| Use After Free | [,5.1.7)[5.2.1,6.0-beta2) |
| Integer Underflow (Wrap or Wraparound) | [,5.1.7)[5.2.1,6.0-beta2) |
| Out-of-bounds Read | [,5.1.7)[5.2.1,6.0-beta2) |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Improper Check for Unusual or Exceptional Conditions | [,5.2.6)[5.3.0-beta1,5.4.3)[5.5.0-beta1,) |
| Buffer Overflow | [,5.0.9)[5.1-beta1,5.1.6)[5.2-beta1,5.3.3)[5.4-beta1,5.4.1) |
| Improper Authentication | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Time-of-check Time-of-use (TOCTOU) Race Condition | |
| Out-of-bounds Write | [4.1.3,4.1.4)[4.2.3,4.2.4)[4.3.2,4.3.3)[4.4.1,4.4.2) |
| Improper Authentication | |
| Buffer Overflow | [2.0.0,2.1.1][3.0,3.0.9][3.1,3.1.7][3.2,3.2.3][3.3,3.3.3)[4.0.0,4.0.2) |
| Improper Handling of Exceptional Conditions | [3.0,3.0.9)(3.1,3.1.6)(3.2,3.2.3)[3.3,3.3.1) |
| Improper Input Validation | |
| Use of a Risky Cryptographic Algorithm | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Denial of Service (DoS) | |