| Insufficient Verification of Data Authenticity | |
| Missing Initialization of a Variable | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Critical Step in Authentication | |
| Link Following | |
| CVE-2014-0021 | |