| Out-of-bounds Read |  | 
| Information Exposure |  | 
| Out-of-bounds Read |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Information Exposure |  | 
| External Control of File Name or Path |  | 
| Expected Behavior Violation |  | 
| Improper Certificate Validation |  | 
| Authentication Bypass by Primary Weakness |  | 
| Authentication Bypass by Primary Weakness |  | 
| Directory Traversal |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Use After Free |  | 
| Improper Validation of Syntactic Correctness of Input |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Improper Certificate Validation |  | 
| Insufficiently Protected Credentials |  | 
| Insufficiently Protected Credentials |  | 
| Improper Authentication |  | 
| Cleartext Transmission of Sensitive Information |  | 
| Cleartext Transmission of Sensitive Information |  | 
| Improper Certificate Validation |  | 
| Arbitrary Code Injection |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Stack-based Buffer Overflow |  | 
| Out-of-bounds Read |  | 
| Untrusted Pointer Dereference |  | 
| Uncontrolled Recursion |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Information Exposure |  | 
| Use of Uninitialized Resource |  | 
| Use of Uninitialized Resource |  | 
| Insufficiently Protected Credentials |  | 
| Improper Input Validation |  | 
| Improper Certificate Validation |  | 
| Information Exposure |  |