| Improperly Implemented Security Check for Standard | |
| NULL Pointer Dereference | |
| Stack-based Buffer Overflow | |
| NULL Pointer Dereference | |
| Infinite loop | |
| Improper Verification of Cryptographic Signature | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Asymmetric Resource Consumption (Amplification) | |
| Incomplete Model of Endpoint Features | |
| Integer Overflow to Buffer Overflow | |
| Integer Underflow (Wrap or Wraparound) | |
| Stack-based Buffer Overflow | |
| Reachable Assertion | |
| Insecure Randomness | |
| Insecure Randomness | |
| Off-by-one Error | |
| Reachable Assertion | |
| Allocation of Resources Without Limits or Throttling | [,6.0.20)[7.0.0-beta1,7.0.6) |
| NULL Pointer Dereference | |
| Race Condition | [,6.0.20)[7.0.0-beta1,7.0.6) |
| Allocation of Resources Without Limits or Throttling | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | [6.0.0,6.0.19)[7.0.0,7.0.5) |
| Improper Check for Unusual or Exceptional Conditions | [6.0.0,6.0.19)[7.0.0,7.0.5) |
| Heap-based Buffer Overflow | [6.0.0,6.0.19)[7.0.0,7.0.5) |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Access Control | |
| Use After Free | |
| Directory Traversal | |
| Arbitrary Code Execution | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Improper Neutralization | |
| CVE-2019-18625 | |
| Improper Check for Unusual or Exceptional Conditions | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| CVE-2017-15377 | |
| Improper Input Validation | |
| Improper Verification of Cryptographic Signature | |
| Out-of-Bounds | |
| Security Features | |
| Improper Input Validation | |
| CVE-2021-35063 | |
| Resource Management Errors | |
| Integer Underflow | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Remote Code Execution (RCE) | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Clickjacking | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Security Bypass | |
| Improper Input Validation | |