| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Buffer Over-read | |
| Improper Neutralization | |
| Improper Neutralization | |
| Improper Neutralization | |
| Improper Neutralization | |
| Improper Neutralization | |
| Improper Neutralization | |
| Improper Neutralization | |
| Improper Neutralization | |
| Improper Neutralization | |
| Improper Neutralization | |
| Improper Neutralization | |
| Improper Neutralization | |
| Information Exposure | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Permissive Whitelist | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |