| Improper Verification of Cryptographic Signature | |
| Improper Certificate Validation | |
| Out-of-bounds Read | |
| Information Exposure Through Discrepancy | |
| Information Exposure Through Discrepancy | |
| Improper Certificate Validation | |
| Asymmetric Resource Consumption (Amplification) | |
| Asymmetric Resource Consumption (Amplification) | |
| Information Exposure | |
| Improper Certificate Validation | |
| Improper Input Validation | |
| Information Exposure | [,1.10.13)[1.11.0,1.11.29) |
| Use of a Risky Cryptographic Algorithm | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Cryptographic Issues | |
| Improper Certificate Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | [,1.10.10)[1.11.0,1.11.19) |
| Information Exposure | |
| CVE-2017-14737 | |
| Resource Management Errors | [,1.10.10)[1.11.0,1.11.19) |
| Information Exposure | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Timing Attack | |
| Information Exposure | |
| Improper Certificate Validation | |
| Key Management Errors | |
| Key Management Errors | |