| NULL Pointer Dereference | |
| Double Free | |
| Heap-based Buffer Overflow | |
| Algorithmic Complexity | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Missing Initialization of a Variable | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |