Exposure of Sensitive Information Through Metadata | |
Improper Verification of Cryptographic Signature | |
Improper Verification of Cryptographic Signature | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Memory Leak | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Arbitrary Command Injection | |
Improper Verification of Cryptographic Signature | |
Information Exposure | |