| Arbitrary Code Injection | |
| Use of Externally-Controlled Format String | |
| CVE-2023-25652 | |
| Directory Traversal | |
| Link Following | |
| Heap-based Buffer Overflow | |
| Link Following | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Ownership Management | |
| Uncontrolled Search Path Element | |
| OS Command Injection | |
| CVE-2019-1387 | |
| Improper Input Validation | |
| CVE-2019-1353 | |
| Improper Input Validation | |
| Use of Incorrectly-Resolved Name or Reference | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2019-1348 | |
| Insufficiently Protected Credentials | |
| OS Command Injection | |
| Insufficiently Protected Credentials | |
| CVE-2019-1387 | |
| Insufficiently Protected Credentials | |
| Improper Input Validation | |
| Directory Traversal | |
| CVE-2019-1353 | |
| Improper Input Validation | |
| Resource Exhaustion | |
| Use of Incorrectly-Resolved Name or Reference | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2019-1348 | |
| Arbitrary Argument Injection | |
| Out-of-bounds Read | |
| Link Following | |