Use After Free | |
CVE-2024-3840 | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Out-of-Bounds | |
CVE-2024-2625 | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Read | |
Use After Free | |
Out-of-Bounds | |
CVE-2024-1671 | |
Use After Free | |
Cross-site Scripting (XSS) | |
CVE-2024-1672 | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Integer Underflow | |
CVE-2024-0810 | |
Use After Free | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
CVE-2024-0333 | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2023-5484 | |
Insufficient Verification of Data Authenticity | |
CVE-2023-5486 | |
Out-of-bounds Write | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
CVE-2023-5487 | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Use After Free | |
CVE-2023-5475 | |
Use After Free | |