| CVE-2025-53066 | |
| Inappropriate Encoding for Output Context | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Missing Required Cryptographic Step | |
| CVE-2025-30761 | |
| Stack-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Information Exposure | |
| Signed to Unsigned Conversion Error | |
| Integer Overflow or Wraparound | |
| Signed to Unsigned Conversion Error | |
| Uncontrolled Memory Allocation | |
| Improper Handling of Length Parameter Inconsistency | |
| Man-in-the-Middle (MitM) | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| CVE-2024-21131 | |
| Resource Exhaustion | |
| Uncontrolled Memory Allocation | |
| Improper Input Validation | |
| Covert Timing Channel | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Information Exposure Through Log Files | |
| Race Condition | |
| Improper Certificate Validation | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Neutralization of Null Byte or NUL Character | |
| Improper Neutralization of Null Byte or NUL Character | |
| Improper Neutralization of Null Byte or NUL Character | |
| Improper Neutralization of Null Byte or NUL Character | |
| Improper Neutralization of Null Byte or NUL Character | |
| Improper Neutralization of Null Byte or NUL Character | |
| Improper Neutralization of Null Byte or NUL Character | |
| Improper Neutralization of Null Byte or NUL Character | |
| Improper Neutralization of Null Byte or NUL Character | |
| Improper Neutralization of Null Byte or NUL Character | |
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel | |
| Reliance on File Name or Extension of Externally-Supplied File | |
| Deserialization of Untrusted Data | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Use of Insufficiently Random Values | |
| Integer Coercion Error | |
| Integer Coercion Error | |
| Integer Coercion Error | |
| Integer Coercion Error | |
| Integer Coercion Error | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Unchecked Return Value | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Integer Underflow | |
| Integer Underflow | |
| Integer Underflow | |
| Integer Underflow | |
| Integer Underflow | |
| Integer Underflow | |
| Integer Underflow | |
| Integer Underflow | |
| Integer Underflow | |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
| Resource Exhaustion | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| CVE-2021-35560 | |
| CVE-2021-35560 | |
| CVE-2021-35560 | |
| CVE-2021-35560 | |
| CVE-2021-35560 | |
| CVE-2021-35560 | |
| CVE-2021-35560 | |
| CVE-2021-35560 | |
| CVE-2021-35560 | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| CVE-2020-14796 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| CVE-2020-14577 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| CVE-2020-14556 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| CVE-2020-2781 | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Incorrect Regular Expression | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Encoding Error | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Modification of Assumed-Immutable Data (MAID) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| CVE-2019-2996 | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Authorization | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| CVE-2019-2945 | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| CVE-2019-2978 | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| CVE-2019-2762 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| CVE-2019-2786 | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2449 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| CVE-2019-2697 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Divide By Zero | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| CVE-2019-2684 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |