| CVE-2025-53066 |  | 
| Inappropriate Encoding for Output Context |  | 
| CVE-2025-53066 |  | 
| Inappropriate Encoding for Output Context |  | 
| CVE-2025-53066 |  | 
| Inappropriate Encoding for Output Context |  | 
| CVE-2025-53066 |  | 
| Inappropriate Encoding for Output Context |  | 
| CVE-2025-53066 |  | 
| Inappropriate Encoding for Output Context |  | 
| CVE-2025-53066 |  | 
| Inappropriate Encoding for Output Context |  | 
| CVE-2025-53066 |  | 
| Inappropriate Encoding for Output Context |  | 
| CVE-2025-53066 |  | 
| Inappropriate Encoding for Output Context |  | 
| CVE-2025-53066 |  | 
| Inappropriate Encoding for Output Context |  | 
| CVE-2025-53066 |  | 
| Inappropriate Encoding for Output Context |  | 
| CVE-2025-53066 |  | 
| Inappropriate Encoding for Output Context |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Deserialization of Untrusted Data |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Deserialization of Untrusted Data |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Deserialization of Untrusted Data |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Deserialization of Untrusted Data |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Use of Insufficiently Random Values |  | 
| Integer Coercion Error |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Use of Insufficiently Random Values |  | 
| Integer Coercion Error |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Use of Insufficiently Random Values |  | 
| Integer Coercion Error |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Use of Insufficiently Random Values |  | 
| Integer Coercion Error |  | 
| Improper Use of Validation Framework |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Integer Underflow |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Resource Exhaustion |  | 
| Improper Use of Validation Framework |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Integer Underflow |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Resource Exhaustion |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| Heap-based Buffer Overflow |  | 
| CVE-2025-30761 |  | 
| Missing Required Cryptographic Step |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| CVE-2025-30761 |  | 
| Missing Required Cryptographic Step |  | 
| Heap-based Buffer Overflow |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Certificate Validation |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Improper Certificate Validation |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Improper Certificate Validation |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Improper Certificate Validation |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Directory Traversal |  | 
| Out-of-bounds Read |  | 
| Directory Traversal |  | 
| Out-of-bounds Read |  | 
| Directory Traversal |  | 
| Out-of-bounds Read |  | 
| Directory Traversal |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| Improperly Implemented Security Check for Standard |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Improper Input Validation |  | 
| Improperly Implemented Security Check for Standard |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Improper Input Validation |  | 
| Improperly Implemented Security Check for Standard |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Improper Input Validation |  | 
| Improperly Implemented Security Check for Standard |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Integer Coercion Error |  | 
| Improper Access Control |  | 
| Resource Leak |  | 
| Integer Coercion Error |  | 
| Improper Access Control |  | 
| Resource Leak |  | 
| Integer Coercion Error |  | 
| Improper Access Control |  | 
| Resource Leak |  | 
| Integer Coercion Error |  | 
| Improper Access Control |  | 
| Resource Leak |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| CVE-2025-30761 |  | 
| Missing Required Cryptographic Step |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| CVE-2025-30761 |  | 
| Missing Required Cryptographic Step |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Improper Use of Validation Framework |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Integer Underflow |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Resource Exhaustion |  | 
| Improper Use of Validation Framework |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Integer Underflow |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Resource Exhaustion |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Certificate Validation |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Improper Certificate Validation |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Improper Certificate Validation |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Deserialization of Untrusted Data |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Deserialization of Untrusted Data |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Deserialization of Untrusted Data |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Use of Insufficiently Random Values |  | 
| Integer Coercion Error |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Use of Insufficiently Random Values |  | 
| Integer Coercion Error |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Use of Insufficiently Random Values |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Improper Access Control |  | 
| Resource Leak |  | 
| Integer Coercion Error |  | 
| Improper Access Control |  | 
| Resource Leak |  | 
| Improper Use of Validation Framework |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Integer Underflow |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Resource Exhaustion |  | 
| Integer Coercion Error |  | 
| Improper Access Control |  | 
| Resource Leak |  | 
| Improper Use of Validation Framework |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Integer Underflow |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Resource Exhaustion |  | 
| Improper Use of Validation Framework |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Integer Underflow |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Resource Exhaustion |  | 
| Heap-based Buffer Overflow |  | 
| CVE-2025-30761 |  | 
| Missing Required Cryptographic Step |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| CVE-2025-30761 |  | 
| Missing Required Cryptographic Step |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| CVE-2025-30761 |  | 
| Missing Required Cryptographic Step |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| CVE-2025-30761 |  | 
| Missing Required Cryptographic Step |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| CVE-2025-30761 |  | 
| Missing Required Cryptographic Step |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| CVE-2025-30761 |  | 
| Missing Required Cryptographic Step |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Missing Required Cryptographic Step |  | 
| CVE-2025-30761 |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improperly Implemented Security Check for Standard |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Improper Input Validation |  | 
| Improperly Implemented Security Check for Standard |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Improper Input Validation |  | 
| Improperly Implemented Security Check for Standard |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Directory Traversal |  | 
| Out-of-bounds Read |  | 
| Directory Traversal |  | 
| Out-of-bounds Read |  | 
| Directory Traversal |  | 
| Out-of-bounds Read |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| Signed to Unsigned Conversion Error |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| Signed to Unsigned Conversion Error |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Handling of Length Parameter Inconsistency |  | 
| Out-of-Bounds |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Improper Certificate Validation |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Directory Traversal |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| Improperly Implemented Security Check for Standard |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Deserialization of Untrusted Data |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Use of Insufficiently Random Values |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Improper Access Control |  | 
| Resource Leak |  | 
| Improper Use of Validation Framework |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Integer Underflow |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Resource Exhaustion |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| CVE-2024-21147 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| CVE-2024-21140 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| CVE-2024-21131 |  | 
| CVE-2024-21140 |  | 
| Improper Input Validation |  | 
| CVE-2024-21147 |  | 
| CVE-2024-21131 |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Output Neutralization for Logs |  | 
| Improper Output Neutralization for Logs |  | 
| Integer Overflow or Wraparound |  | 
| Out-of-bounds Write |  | 
| Uncontrolled Memory Allocation |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Covert Timing Channel |  | 
| Information Exposure Through Log Files |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Information Exposure Through Log Files |  | 
| Covert Timing Channel |  | 
| Integer Overflow or Wraparound |  | 
| Out-of-Bounds |  | 
| Improper Certificate Validation |  | 
| Improper Certificate Validation |  | 
| Improper Certificate Validation |  | 
| Improper Certificate Validation |  | 
| Improper Certificate Validation |  | 
| Improper Certificate Validation |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improperly Implemented Security Check for Standard |  | 
| Improperly Implemented Security Check for Standard |  | 
| Improperly Implemented Security Check for Standard |  | 
| Improperly Implemented Security Check for Standard |  | 
| Improperly Implemented Security Check for Standard |  | 
| Improperly Implemented Security Check for Standard |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Neutralization of Null Byte or NUL Character |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Improper Enforcement of Message Integrity During Transmission in a Communication Channel |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Reliance on File Name or Extension of Externally-Supplied File |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| NULL Pointer Dereference |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Use of Insufficiently Random Values |  | 
| Use of Insufficiently Random Values |  | 
| Use of Insufficiently Random Values |  | 
| Use of Insufficiently Random Values |  | 
| Use of Insufficiently Random Values |  | 
| Use of Insufficiently Random Values |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Integer Coercion Error |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Resource Leak |  | 
| Resource Leak |  | 
| Resource Leak |  | 
| Resource Leak |  | 
| Resource Leak |  | 
| Resource Leak |  | 
| Improper Use of Validation Framework |  | 
| Improper Use of Validation Framework |  | 
| Improper Use of Validation Framework |  | 
| Improper Use of Validation Framework |  | 
| Improper Use of Validation Framework |  | 
| Improper Use of Validation Framework |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Incorrect Behavior Order: Early Validation |  | 
| Integer Underflow |  | 
| Integer Underflow |  | 
| Integer Underflow |  | 
| Integer Underflow |  | 
| Integer Underflow |  | 
| Integer Underflow |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  |