NULL Pointer Dereference
| |
Reversible One-Way Hash
| |
Missing Required Cryptographic Step
| |
Excessive Iteration
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Improper Certificate Validation
| |
Improper Certificate Validation
| |
Resource Exhaustion
| |
Incorrect Type Conversion or Cast
| |
Use After Free
| |
Information Exposure
| |
NULL Pointer Dereference
| |
Arbitrary Command Injection
| |
Arbitrary Command Injection
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Out-of-bounds Read
| |
Unchecked Error Condition
| |
Incorrect Calculation
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Resource Exhaustion
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
Missing Release of Resource after Effective Lifetime
| |
Resource Exhaustion
| |
Out-of-bounds Read
| |
Covert Timing Channel
| |
Improper Input Validation
| |
Unchecked Error Condition
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Integer Overflow or Wraparound
| |
Cryptographic Issues
| |
Information Exposure
| |
Cryptographic Issues
| |
CVE-2016-0797
| |
CVE-2016-0705
| |
Cryptographic Issues
| |
Improper Data Handling
| |
Race Condition
| |
CVE-2015-3194
| |
Memory Leak
| |
Out-of-Bounds
| |
Numeric Errors
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
CVE-2015-1790
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Out-of-bounds Read
| |
Race Condition
| |
Reachable Assertion
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Write
| |
Untrusted Pointer Dereference
| |
Information Exposure
| |
Use After Free
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Information Exposure
| |
Cryptographic Issues
| |
Cryptographic Issues
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Cryptographic Issues
| |
Cryptographic Issues
| |
CVE-2014-3571
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Memory Leak
| |
Memory Leak
| |
Missing Authorization
| |
Memory Leak
| |
Race Condition
| |
Detection of Error Condition Without Action
| |
Information Exposure
| |
Operation on a Resource after Expiration or Release
| |
NULL Pointer Dereference
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Enforcement of Behavioral Workflow
| |
Resource Exhaustion
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Improper Certificate Validation
| |
Information Exposure
| |
Integer Overflow or Wraparound
| |
Client-Side Enforcement of Server-Side Security
| |
Covert Timing Channel
| |
Covert Timing Channel
| |
Uncontrolled Recursion
| |
Information Exposure
| |
Covert Timing Channel
| |
Missing Required Cryptographic Step
| |
Out-of-bounds Read
| |
Covert Timing Channel
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
Covert Timing Channel
| |
Missing Required Cryptographic Step
| |
Information Exposure
| |