| Signal Handler Race Condition | |
| Insufficient Verification of Data Authenticity | [,248.13)[249,249.17)[250,250.14)[251,251.20)[252,252.21)[253,253.15)[254,254.8)[255,255.2) |
| Arbitrary Code Execution | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Off-by-one Error | |
| Uncontrolled Recursion | |
| Use After Free | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Insecure Default | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Denial of Service (DoS) | [,246.15)[247,247.8)[248,248.5)[249,249.1) |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Deserialization of Untrusted Data | |
| Insecure Permissions | |
| Privilege Chaining | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Information Exposure | |
| Memory Leak | |
| Race Condition | |
| Symlink Attack | |
| Improper Input Validation | |
| User Impersonation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Race Condition | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Improper Authorization | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Symlink Attack | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Read | |