| NULL Pointer Dereference | |
| Heap-based Buffer Overflow | |
| Improper Certificate Validation | |
| Double Free | |
| Algorithmic Complexity | |
| NULL Pointer Dereference | |
| Heap-based Buffer Overflow | |
| Improper Certificate Validation | |
| Double Free | |
| NULL Pointer Dereference | |
| Heap-based Buffer Overflow | |
| Improper Certificate Validation | |
| Double Free | |
| NULL Pointer Dereference | |
| Heap-based Buffer Overflow | |
| Improper Certificate Validation | |
| Double Free | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| NULL Pointer Dereference | |
| Heap-based Buffer Overflow | |
| Improper Certificate Validation | |
| Double Free | |
| NULL Pointer Dereference | |
| Heap-based Buffer Overflow | |
| Improper Certificate Validation | |
| Double Free | |
| NULL Pointer Dereference | |
| Heap-based Buffer Overflow | |
| Improper Certificate Validation | |
| Double Free | |
| NULL Pointer Dereference | |
| Heap-based Buffer Overflow | |
| Improper Certificate Validation | |
| Double Free | |
| NULL Pointer Dereference | |
| Heap-based Buffer Overflow | |
| Improper Certificate Validation | |
| Double Free | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Double Free | |
| Improper Protection Against Physical Side Channels | |
| Double Free | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| NULL Pointer Dereference | |
| Double Free | |
| Heap-based Buffer Overflow | |
| Improper Certificate Validation | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Double Free | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Uncaught Exception | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Verification of Cryptographic Signature | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Improper Protection Against Physical Side Channels | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |
| Double Free | |