Information Exposure | |
Use After Free | |
CVE-2024-10458 | |
Incorrect Conversion between Numeric Types | |
CVE-2024-1548 | |
CVE-2024-0742 | |
CVE-2024-0755 | |
CVE-2024-2610 | |
Unchecked Return Value | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2024-2607 | |
CVE-2024-1553 | |
CVE-2023-5388 | |
CVE-2024-1551 | |
Out-of-bounds Write | |
CVE-2024-29944 | |
CVE-2024-2614 | |
CVE-2024-1546 | |
CVE-2024-0746 | |
CVE-2024-0747 | |
CVE-2024-2608 | |
CVE-2024-1549 | |
CVE-2024-0753 | |
CVE-2024-2612 | |
CVE-2024-2616 | |
CVE-2024-2605 | |
CVE-2024-2611 | |
CVE-2024-1547 | |
CVE-2024-0750 | |
Improper Privilege Management | |
Out-of-bounds Write | |
CVE-2023-6860 | |
Use After Free | |
CVE-2023-6863 | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Race Condition | |
CVE-2023-6865 | |
Out-of-bounds Write | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2022-26383 | |
Use After Free | |
CVE-2022-29914 | |
Out-of-bounds Write | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Open Redirect | |
CVE-2022-29916 | |
Inefficient Regular Expression Complexity | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2022-22741 | |
CVE-2022-26384 | |
CVE-2022-26386 | |
Incorrect Authorization | |
CVE-2022-22761 | |
Excessive Iteration | |
CVE-2021-43541 | |
CVE-2021-38510 | |
Improper Encoding or Escaping of Output | |
Incorrect Authorization | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Out-of-bounds Write | |
Incorrect Default Permissions | |
Use After Free | |
Race Condition | |
Use After Free | |
CVE-2021-38501 | |
Improper Certificate Validation | |
Use After Free | |
CVE-2022-22745 | |
Out-of-bounds Write | |
CVE-2022-22748 | |
Information Exposure | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Race Condition | |
CVE-2022-31742 | |
Authentication Bypass | |
Race Condition | |
Origin Validation Error | |
Improper Restriction of Rendered UI Layers or Frames | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Time-of-check Time-of-use (TOCTOU) | |
CVE-2022-22763 | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2021-38492 | |
CVE-2020-26976 | |
CVE-2021-38500 | |
CVE-2021-23953 | |
Out-of-bounds Write | |
CVE-2020-35111 | |
CVE-2022-22759 | |
CVE-2022-34479 | |
CVE-2022-22756 | |
Out-of-bounds Write | |
Information Exposure | |
CVE-2020-26978 | |
CVE-2022-34478 | |
Out-of-bounds Read | |
CVE-2022-31736 | |
CVE-2022-31740 | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Authentication Bypass | |
Inadequate Encryption Strength | |
CVE-2021-23978 | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Information Exposure | |
CVE-2022-22743 | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Information Exposure | |
Use After Free | |
Information Exposure | |
XML Injection | |
CVE-2022-22739 | |
CVE-2021-23969 | |
Race Condition | |
Incorrect Type Conversion or Cast | |
CVE-2020-16012 | |
Cross-site Scripting (XSS) | |
CVE-2021-23960 | |
Out-of-Bounds | |
Use After Free | |
CVE-2020-15683 | |
Cross-site Scripting (XSS) | |
Use After Free | |
Cross-site Scripting (XSS) | |
Release of Invalid Pointer or Reference | |
Out-of-Bounds | |
CVE-2022-34468 | |
CVE-2020-26973 | |
Race Condition | |
Improper Restriction of Rendered UI Layers or Frames | |
Use After Free | |
Improper Cross-boundary Removal of Sensitive Data | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
CVE-2020-26961 | |
Use After Free | |
Missing Initialization of Resource | |
Origin Validation Error | |
Out-of-bounds Write | |
Improper Restriction of Rendered UI Layers or Frames | |
Cross-site Scripting (XSS) | |
CVE-2022-34472 | |
Use of Uninitialized Resource | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Read | |
Incorrect Calculation | |
Improper Privilege Management | |
Release of Invalid Pointer or Reference | |
Improper Privilege Management | |
Missing Initialization of Resource | |
Out-of-bounds Write | |
Improper Check for Unusual or Exceptional Conditions | |
Information Exposure | |
CVE-2020-35112 | |
Insufficient Verification of Data Authenticity | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2022-31739 | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Arbitrary Argument Injection | |
Buffer Overflow | |
Out-of-bounds Write | |
Operation on a Resource after Expiration or Release | |
CVE-2021-23961 | |
Use After Free | |
CVE-2020-6514 | |
Arbitrary Code Injection | |
Information Exposure | |
Use After Free | |
CVE-2020-15653 | |
Arbitrary Code Injection | |
Use After Free | |
Uncontrolled Search Path Element | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
CVE-2020-26966 | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Input Validation | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Open Redirect | |
Out-of-Bounds | |
Out-of-bounds Write | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Incorrect Authorization | |
Out-of-bounds Read | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Interpretation Conflict | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Write | |
Double Free | |
Information Exposure | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Read | |
Insufficient Verification of Data Authenticity | |
Buffer Overflow | |
Use After Free | |
Integer Overflow or Wraparound | |
Cross-site Scripting (XSS) | |
Use After Free | |
Cross-site Scripting (XSS) | |
Buffer Overflow | |
Use After Free | |
CVE-2021-29984 | |
CVE-2019-11730 | |
Origin Validation Error | |
Race Condition | |
Out-of-bounds Read | |
Use After Free | |
Improper Certificate Validation | |
Origin Validation Error | |
Out-of-Bounds | |
Race Condition | |
Improper Input Validation | |
Improper Authentication | |
Improper Input Validation | |
Arbitrary Code Injection | |
Information Exposure | |
Out-of-bounds Read | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Input Validation | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2018-18506 | |
Buffer Overflow | |
CVE-2019-17009 | |
Out-of-bounds Write | |
Information Exposure | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Improper Handling of Exceptional Conditions | |
CVE-2018-5117 | |
Race Condition | |
Use After Free | |
Information Exposure | |
Origin Validation Error | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-Bounds | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Inclusion of Functionality from Untrusted Control Sphere | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
CVE-2023-5732 | |
CVE-2023-5725 | |
Improper Encoding or Escaping of Output | |
Directory Traversal | |
Out-of-Bounds | |
CVE-2023-6208 | |
Improper Authentication | |
Out-of-Bounds | |
Cross-site Request Forgery (CSRF) | |
Out-of-Bounds | |
CVE-2019-11711 | |
Out-of-Bounds | |
CVE-2023-5726 | |
Out-of-bounds Read | |
Improper Input Validation | |
Origin Validation Error | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-Bounds | |
CVE-2023-5727 | |
Out-of-bounds Write | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Write | |
Improper Input Validation | |
CVE-2023-5728 | |
Reachable Assertion | |
Out-of-bounds Read | |
CVE-2023-5724 | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Allocation of Resources Without Limits or Throttling | |
Integer Overflow or Wraparound | |
CVE-2023-4054 | |
Use After Free | |
Origin Validation Error | |
Out-of-bounds Write | |
CVE-2023-4047 | |
Use After Free | |
CVE-2023-4046 | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2023-4051 | |
CVE-2023-37204 | |
CVE-2023-37205 | |
Missing Authorization | |
Missing Encryption of Sensitive Data | |
Out-of-bounds Write | |
Buffer Overflow | |
CVE-2023-4581 | |
CVE-2023-4577 | |
Use After Free | |
CVE-2023-37203 | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Read | |
CVE-2023-4055 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
CVE-2023-25734 | |
CVE-2023-25729 | |
Use After Free | |
CVE-2023-4583 | |
Race Condition | |
Use After Free | |
Use After Free | |
CVE-2023-37208 | |
CVE-2023-23603 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Link Following | |
CVE-2022-46871 | |
Out-of-bounds Write | |
Use After Free | |
Link Following | |
CVE-2023-28164 | |
Out-of-bounds Write | |
CVE-2022-46874 | |
CVE-2023-25730 | |
Improper Check for Unusual or Exceptional Conditions | |
CVE-2023-25752 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
CVE-2022-46875 | |
Out-of-bounds Write | |
CVE-2023-25742 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Link Following | |
Improper Encoding or Escaping of Output | |
Information Exposure | |
CVE-2023-25751 | |
CVE-2022-45410 | |
Link Following | |
CVE-2023-0767 | |
Use After Free | |
CVE-2023-37210 | |
Improper Restriction of Rendered UI Layers or Frames | |
Insecure Storage of Sensitive Information | |
Use After Free | |
CVE-2023-25728 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
CVE-2022-40957 | |
Use After Free | |
Out-of-bounds Write | |
CVE-2023-25737 | |
CVE-2023-28163 | |
Origin Validation Error | |
Incorrect Type Conversion or Cast | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Use of Uninitialized Resource | |
Out-of-bounds Write | |
CVE-2023-32211 | |
CVE-2023-32214 | |
CVE-2023-23598 | |
CVE-2022-45408 | |
Out-of-bounds Read | |
CVE-2023-32212 | |
Authentication Bypass | |
NULL Pointer Dereference | |
Origin Validation Error | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
CVE-2023-29532 | |
Out-of-bounds Read | |
CVE-2022-46877 | |
Out-of-bounds Write | |
CVE-2022-42929 | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Use After Free | |
Origin Validation Error | |
Race Condition | |
CVE-2022-46872 | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Arbitrary Code Injection | |
CVE-2023-29550 | |
Out-of-bounds Write | |
Improper Encoding or Escaping of Output | |
CVE-2023-29533 | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2022-45404 | |
CVE-2023-29548 | |
Out-of-bounds Write | |
CVE-2023-29545 | |
CVE-2022-36319 | |
Double Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
CVE-2023-29542 | |
Improper Certificate Validation | |
Improper Preservation of Permissions | |
CVE-2023-32205 | |
Out-of-bounds Write | |
Use After Free | |
CVE-2023-29535 | |
Uncontrolled Search Path Element | |