| Heap-based Buffer Overflow | |
| Buffer Overflow | |
| Information Exposure | |
| Signed to Unsigned Conversion Error | |
| Improperly Implemented Security Check for Standard | |
| Covert Timing Channel | |
| Improper Input Validation | |
| CVE-2019-2786 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2019-2762 | |
| Covert Timing Channel | |
| Cross-site Scripting (XSS) | |
| Allocation of Resources Without Limits or Throttling | |
| Cross-site Scripting (XSS) | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Uncaught Exception | |
| Uncaught Exception | |
| CVE-2019-2978 | |
| Out-of-bounds Read | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| NULL Pointer Dereference | |
| Insufficiently Protected Credentials | |
| CVE-2019-2945 | |
| Improper Enforcement of Behavioral Workflow | |
| Allocation of Resources Without Limits or Throttling | |
| Modification of Assumed-Immutable Data (MAID) | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Encoding Error | |
| Improper Input Validation | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2019-2684 | |
| Allocation of Resources Without Limits or Throttling | |
| Information Exposure | |
| Improper Access Control | |
| Improper Certificate Validation | |
| Improper Access Control | |
| CVE-2018-3150 | |
| Untrusted Search Path | |
| Information Exposure | |
| Improper Verification of Cryptographic Signature | |
| CVE-2018-3150 | |
| CVE-2018-3150 | |
| CVE-2018-3150 | |
| CVE-2018-3150 | |
| CVE-2018-3150 | |
| CVE-2018-3150 | |
| CVE-2018-3150 | |
| CVE-2018-3150 | |
| CVE-2018-3150 | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |