CVE-2024-11695
| |
CVE-2024-11694
| |
CVE-2024-11697
| |
CVE-2024-11693
| |
CVE-2024-11696
| |
CVE-2024-11692
| |
CVE-2024-11699
| |
CVE-2024-11691
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Out-of-bounds Write
| |
Inefficient Regular Expression Complexity
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
CVE-2022-29916
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Certificate Validation
| |
CVE-2022-22763
| |
CVE-2022-29913
| |
Incorrect Default Permissions
| |
Out-of-bounds Write
| |
CVE-2022-26386
| |
Use After Free
| |
CVE-2022-26383
| |
Improper Certificate Validation
| |
Time-of-check Time-of-use (TOCTOU)
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
XML Injection
| |
Out-of-bounds Write
| |
Information Exposure
| |
Information Exposure
| |
CVE-2022-26388
| |
Improper Restriction of Rendered UI Layers or Frames
| |
CVE-2021-29981
| |
Out-of-bounds Write
| |
CVE-2021-43541
| |
Race Condition
| |
Missing Initialization of Resource
| |
Race Condition
| |
Integer Overflow or Wraparound
| |
CVE-2021-38510
| |
Excessive Iteration
| |
Cleartext Storage of Sensitive Information
| |
Out-of-bounds Write
| |
Improper Encoding or Escaping of Output
| |
Missing Release of Resource after Effective Lifetime
| |
Use After Free
| |
CVE-2022-22743
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2022-29914
| |
Race Condition
| |
CVE-2021-38501
| |
CVE-2021-23961
| |
CVE-2022-26384
| |
Origin Validation Error
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Information Exposure
| |
Use After Free
| |
Interpretation Conflict
| |
Improper Certificate Validation
| |
CVE-2021-23978
| |
Incorrect Authorization
| |
Authentication Bypass
| |
CVE-2022-31736
| |
CVE-2021-23960
| |
CVE-2020-35111
| |
Out-of-bounds Write
| |
CVE-2020-35112
| |
CVE-2022-22756
| |
CVE-2021-23969
| |
CVE-2020-26978
| |
Origin Validation Error
| |
CVE-2022-22761
| |
Out-of-Bounds
| |
Information Exposure
| |
CVE-2021-29957
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2020-26966
| |
Inadequate Encryption Strength
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Use After Free
| |
Origin Validation Error
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Use After Free
| |
Improper Privilege Management
| |
CVE-2021-38500
| |
Out-of-Bounds
| |
CVE-2020-15683
| |
CVE-2020-26973
| |
CVE-2020-26976
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Out-of-bounds Read
| |
Buffer Overflow
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Files or Directories Accessible to External Parties
| |
Use After Free
| |
Out-of-bounds Read
| |
Cross-site Scripting (XSS)
| |
Race Condition
| |
Directory Traversal
| |
CVE-2021-38492
| |
Use After Free
| |
Race Condition
| |
Use After Free
| |
Incorrect Calculation
| |
Use After Free
| |
Use After Free
| |
CVE-2022-31742
| |
Use After Free
| |
CVE-2023-5724
| |
Out-of-bounds Write
| |
Information Exposure
| |
CVE-2022-1520
| |
CVE-2021-38502
| |
Open Redirect
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Arbitrary Code Injection
| |
Race Condition
| |
Out-of-Bounds
| |
CVE-2023-5727
| |
Arbitrary Command Injection
| |
Cleartext Storage of Sensitive Information
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Cross-site Scripting (XSS)
| |
Out-of-bounds Write
| |
Use After Free
| |
Use of Uninitialized Resource
| |
Use After Free
| |
Use After Free
| |
CVE-2020-16012
| |
CVE-2022-22759
| |
CVE-2022-22739
| |
CVE-2022-22741
| |
CVE-2023-6208
| |
Out-of-Bounds
| |
Cleartext Transmission of Sensitive Information
| |
CVE-2022-34468
| |
CVE-2021-4126
| |
Information Exposure
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Use After Free
| |
Out-of-Bounds
| |
Cross-site Scripting (XSS)
| |
CVE-2021-23953
| |
NULL Pointer Dereference
| |
Use After Free
| |
Race Condition
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Out-of-Bounds
| |
CVE-2022-22748
| |
Out-of-Bounds
| |
CVE-2022-22745
| |
Improper Restriction of Excessive Authentication Attempts
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Improper Privilege Management
| |
Authentication Bypass
| |
Use After Free
| |
Out-of-bounds Read
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Information Exposure
| |
Incorrect Type Conversion or Cast
| |
Out-of-bounds Write
| |
CVE-2024-3864
| |
CVE-2021-29984
| |
Out-of-bounds Read
| |
Improper Restriction of Rendered UI Layers or Frames
| |
CVE-2022-34479
| |
CVE-2023-5726
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Cross-site Scripting (XSS)
| |
Arbitrary Argument Injection
| |
Use After Free
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Improper Privilege Management
| |
Insufficient Verification of Data Authenticity
| |
Incorrect Authorization
| |
HTTP Request Smuggling
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Use of Uninitialized Resource
| |
CVE-2022-31740
| |
Authentication Bypass
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Missing Initialization of Resource
| |
Out-of-bounds Write
| |
Operation on a Resource after Expiration or Release
| |
Information Exposure
| |
CVE-2020-26961
| |
Use After Free
| |
Out-of-Bounds
| |
CVE-2022-31739
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Information Exposure
| |
Insufficient Verification of Data Authenticity
| |
Double Free
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Use of Uninitialized Resource
| |
Arbitrary Code Injection
| |
Cross-site Scripting (XSS)
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Certificate Validation
| |
CVE-2023-5728
| |
Cross-site Scripting (XSS)
| |
CVE-2023-5732
| |
CVE-2023-5725
| |
Use After Free
| |
CVE-2022-34472
| |
CVE-2022-34478
| |
Use After Free
| |