Use of Uninitialized Resource | |
Insecure Default Initialization of Resource | |
Buffer Underflow | |
Improper Certificate Validation | |
Missing Cryptographic Step | [2.26.0,2.28.9)[3.0.0,3.6.1) |
Stack-based Buffer Overflow | |
Out-of-bounds Read | |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
Improper Isolation or Compartmentalization | |
Observable Timing Discrepancy | |
Heap-based Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Improperly Implemented Security Check for Standard | |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
Use of a Broken or Risky Cryptographic Algorithm | [,2.16.11)[2.17.0,2.27.0) |
Heap-based Buffer Overflow | |
Cryptographic Issues | |
Buffer Overread | |
Denial of Service (DoS) | [,2.16.12)[2.17.0,2.28.0)[3.0.0,3.1.0) |
Buffer Overflow | [,2.7.18)[2.8.0,2.16.9)[2.17.0,2.25.0) |
Improper Certificate Validation | |
User Enumeration | |
Improper Certificate Validation | |
User Enumeration | |
User Enumeration | [,2.7.17)[2.8.0,2.16.8)[2.17.0,2.24.0) |
Out-of-bounds Read | [,2.7.17)[2.8.0,2.16.8)[2.17.0,2.24.0) |
Resources Downloaded over Insecure Protocol | |
Privilege Escalation | [2.1.0,2.1.17)[2.7.0,2.7.8)[2.14.0,2.14.1) |
Improper Certificate Validation | [,2.7.17)[2.8.0,2.16.8)[2.17.0,2.24.0) |
Use of a Risky Cryptographic Algorithm | [2.7.0,2.7.15)[2.16.0,2.16.6) |
Improper Certificate Validation | |
Information Exposure | [,2.7.17)[2.8.0,2.16.8)[2.17.0,2.24.0) |
Out-of-bounds Write | [1.3.0,1.3.22)[2.1.0,2.1.10)[2.2.0,2.7.0) |
User Enumeration | |
Out-of-bounds Read | |
Improper Certificate Validation | [,2.7.18)[2.8.0,2.16.9)[2.17.0,2.25.0) |
Improper Authentication | |
Out-of-bounds Read | |
Cryptographic Issues | [,2.1.14)[2.2.0,2.7.5)[2.8.0,2.12.0) |
Cryptographic Issues | [,2.1.14)[2.2.0,2.7.5)[2.8.0,2.12.0) |
Out-of-Bounds | [1.3.8,1.3.22)[2.1.0,2.1.10)[2.2.0,2.7.0) |
User Enumeration | |
Integer Overflow or Wraparound | |
Missing Encryption of Sensitive Data | |
User Enumeration | [,2.7.13)[2.8.0,2.16.4)[2.17.0,2.20.0) |
Information Exposure | [,2.7.12)[2.8.0,2.16.3)[2.17.0,2.19.0) |
Insecure Encryption | |
Cryptographic Issues | |
Resource Management Errors | |
Cryptographic Issues | |
Out-of-Bounds | [1.3.0,1.3.14)[2.0.0,2.1.2) |
Denial of Service (DoS) | |
Resource Management Errors | |
Cryptographic Issues | |
Improper Input Validation | |
Out-of-Bounds | [1.3.0,1.3.14)[2.0.0,2.1.2) |
Improper Input Validation | |
Out-of-Bounds | |
Cryptographic Issues | |
Cryptographic Issues | [,0.9.8y)[1.0.0,1.0.0k)[1.0.1,1.0.1d)[1.2.0,1.2.5)[1.11.0,1.11.8)[1.12.0,1.12.3)[2.1.0,2.1.6)[2.2.0,2.2.6)[2.3.0,2.3.7) |