| Missing Cryptographic Step | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Improper Certificate Validation | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Improper Authentication | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Resource Management Errors | |
| Use After Free | |
| Use After Free | |
| Resource Management Errors | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| CVE-2006-1727 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| CVE-2013-0797 | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Use After Free | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| CVE-2008-5503 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Information Exposure | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Use After Free | |
| CVE-2012-1943 | |
| Use After Free | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Information Exposure | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Remote Code Execution (RCE) | |
| Resource Management Errors | |
| Privilege Escalation | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Authentication Bypass | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Authentication Bypass | |
| Use After Free | |
| Remote Code Execution (RCE) | |
| Improper Verification of Cryptographic Signature | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Directory Traversal | |
| Authentication Bypass | [0,firefox-1.5.0.12-4.fc6) |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Resource Management Errors | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| User Impersonation | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Insecure Encryption | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Input Validation | |
| Cross-site Request Forgery (CSRF) | |
| Information Exposure | [,1.0.3)[1.5.0.0,1.5.0.5)[1.5.0.0,1.5.0.5) |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| CVE-2013-0774 | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Authentication | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Privilege Escalation | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Symlink Attack | |
| Resource Management Errors | |
| Remote Code Execution (RCE) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Access Control | |
| Authentication Bypass | |
| Remote Code Execution (RCE) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| CVE-2010-3182 | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| Resource Management Errors | |
| Out-of-Bounds | [0,firefox-1.5.0.12-4.fc6) |
| Race Condition | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Access Restriction Bypass | |
| Authentication Bypass | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Improper Input Validation | |
| Information Exposure | |
| CVE-2007-3845 | |
| Cryptographic Issues | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Injection | |
| Insufficiently Protected Credentials | |
| Resource Management Errors | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Use After Free | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Privilege Escalation | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Improper Input Validation | [0,firefox-1.5.0.12-4.fc6) |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Information Management Errors | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Resource Management Errors | |
| Use After Free | |
| Denial of Service (DoS) | |
| Race Condition | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Code | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Information Exposure | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Improper Input Validation | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | |
| Resource Management Errors | |
| Security Features | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Use After Free | |
| Out-of-Bounds | |
| CVE-2008-1240 | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | [,1.0.8)[1.5.0.0,1.5.0.10)[1.5.0.0,1.5.0.10)[2.0.0.0,2.0.0.2) |
| Information Exposure | |
| Improper Authentication | |
| Use After Free | |
| Buffer Overflow | |
| Use After Free | |
| Arbitrary Code Execution | [,1.0.6)[1.5.0.0,1.5.0.8)[1.5.0.0,1.5.0.8) |
| User Impersonation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Remote Code Execution (RCE) | |
| Improper Input Validation | |
| CVE-2006-4570 | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Information Exposure | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Use After Free | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Information Exposure | |
| Resource Management Errors | |
| Directory Traversal | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| CVE-2012-5354 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Remote Code Execution (RCE) | |
| Arbitrary Code Execution | [,1.0.3)[1.5.0.0,1.5.0.5)[1.5.0.0,1.5.0.5) |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | [,1.5.0.12)[2.0.0.0,2.0.0.4) |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Use After Free | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Remote Code Execution (RCE) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | [,2.0.10)[3.0.0,3.0.10)[3.1.0,3.1.6) |
| Out-of-Bounds | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | [,1.0.1)[1.5.0.0,1.5.0.2) |
| Access Restriction Bypass | [,1.1.13)[2.0.0.0,2.0.0.18) |
| Arbitrary Code Execution | [,1.0.8)[1.5.0.0,1.5.0.10) |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Remote Code Execution (RCE) | [,2.0.3)[3.0.0,3.0.2)[3.0.0,3.0.18)[3.5.0,3.5.8) |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | [,1.0.6)[1.5.0.0,1.5.0.8)[1.5.0.0,1.5.0.8) |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Information Exposure | |
| Denial of Service (DoS) | |
| CVE-2010-0169 | |
| Use After Free | |
| CVE-2007-3511 | |
| Open Redirect | |
| Out-of-Bounds | |
| Privilege Escalation | |
| Denial of Service (DoS) | |
| User Impersonation | |
| Information Exposure | |
| Information Exposure | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Incorrect Calculation | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Use After Free | |
| Directory Traversal | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | [,1.0.1)[1.0.0,1.0.8)[1.5.0.0,1.5.0.2)[1.7.0,1.7.13) |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Improper Input Validation | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Use After Free | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Denial of Service (DoS) | [,1.0.1)[1.5.0.0,1.5.0.2) |
| Improper Input Validation | |
| Use After Free | |
| Denial of Service (DoS) | [,1.0.3)[1.5.0.0,1.5.0.5)[1.5.0.0,1.5.0.5) |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Authentication Bypass | |
| Use After Free | |
| Cryptographic Issues | |
| Improper Access Control | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Insecure Encryption | |
| Authentication Bypass | [,1.0.8)[1.5.0.0,1.5.0.10)[2.0.0.0,2.0.0.2) |
| CVE-2013-5615 | |
| Resource Management Errors | |
| Remote Code Execution (RCE) | |
| Buffer Overflow | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Remote Code Execution (RCE) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Cross-site Request Forgery (CSRF) | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Directory Traversal | |
| Remote Code Execution (RCE) | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Remote Code Execution (RCE) | |
| XML External Entity (XXE) Injection | |
| Privilege Escalation | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Information Exposure | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Out-of-bounds Write | |
| CVE-2008-3837 | |
| Authentication Bypass | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Use After Free | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| Information Exposure | |
| CVE-2010-3773 | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Use After Free | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Remote Code Execution (RCE) | |
| Improper Input Validation | |
| Resource Management Errors | |
| Out-of-bounds Read | |
| Privilege Escalation | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Improper Access Control | |
| CVE-2007-4879 | |
| Use After Free | |
| Remote Code Execution (RCE) | |
| Use After Free | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Cross-site Request Forgery (CSRF) | |
| Resource Management Errors | |
| Denial of Service (DoS) | [,1.0.7)[1.5.0.0,1.5.0.9)[1.5.0.0,1.5.0.9)[2.0.0.0,2.0.0.1) |
| Remote Code Execution (RCE) | [,1.5.0.12)[,1.5.0.12)[2.0.0.0,2.0.0.4)[2.0.0.0,2.0.0.4) |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Use After Free | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Authentication | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| CVE-2006-3812 | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Authentication | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Use After Free | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | [,1.0.3)[1.5.0.0,1.5.0.5)[1.5.0.0,1.5.0.5) |
| CVE-2010-3181 | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| CVE-2006-1736 | |
| Cryptographic Issues | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Insecure Encryption | |
| Race Condition | |
| Improper Input Validation | |
| CVE-2006-5462 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Cryptographic Issues | |