| CVE-2024-5535 |  | 
| CVE-2024-4741 |  | 
| CVE-2024-2511 |  | 
| CVE-2024-0727 |  | 
| Improper Check for Unusual or Exceptional Conditions |  | 
| Excessive Iteration |  | 
| Inefficient Regular Expression Complexity |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Improper Certificate Validation |  | 
| Improper Certificate Validation |  | 
| Improper Certificate Validation |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Double Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| OS Command Injection |  | 
| OS Command Injection |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2021-4160 |  | 
| Out-of-bounds Read |  | 
| Buffer Overflow |  | 
| NULL Pointer Dereference |  | 
| Integer Overflow or Wraparound |  | 
| Integer Overflow or Wraparound |  | 
| Inadequate Encryption Strength |  | 
| NULL Pointer Dereference |  | 
| Information Exposure |  | 
| NULL Pointer Dereference |  | 
| Information Exposure |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of Insufficiently Random Values |  | 
| CVE-2019-1547 |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Information Exposure |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Information Exposure |  | 
| Key Management Errors |  | 
| Key Management Errors |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| CVE-2018-0733 |  | 
| Uncontrolled Recursion |  | 
| Out-of-bounds Read |  | 
| Information Exposure |  | 
| Resource Exhaustion |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Key Management Errors |  | 
| Improper Access Control |  | 
| Out-of-bounds Read |  | 
| Information Exposure |  | 
| NULL Pointer Dereference |  | 
| Improper Input Validation |  | 
| NULL Pointer Dereference |  | 
| Out-of-bounds Read |  | 
| NULL Pointer Dereference |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Numeric Errors |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Out-of-bounds Read |  | 
| Information Exposure |  | 
| Integer Overflow or Wraparound |  | 
| Out-of-Bounds |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Numeric Errors |  | 
| Numeric Errors |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| CVE-2016-0705 |  | 
| CVE-2016-0797 |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Cryptographic Issues |  | 
| Information Exposure |  | 
| Cryptographic Issues |  | 
| Improper Data Handling |  | 
| Numeric Errors |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Race Condition |  | 
| CVE-2015-3194 |  | 
| Security Features |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Race Condition |  | 
| Out-of-Bounds |  | 
| CVE-2015-1790 |  | 
| Cryptographic Issues |  | 
| CVE-2015-0288 |  | 
| Code |  | 
| CVE-2015-0289 |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| CVE-2015-0209 |  | 
| Code |  | 
| Cryptographic Issues |  | 
| Out-of-Bounds |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| CVE-2014-3571 |  | 
| Cryptographic Issues |  | 
| CVE-2014-3569 |  | 
| Improper Input Validation |  | 
| Cryptographic Issues |  | 
| Improper Input Validation |  | 
| Cryptographic Issues |  | 
| CVE-2014-3510 |  | 
| CVE-2014-5139 |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| CVE-2014-3511 |  | 
| CVE-2014-3505 |  | 
| Information Exposure |  | 
| Race Condition |  | 
| Cryptographic Issues |  | 
| Inadequate Encryption Strength |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| CVE-2014-0198 |  | 
| Race Condition |  | 
| Out-of-Bounds |  | 
| Cryptographic Issues |  | 
| Improper Input Validation |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Numeric Errors |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| Cryptographic Issues |  | 
| CVE-2006-7250 |  | 
| Cryptographic Issues |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Resource Management Errors |  | 
| Access Restriction Bypass |  | 
| Resource Management Errors |  | 
| Cryptographic Issues |  | 
| Resource Management Errors |  | 
| Cryptographic Issues |  | 
| CVE-2010-4180 |  | 
| Race Condition |  | 
| Resource Management Errors |  | 
| Cryptographic Issues |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Resource Management Errors |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Resource Management Errors |  | 
| CVE-2009-1386 |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Improper Authentication |  | 
| Improper Input Validation |  | 
| Improper Authentication |  | 
| Numeric Errors |  | 
| Cryptographic Issues |  | 
| Numeric Errors |  | 
| Numeric Errors |  | 
| CVE-2007-3108 |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| NULL Pointer Dereference |  | 
| Cryptographic Issues |  | 
| CVE-2005-2969 |  | 
| Cryptographic Issues |  | 
| CVE-2004-0975 |  | 
| CVE-2004-0079 |  | 
| CVE-2004-0081 |  | 
| CVE-2004-0112 |  | 
| CVE-2002-1568 |  | 
| Out-of-Bounds |  | 
| CVE-2003-0544 |  | 
| CVE-2003-0543 |  | 
| CVE-2003-0147 |  | 
| CVE-2003-0131 |  | 
| CVE-2003-0078 |  | 
| CVE-2002-0656 |  | 
| CVE-2002-0657 |  | 
| CVE-2002-0659 |  | 
| CVE-2002-0655 |  |