
| Insecure Automated Optimizations | |
| CVE-2025-30722 | |
| CVE-2025-30693 | |
| Improper Resource Shutdown or Release | |
| Insecure Automated Optimizations | |
| Insecure Automated Optimizations | |
| CVE-2025-30722 | |
| CVE-2025-30693 | |
| Improper Resource Shutdown or Release | |
| Insecure Automated Optimizations | |
| Insecure Automated Optimizations | |
| CVE-2025-30722 | |
| CVE-2025-30693 | |
| Improper Resource Shutdown or Release | |
| Insecure Automated Optimizations | |
| Insecure Automated Optimizations | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Reachable Assertion | |
| Improper Handling of Values | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Reachable Assertion | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Locking | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| Reachable Assertion | |
| Improper Use of Validation Framework | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| CVE-2022-27445 | |
| SQL Injection | |
| Out-of-Bounds | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Use After Free | |
| Reachable Assertion | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| CVE-2022-21595 | |
| Use After Free | |
| Resource Exhaustion | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2024-21096 | |
| CVE-2023-22084 | |
| CVE-2024-21096 | |
| CVE-2023-22084 | |
| CVE-2024-21096 | |
| CVE-2023-22084 | |
| CVE-2024-21096 | |
| CVE-2023-22084 | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Reachable Assertion | |
| Improper Handling of Values | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Reachable Assertion | |
| Improper Handling of Values | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Reachable Assertion | |
| Improper Handling of Values | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Reachable Assertion | |
| Improper Handling of Values | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Reachable Assertion | |
| Improper Handling of Values | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Reachable Assertion | |
| Improper Handling of Values | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Reachable Assertion | |
| Improper Handling of Values | |
| CVE-2024-21096 | |
| CVE-2023-22084 | |
| CVE-2024-21096 | |
| CVE-2023-22084 | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Reachable Assertion | |
| Improper Handling of Values | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Locking | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Improper Handling of Values | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |