Use After Free
| |
CVE-2024-3840
| |
CVE-2024-4558
| |
Out-of-bounds Read
| |
CVE-2024-4331
| |
Use After Free
| |
CVE-2024-3914
| |
CVE-2024-4058
| |
CVE-2024-3157
| |
Out-of-Bounds
| |
CVE-2024-2625
| |
CVE-2024-3516
| |
CVE-2024-2887
| |
Out-of-bounds Read
| |
Use After Free
| |
Out-of-Bounds
| |
CVE-2024-1671
| |
CVE-2024-1670
| |
CVE-2024-1676
| |
CVE-2024-1672
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Integer Underflow
| |
CVE-2024-0810
| |
Use After Free
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
CVE-2024-0333
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2023-5484
| |
Insufficient Verification of Data Authenticity
| |
CVE-2023-5486
| |
Out-of-bounds Write
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
CVE-2023-5487
| |
Use After Free
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
CVE-2023-5475
| |
Use After Free
| |