Cleartext Transmission of Sensitive Information | |
Out-of-Bounds | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
PRNG Seed Error | |
Improperly Implemented Security Check for Standard | |
Time-of-check Time-of-use (TOCTOU) | |
Cryptographic Issues | |
Numeric Errors | |
Use After Free | |
CVE-2013-1739 | |
Access Restriction Bypass | |
Numeric Errors | |
Improper Input Validation | |
Out-of-Bounds | |
Cryptographic Issues | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Use of a Broken or Risky Cryptographic Algorithm | |
CVE-2016-2834 | |
Key Management Errors | |
NULL Pointer Dereference | |
CVE-2013-0743 | |
CVE-2016-1979 | |
CVE-2016-1978 | |
Out-of-Bounds | |
Improper Data Handling | |
Integer Overflow or Wraparound | |
Heap-based Buffer Overflow | |
Out-of-Bounds | |
Improper Input Validation | |
Improperly Implemented Security Check for Standard | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Not Failing Securely ('Failing Open') | |
Improper Verification of Cryptographic Signature | |
Encoding Error | |
Cryptographic Issues | |
Use After Free | |
Use of a Broken or Risky Cryptographic Algorithm | |
CVE-2014-1569 | |
Out-of-bounds Write | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Out-of-bounds Read | |
Heap-based Buffer Overflow | |
Improper Authentication | |
Use After Free | |
Information Exposure | |
Out-of-bounds Read | |
Use of a Broken or Risky Cryptographic Algorithm | |
NULL Pointer Dereference | |
Buffer Overflow | |
NULL Pointer Dereference | |
Missing Required Cryptographic Step | |
Covert Timing Channel | |
Allocation of Resources Without Limits or Throttling | |
Covert Timing Channel | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Inadequate Encryption Strength | |
CVE-2011-5094 | |
Information Exposure | |