| Improper Neutralization of Null Byte or NUL Character | |
| Failure to Sanitize Special Element | |
| Expected Behavior Violation | |
| Detection of Error Condition Without Action | |
| Arbitrary Code Injection | |
| Improper Check for Dropped Privileges | |
| Information Exposure | |
| Improper Input Validation | |
| Allocation of Resources Without Limits or Throttling | |
| Covert Timing Channel | |
| Improper Input Validation | |
| Improper Authentication | |
| Information Exposure | |
| Untrusted Search Path | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Improper Access Control | |
| Heap-based Buffer Overflow | |
| Incorrect Calculation | |
| Use After Free | |
| Incorrect Privilege Assignment | |
| Missing Critical Step in Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| OS Command Injection | |
| Truncation of Security-relevant Information | |
| Arbitrary Code Injection | |
| Improper Check for Dropped Privileges | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Covert Timing Channel | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Incorrect Calculation | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Missing Critical Step in Authentication | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Input Validation | |
| Improper Input Validation | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Untrusted Search Path | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Arbitrary Command Injection | |
| Information Exposure | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Information Exposure | |