| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Double Free | |
| NULL Pointer Dereference | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Access of Uninitialized Pointer | |
| Double Free | |
| Information Exposure | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Improper Certificate Validation | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Double Free | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Improper Data Handling | |
| CVE-2015-3308 | |
| CVE-2015-6251 | |
| Cryptographic Issues | |
| Cryptographic Issues | |
| CVE-2014-3465 | |
| Out-of-Bounds | |
| Cryptographic Issues | |
| Access Restriction Bypass | |
| Cryptographic Issues | |
| Cryptographic Issues | |
| Cryptographic Issues | |
| Resource Management Errors | |
| Cryptographic Issues | |
| Improper Input Validation | |