| Timing Attack | |
| Timing Attack | |
| Use After Free | |
| Covert Timing Channel | |
| NULL Pointer Dereference | |
| Off-by-one Error | |
| Compiler Optimization Removal or Modification of Security-critical Code | |
| Missing Cryptographic Step | |
| Out-of-bounds Read | |
| Use of Uninitialized Resource | |
| Insecure Default Initialization of Resource | |
| Buffer Underflow | |
| Improper Certificate Validation | |
| Missing Cryptographic Step | [2.26.0,2.28.9)[3.0.0,3.6.1) |
| Stack-based Buffer Overflow | |
| Out-of-bounds Read | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| Improper Isolation or Compartmentalization | |
| Observable Timing Discrepancy | |
| Heap-based Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Improperly Implemented Security Check for Standard | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| Use of a Broken or Risky Cryptographic Algorithm | [,2.16.11)[2.17.0,2.27.0) |
| Heap-based Buffer Overflow | |
| Cryptographic Issues | |
| Buffer Overread | |
| Denial of Service (DoS) | [,2.16.12)[2.17.0,2.28.0)[3.0.0,3.1.0) |
| Buffer Overflow | [,2.7.18)[2.8.0,2.16.9)[2.17.0,2.25.0) |
| Improper Certificate Validation | |
| User Enumeration | |
| Improper Certificate Validation | |
| User Enumeration | |
| User Enumeration | [,2.7.17)[2.8.0,2.16.8)[2.17.0,2.24.0) |
| Out-of-bounds Read | [,2.7.17)[2.8.0,2.16.8)[2.17.0,2.24.0) |
| Resources Downloaded over Insecure Protocol | |
| Privilege Escalation | [2.1.0,2.1.17)[2.7.0,2.7.8)[2.14.0,2.14.1) |
| Improper Certificate Validation | [,2.7.17)[2.8.0,2.16.8)[2.17.0,2.24.0) |
| Use of a Risky Cryptographic Algorithm | [2.7.0,2.7.15)[2.16.0,2.16.6) |
| Improper Certificate Validation | |
| Information Exposure | [,2.7.17)[2.8.0,2.16.8)[2.17.0,2.24.0) |
| Out-of-bounds Write | [1.3.0,1.3.22)[2.1.0,2.1.10)[2.2.0,2.7.0) |
| User Enumeration | |
| Out-of-bounds Read | |
| Improper Certificate Validation | [,2.7.18)[2.8.0,2.16.9)[2.17.0,2.25.0) |
| Improper Authentication | |
| Out-of-bounds Read | |
| Cryptographic Issues | [,2.1.14)[2.2.0,2.7.5)[2.8.0,2.12.0) |
| Cryptographic Issues | [,2.1.14)[2.2.0,2.7.5)[2.8.0,2.12.0) |
| Out-of-Bounds | [1.3.8,1.3.22)[2.1.0,2.1.10)[2.2.0,2.7.0) |
| User Enumeration | |
| Integer Overflow or Wraparound | |
| Missing Encryption of Sensitive Data | |
| User Enumeration | [,2.7.13)[2.8.0,2.16.4)[2.17.0,2.20.0) |
| Information Exposure | [,2.7.12)[2.8.0,2.16.3)[2.17.0,2.19.0) |
| Insecure Encryption | |
| Cryptographic Issues | |
| Resource Management Errors | |
| Cryptographic Issues | |
| Out-of-Bounds | [1.3.0,1.3.14)[2.0.0,2.1.2) |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Cryptographic Issues | |
| Improper Input Validation | |
| Out-of-Bounds | [1.3.0,1.3.14)[2.0.0,2.1.2) |
| Improper Input Validation | |
| Out-of-Bounds | |
| Cryptographic Issues | |