| Use After Free |  | 
| Use After Free |  | 
| Integer Overflow or Wraparound |  | 
| Integer Overflow or Wraparound |  | 
| Improper Locking |  | 
| Information Exposure |  | 
| Integer Overflow or Wraparound |  | 
| Out-of-bounds Read |  | 
| Integer Overflow or Wraparound |  | 
| Improper Resource Locking |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Access of Uninitialized Pointer |  | 
| Stack-based Buffer Overflow |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Over-read |  | 
| Buffer Over-read |  | 
| Buffer Over-read |  | 
| Use After Free |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Out-of-bounds Write |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Out-of-Bounds Write |  | 
| Improper Restriction of Operations within the Bounds of a Memory Buffer |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-Bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Buffer Overflow |  | 
| Missing Release of Memory after Effective Lifetime |  | 
| Out-of-Bounds |  | 
| Arbitrary Code Execution |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Race Condition |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Integer Overflow or Wraparound |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Heap-based Buffer Overflow |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Integer Underflow |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Underflow |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Integer Underflow |  | 
| Symlink Attack |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Divide By Zero |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Integer Underflow |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Improper Initialization |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Heap-based Buffer Overflow |  | 
| Resource Management Errors |  | 
| Integer Overflow or Wraparound |  | 
| Heap-based Buffer Overflow |  | 
| Integer Overflow or Wraparound |  |