Out-of-bounds Write | |
CVE-2022-28283 | |
CVE-2022-28287 | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2022-26383 | |
Use After Free | |
Out-of-bounds Read | |
CVE-2022-22750 | |
Out-of-bounds Read | |
CVE-2022-22749 | |
Race Condition | |
Out-of-bounds Write | |
CVE-2022-22756 | |
Origin Validation Error | |
CVE-2022-22748 | |
Inefficient Regular Expression Complexity | |
CVE-2022-28284 | |
CVE-2022-26384 | |
Time-of-check Time-of-use (TOCTOU) | |
Uncontrolled Search Path Element | |
CVE-2022-22759 | |
CVE-2022-22762 | |
Use After Free | |
Excessive Iteration | |
Use After Free | |
Information Exposure | |
Use After Free | |
CVE-2021-43540 | |
Operation on a Resource after Expiration or Release | |
Improper Restriction of Rendered UI Layers or Frames | |
XML Injection | |
CVE-2022-22739 | |
CVE-2021-38500 | |
Origin Validation Error | |
Improper Certificate Validation | |
CVE-2021-38499 | |
CVE-2022-22741 | |
Out-of-bounds Write | |
CVE-2022-22761 | |
CVE-2021-38501 | |
Race Condition | |
Use After Free | |
Cleartext Transmission of Sensitive Information | |
Race Condition | |
Out-of-bounds Write | |
Incorrect Authorization | |
Information Exposure | |
Race Condition | |
CVE-2022-22745 | |
Exposure of Resource to Wrong Sphere | |
Cross-site Scripting (XSS) | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2021-38492 | |
Missing Initialization of Resource | |
Improper Restriction of Rendered UI Layers or Frames | |
Time-of-check Time-of-use (TOCTOU) | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Interpretation Conflict | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Write | |
Externally Controlled Reference to a Resource in Another Sphere | |
Out-of-bounds Write | |
Use After Free | |
Improper Resource Shutdown or Release | |
CVE-2022-22743 | |
CVE-2021-29975 | |
CVE-2021-38494 | |
CVE-2021-29974 | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Encoding or Escaping of Output | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2021-29983 | |
Incorrect Calculation | |
Exposure of Resource to Wrong Sphere | |
Race Condition | |
Origin Validation Error | |
Out-of-bounds Write | |
CVE-2021-38491 | |
Missing Release of Resource after Effective Lifetime | |
Incorrect Conversion between Numeric Types | |
Arbitrary Argument Injection | |
CVE-2021-23996 | |
Out-of-Bounds | |
Missing Initialization of Resource | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Write | |
CVE-2021-29993 | |
CVE-2021-43541 | |
Information Exposure | |
HTTP Request Smuggling | |
CVE-2021-23969 | |
Origin Validation Error | |
CVE-2021-24000 | |
Time-of-check Time-of-use (TOCTOU) | |
CVE-2021-29984 | |
Missing Authorization | |
Use After Free | |
CVE-2021-38510 | |
Use After Free | |
Incorrect Type Conversion or Cast | |
Information Exposure | |
Integer Overflow or Wraparound | |
CVE-2021-23957 | |
Exposure of Resource to Wrong Sphere | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Incorrect Authorization | |
CVE-2021-23961 | |
Improper Preservation of Permissions | |
Authentication Bypass | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-Bounds | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2021-23971 | |
Out-of-Bounds | |
Race Condition | |
Improper Restriction of Rendered UI Layers or Frames | |
Insufficient Verification of Data Authenticity | |
Out-of-bounds Write | |
Open Redirect | |
CVE-2021-23972 | |
Improper Privilege Management | |
CVE-2021-23974 | |
Out-of-Bounds | |
Reachable Assertion | |
Insufficient Verification of Data Authenticity | |
Operation on a Resource after Expiration or Release | |
CVE-2020-26977 | |
Improper Initialization | |
Improper Cross-boundary Removal of Sensitive Data | |
CVE-2021-23978 | |
Reliance on Cookies without Validation and Integrity Checking | |
Improper Restriction of Excessive Authentication Attempts | |
CVE-2020-26964 | |
CVE-2020-26961 | |
CVE-2021-29981 | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Incorrect Resource Transfer Between Spheres | |
Out-of-Bounds | |
Out-of-bounds Write | |
CVE-2021-23962 | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Missing Authorization | |
Incorrect Authorization | |
Origin Validation Error | |
Open Redirect | |
Cross-site Scripting (XSS) | |
Information Exposure | |
CVE-2020-26967 | |
CVE-2020-26973 | |
CVE-2021-23956 | |
Out-of-Bounds | |
Out-of-bounds Write | |
CVE-2020-26975 | |
CVE-2020-26966 | |
CVE-2020-16012 | |
Exposure of Resource to Wrong Sphere | |
Release of Invalid Pointer or Reference | |
Unrestricted Upload of File with Dangerous Type | |
CVE-2020-6514 | |
CVE-2020-26976 | |
Release of Invalid Pointer or Reference | |
CVE-2020-15653 | |
Out-of-bounds Write | |
Improper Check for Unusual or Exceptional Conditions | |
Inadequate Encryption Strength | |
Buffer Overflow | |
CVE-2021-23960 | |
CVE-2020-35112 | |
Use After Free | |
Improper Privilege Management | |
Out-of-bounds Write | |
CVE-2020-6829 | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Use After Free | |
Insufficient Verification of Data Authenticity | |
CVE-2020-26978 | |
Information Exposure | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2020-15681 | |
Out-of-bounds Write | |
Incorrect Default Permissions | |
Uncontrolled Search Path Element | |
CVE-2020-35111 | |
Information Exposure | |
CVE-2020-15665 | |
Use After Free | |
Race Condition | |
Release of Invalid Pointer or Reference | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Deserialization of Untrusted Data | |
Use After Free | |
Out-of-Bounds | |
Origin Validation Error | |
CVE-2020-26954 | |
CVE-2020-26963 | |
Uncontrolled Search Path Element | |
Out-of-bounds Read | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
Improper Input Validation | |
CVE-2020-12409 | |
Incorrect Authorization | |
Out-of-Bounds | |
Information Exposure | |
Incorrect Default Permissions | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use of a Broken or Risky Cryptographic Algorithm | |
Arbitrary Code Injection | |
CVE-2020-15683 | |
Information Exposure | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-Bounds | |
CVE-2020-15680 | |
Out-of-Bounds | |
Use After Free | |
Improper Locking | |
Out-of-Bounds | |
Improper Input Validation | |
Buffer Overflow | |
Use After Free | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Use of a Broken or Risky Cryptographic Algorithm | |
Race Condition | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Double Free | |
Improper Certificate Validation | |
CVE-2020-15684 | |
Cross-site Scripting (XSS) | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2023-5727 | |
Use After Free | |
Out-of-bounds Read | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
CVE-2022-36319 | |
Uncontrolled Search Path Element | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Authentication Bypass | |
Use After Free | |
Buffer Overflow | |
Improper Privilege Management | |
CVE-2022-34472 | |
Out-of-bounds Write | |
Session Fixation | |
Improper Authentication | |
Improper Input Validation | |
CVE-2023-5723 | |
Out-of-bounds Write | |
Origin Validation Error | |
Cross-site Scripting (XSS) | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
CVE-2022-34471 | |
Out-of-bounds Write | |
CVE-2023-5729 | |
Use After Free | |
CVE-2023-5724 | |
CVE-2022-31736 | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Arbitrary Code Injection | |
Out-of-bounds Read | |
CVE-2022-31740 | |
Use After Free | |
CVE-2022-31748 | |
Improper Certificate Validation | |
Out-of-bounds Write | |
CVE-2023-5728 | |
Authentication Bypass | |
Out-of-bounds Write | |
Use After Free | |
CVE-2020-6813 | |
CVE-2022-34476 | |
Out-of-Bounds | |
CVE-2022-34477 | |
Cross-site Scripting (XSS) | |
Integer Overflow or Wraparound | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Open Redirect | |
Cross-site Scripting (XSS) | |
Incorrect Default Permissions | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Race Condition | |
Improper Authentication | |
Buffer Overflow | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
Access of Uninitialized Pointer | |
CVE-2022-31739 | |
Out-of-bounds Write | |
Information Exposure | |
CVE-2023-5725 | |
Cross-site Scripting (XSS) | |
CVE-2023-5726 | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
CVE-2022-34479 | |
CVE-2022-34482 | |
Incorrect Default Permissions | |
CVE-2022-36315 | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2022-29915 | |
Open Redirect | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Use of Uninitialized Resource | |
CVE-2022-34478 | |
Open Redirect | |
CVE-2022-36317 | |
Authentication Bypass | |
Cross-site Scripting (XSS) | |
CVE-2022-34483 | |
CVE-2022-34468 | |
CVE-2022-31742 | |
Improper Validation of Array Index | |
Out-of-bounds Read | |
Out-of-bounds Write | |
CVE-2022-29916 | |
Open Redirect | |
CVE-2022-29914 | |
Out-of-bounds Write | |