| Timing Attack | |
| Timing Attack | |
| Use After Free | |
| Covert Timing Channel | |
| NULL Pointer Dereference | |
| Missing Cryptographic Step | |
| Out-of-bounds Read | |
| Off-by-one Error | |
| Compiler Optimization Removal or Modification of Security-critical Code | |
| Use of Uninitialized Resource | |
| Insecure Default Initialization of Resource | |
| Out-of-bounds Read | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| Buffer Underflow | |
| Improper Certificate Validation | |
| Missing Cryptographic Step | [2.28.4,2.28.9)[3.0.0,3.6.1) |
| Stack-based Buffer Overflow | |
| Improper Isolation or Compartmentalization | |
| Observable Timing Discrepancy | |
| Heap-based Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Improperly Implemented Security Check for Standard | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| Cryptographic Issues | |
| Heap-based Buffer Overflow | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Buffer Overread | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| User Enumeration | |
| Improper Certificate Validation | |
| User Enumeration | |
| User Enumeration | |
| Out-of-bounds Read | |
| Improper Certificate Validation | |
| Information Exposure | |
| Improper Certificate Validation | |
| Denial of Service (DoS) | |
| Cryptographic Issues | |