| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Improper Certificate Validation |  | 
| Covert Timing Channel |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Improper Certificate Validation |  | 
| CVE-2024-4603 |  | 
| Use After Free |  | 
| Use After Free |  | 
| Covert Timing Channel |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Arbitrary Command Injection |  | 
| Arbitrary Command Injection |  | 
| Arbitrary Command Injection |  | 
| Arbitrary Command Injection |  | 
| Information Exposure |  | 
| Covert Timing Channel |  | 
| Covert Timing Channel |  | 
| Covert Timing Channel |  | 
| Covert Timing Channel |  | 
| Integer Overflow or Wraparound |  | 
| Integer Overflow or Wraparound |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Covert Timing Channel |  | 
| Covert Timing Channel |  | 
| Covert Timing Channel |  | 
| Improper Certificate Validation |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Improper Certificate Validation |  | 
| Resource Exhaustion |  | 
| Out-of-bounds Write |  | 
| Resource Exhaustion |  | 
| Improper Certificate Validation |  | 
| Out-of-bounds Write |  | 
| NULL Pointer Dereference |  | 
| Integer Overflow or Wraparound |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Unchecked Error Condition |  | 
| Unchecked Error Condition |  | 
| Unchecked Error Condition |  | 
| Integer Overflow or Wraparound |  | 
| Integer Overflow or Wraparound |  | 
| Integer Overflow or Wraparound |  | 
| Integer Overflow or Wraparound |  | 
| Incorrect Calculation |  | 
| Incorrect Calculation |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Incorrect Calculation |  | 
| Incorrect Calculation |  | 
| Incorrect Calculation |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Covert Timing Channel |  | 
| Covert Timing Channel |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Integer Overflow or Wraparound |  | 
| Integer Overflow or Wraparound |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Covert Timing Channel |  | 
| Covert Timing Channel |  | 
| Covert Timing Channel |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Unchecked Error Condition |  | 
| Unchecked Error Condition |  | 
| Unchecked Error Condition |  | 
| Unchecked Error Condition |  | 
| Numeric Errors |  | 
| CVE-2016-0705 |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Race Condition |  | 
| Race Condition |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Information Exposure |  | 
| NULL Pointer Dereference |  | 
| NULL Pointer Dereference |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| NULL Pointer Dereference |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Reachable Assertion |  | 
| Reachable Assertion |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Cryptographic Issues |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Cryptographic Issues |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| CVE-2014-3571 |  | 
| CVE-2014-3571 |  | 
| Cryptographic Issues |  | 
| Memory Leak |  | 
| Cryptographic Issues |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Missing Required Cryptographic Step |  | 
| Missing Required Cryptographic Step |  | 
| Missing Required Cryptographic Step |  | 
| Missing Required Cryptographic Step |  | 
| Integer Overflow or Wraparound |  | 
| Improper Enforcement of Behavioral Workflow |  | 
| Improper Enforcement of Behavioral Workflow |  | 
| Improper Enforcement of Behavioral Workflow |  | 
| Improper Enforcement of Behavioral Workflow |  | 
| Improper Enforcement of Behavioral Workflow |  | 
| Race Condition |  | 
| CVE-2015-1790 |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Missing Required Cryptographic Step |  | 
| Missing Required Cryptographic Step |  | 
| Missing Required Cryptographic Step |  | 
| Missing Required Cryptographic Step |  | 
| Missing Required Cryptographic Step |  | 
| Client-Side Enforcement of Server-Side Security |  | 
| Client-Side Enforcement of Server-Side Security |  | 
| Client-Side Enforcement of Server-Side Security |  | 
| Client-Side Enforcement of Server-Side Security |  | 
| Double Free |  | 
| Information Exposure |  | 
| Missing Required Cryptographic Step |  | 
| Missing Required Cryptographic Step |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Improper Data Handling |  | 
| Improper Data Handling |  |