| Use of Uninitialized Resource | |
| Resource Exhaustion | |
| Reversible One-Way Hash | |
| Out-of-bounds Write | |
| Improper Authentication | |
| Improper Null Termination | |
| Incorrect Privilege Assignment | |
| Out-of-bounds Read | |
| Directory Traversal | |
| Directory Traversal | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Use After Free | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Information Exposure | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Race Condition | |
| Access Restriction Bypass | |
| Improper Authentication | |
| Improper Input Validation | |
| Improper Authentication | |
| Directory Traversal | |
| Improper Input Validation | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Arbitrary Code Injection | |
| Heap-based Buffer Overflow | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Directory Traversal | |
| Incorrect Default Permissions | |
| Incorrect Default Permissions | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Information Exposure | |
| Information Exposure | |
| Improper Verification of Cryptographic Signature | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Reversible One-Way Hash | |
| Symlink Following | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Incorrect Default Permissions | |
| Incorrect Default Permissions | |
| Information Exposure | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Directory Traversal | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Null Termination | |
| Improper Null Termination | |
| Incorrect Privilege Assignment | |
| Incorrect Privilege Assignment | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Use After Free | |
| Directory Traversal | |
| Directory Traversal | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Man-in-the-Middle (MitM) | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |