| NULL Pointer Dereference |  | 
| Double Free |  | 
| Heap-based Buffer Overflow |  | 
| Algorithmic Complexity |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Improper Protection Against Physical Side Channels |  | 
| Double Free |  | 
| Double Free |  | 
| Double Free |  | 
| Double Free |  | 
| Double Free |  | 
| Double Free |  | 
| Double Free |  | 
| Double Free |  | 
| Double Free |  | 
| NULL Pointer Dereference |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Insufficient Verification of Data Authenticity |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  |