| Use After Free | |
| Information Exposure | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| OS Command Injection | |
| Missing Critical Step in Authentication | |
| Improper Authorization | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Reusing a Nonce | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| OS Command Injection | |
| Buffer Overflow | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Arbitrary Argument Injection | |
| Arbitrary Argument Injection | |