| CVE-2022-27191 | |
| Memory Leak | |
| Resource Exhaustion | |
| Incorrect Default Permissions | |
| CVE-2022-27191 | |
| Incorrect Permission Assignment for Critical Resource | |
| CVE-2022-23648 | |
| CVE-2021-43565 | |
| Improper Input Validation | |
| OS Command Injection | |
| Improper Certificate Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Certificate Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| OS Command Injection | |
| Improper Certificate Validation | |
| Improper Input Validation | |
| Allocation of Resources Without Limits or Throttling | |
| OS Command Injection | |
| Improper Certificate Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| OS Command Injection | |
| Improper Initialization | |
| Information Exposure Through Log Files | |
| Execution with Unnecessary Privileges | |
| Incorrect Authorization | |
| Race Condition | |
| Exposure of Resource to Wrong Sphere | |
| Improper Check for Unusual or Exceptional Conditions | |
| Directory Traversal | |
| Directory Traversal | |
| Information Exposure | |
| Improper Preservation of Permissions | |
| Improper Preservation of Permissions | |
| Incorrect Permission Assignment for Critical Resource | |
| Race Condition | |