| Information Exposure | |
| Incorrect Type Conversion or Cast | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Improper Validation of Array Index | |
| Out-of-bounds Read | |
| CVE-2018-17464 | |
| Use After Free | |
| CVE-2018-17471 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| CVE-2018-17476 | |
| CVE-2018-17463 | |
| CVE-2018-17477 | |
| Missing Release of Resource after Effective Lifetime | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Use After Free | |
| Information Exposure | |
| CVE-2018-17475 | |
| CVE-2018-17473 | |
| Incomplete Cleanup | |
| Improper Validation of Array Index | |
| CVE-2018-17459 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Incorrect Permission Assignment for Critical Resource | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Missing Authorization | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Race Condition | |
| Improper Authorization | |
| Improper Authorization | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| CVE-2018-16075 | |
| Improper Authorization | |
| Improper Authorization | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2018-6175 | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Information Exposure | |
| Unrestricted Upload of File with Dangerous Type | |
| CVE-2018-6167 | |
| CVE-2018-6166 | |
| Information Exposure | |
| Use After Free | |
| CVE-2018-6165 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2018-6163 | |
| Information Exposure | |
| CVE-2018-6173 | |
| Race Condition | |
| Improper Input Validation | |
| Information Exposure | |
| CVE-2018-6172 | |
| Out-of-bounds Read | |
| Information Exposure | |
| Out-of-bounds Write | |
| CVE-2018-6044 | |
| Integer Overflow or Wraparound | |
| Incorrect Type Conversion or Cast | |
| Out-of-bounds Read | |
| CRLF Injection | |
| Out-of-Bounds | |
| Incorrect Type Conversion or Cast | |
| CVE-2010-1765 | |
| Improper Data Handling | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | |
| Open Redirect | |
| CVE-2018-6125 | |
| CVE-2018-6107 | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Information Exposure | |
| Improper Input Validation | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| CVE-2018-6103 | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2018-6135 | |
| Out-of-bounds Read | |
| Arbitrary Code Injection | |
| CVE-2018-6098 | |
| Improper Privilege Management | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| CVE-2018-6108 | |
| Improper Input Validation | |
| Incorrect Type Conversion or Cast | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Information Exposure | |
| Use of Incorrectly-Resolved Name or Reference | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Use After Free | |
| Improper Input Validation | |
| Improper Data Handling | |
| Incorrect Type Conversion or Cast | |
| CVE-2016-5194 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Information Exposure | |
| Incorrect Permission Assignment for Critical Resource | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Data Handling | |
| Improper Input Validation | |
| Race Condition | |
| Incorrect Type Conversion or Cast | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| CVE-2018-6049 | |
| Information Exposure | |
| CVE-2016-9652 | |
| Improper Input Validation | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | |
| Information Exposure | |
| Use After Free | |
| Out-of-Bounds | |
| Use of Uninitialized Resource | |
| CVE-2018-6105 | |
| Improper Input Validation | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Input Validation | |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Read | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | |
| Out-of-bounds Write | |
| Incorrect Permission Assignment for Critical Resource | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Incorrect Permission Assignment for Critical Resource | |
| Out-of-Bounds | |
| Improper Data Handling | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2018-6083 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| CVE-2018-6104 | |
| Out-of-bounds Write | |
| Cryptographic Issues | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Improper Data Handling | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Exposure of Resource to Wrong Sphere | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Input Validation | |
| CVE-2017-15391 | |
| CVE-2017-15387 | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Incorrect Type Conversion or Cast | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Read | |
| Information Exposure | |
| Information Exposure | |
| Incorrect Permission Assignment for Critical Resource | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Incorrect Type Conversion or Cast | |
| Improper Input Validation | |
| Information Exposure | |
| Information Exposure | |
| Out-of-Bounds | |
| Race Condition | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Incorrect Type Conversion or Cast | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Incorrect Type Conversion or Cast | |
| Out-of-bounds Read | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2017-5120 | |
| CVE-2017-5078 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Improper Input Validation | |
| Incorrect Type Conversion or Cast | |
| Use After Free | |
| Incorrect Type Conversion or Cast | |
| Improper Privilege Management | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Information Exposure | |
| Race Condition | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Missing Encryption of Sensitive Data | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | |
| Information Exposure | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Preservation of Permissions | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Origin Validation Error | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Restriction of Rendered UI Layers or Frames | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| CVE-2017-5022 | |
| Use After Free | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| CVE-2017-5013 | |
| Information Exposure | |
| CVE-2017-5027 | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| CVE-2017-5015 | |
| Out-of-Bounds | |
| Improper Access Control | |
| Cross-site Scripting (XSS) | |
| Improper Data Handling | |
| Improper Data Handling | |
| Use After Free | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Improper Access Control | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Information Exposure | |
| Numeric Errors | |
| Improper Input Validation | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Integer Overflow or Wraparound | |
| Cross-site Scripting (XSS) | |
| Improper Data Handling | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Improper Access Control | |
| Improper Access Control | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Access Control | |
| Improper Input Validation | |
| Improper Access Control | |
| CVE-2016-7549 | |
| CVE-2016-5175 | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Security Features | |
| Integer Overflow or Wraparound | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Security Features | |
| Integer Overflow or Wraparound | |
| Cross-site Scripting (XSS) | |
| Security Features | |
| Improper Data Handling | |
| CVE-2016-5167 | |
| Security Features | |
| Out-of-Bounds | |
| Use After Free | |
| Arbitrary Code Injection | |
| Information Exposure | |
| Incorrect Type Conversion or Cast | |
| Cross-site Scripting (XSS) | |
| Improper Data Handling | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Security Features | |
| Use After Free | |
| Improper Access Control | |
| CVE-2016-5146 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Input Validation | |
| Improper Authentication | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Authorization | |
| Information Exposure | |
| Security Features | |
| Improper Authorization | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Input Validation | |
| Security Features | |
| Improper Access Control | |
| CVE-2016-1705 | |
| CVE-2016-1704 | |
| CVE-2016-1674 | |
| Information Exposure | |
| Security Features | |
| Improper Access Control | |
| Out-of-Bounds | |
| Improper Access Control | |
| Security Features | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2016-1684 | |
| CVE-2016-1703 | |
| Out-of-Bounds | |
| CVE-2016-1673 | |
| Improper Access Control | |
| CVE-2016-1695 | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Access Control | |
| CVE-2016-1701 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2016-1690 | |
| Out-of-Bounds | |
| Security Features | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Access Control | |
| Improper Access Control | |
| CVE-2016-1700 | |
| CVE-2016-1679 | |
| Improper Access Control | |
| Improper Input Validation | |
| CVE-2016-1663 | |
| Improper Input Validation | |
| Improper Access Control | |
| Race Condition | |
| Improper Input Validation | |
| Improper Access Control | |
| CVE-2016-1662 | |
| CVE-2016-1666 | |
| Out-of-Bounds | |
| Security Features | |
| Security Features | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2016-1659 | |
| CVE-2016-1655 | |
| Information Exposure | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| CVE-2016-1650 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2016-1648 | |
| CVE-2016-1647 | |
| Out-of-Bounds | |
| CVE-2016-1644 | |
| Time and State | |
| Code | |
| Access Restriction Bypass | |
| Information Exposure | |
| Improper Access Control | |
| CVE-2016-1634 | |
| CVE-2016-1642 | |
| CVE-2016-2843 | |
| Access Restriction Bypass | |
| CVE-2016-1635 | |
| Information Exposure | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| CVE-2016-1639 | |
| CVE-2016-1641 | |
| Access Restriction Bypass | |
| CVE-2016-1633 | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Information Exposure | |
| CVE-2016-1613 | |
| CVE-2016-1620 | |
| Cryptographic Issues | |
| CVE-2016-2052 | |
| Security Features | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Security Features | |
| Numeric Errors | |
| CVE-2015-6792 | |
| Race Condition | |
| CVE-2015-6788 | |
| CVE-2015-8548 | |
| CVE-2015-6791 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| CVE-2015-8478 | |
| Numeric Errors | |
| CVE-2015-6780 | |
| CVE-2015-6775 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2015-6787 | |
| CVE-2015-6766 | |
| CVE-2015-6774 | |
| CVE-2015-6765 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| CVE-2015-6777 | |
| CVE-2015-6767 | |
| Buffer Overflow | |
| Improper Input Validation | |
| Race Condition | |
| Information Exposure | |
| CVE-2015-6763 | |
| Code | |
| CVE-2015-6756 | |
| Access Restriction Bypass | |
| CVE-2015-7834 | |
| Code | |
| CVE-2015-6757 | |
| Security Features | |
| Improper Input Validation | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Security Features | |
| Security Features | |
| Security Features | |
| CVE-2015-1294 | |
| Access Restriction Bypass | |
| Security Features | |
| CVE-2015-1299 | |
| Access Restriction Bypass | |
| CVE-2015-6580 | |
| Security Features | |
| Security Features | |
| CVE-2015-1295 | |
| CVE-2015-1301 | |
| CVE-2015-6581 | |
| Improper Input Validation | |
| CVE-2015-1289 | |
| CVE-2015-1277 | |
| Security Features | |
| Code | |
| Numeric Errors | |
| CVE-2015-1282 | |
| Out-of-Bounds | |
| Security Features | |
| Cross-site Scripting (XSS) | |
| Numeric Errors | |
| Out-of-Bounds | |
| CVE-2015-1272 | |
| Security Features | |
| Out-of-Bounds | |
| Code | |
| CVE-2015-1276 | |
| Information Exposure | |
| Improper Data Handling | |
| Security Features | |
| Security Features | |
| Security Features | |
| Security Features | |
| Out-of-Bounds | |
| Numeric Errors | |
| CVE-2015-1256 | |
| CVE-2015-1260 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| CVE-2015-3910 | |
| CVE-2015-1255 | |
| Improper Access Control | |
| Code | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| CVE-2015-1265 | |
| CVE-2015-1251 | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Code | |
| Code | |
| CVE-2015-1250 | |
| CVE-2015-1243 | |
| CVE-2015-1249 | |
| Information Exposure | |
| CVE-2015-1242 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2015-1237 | |
| Access Restriction Bypass | |
| Information Exposure | |
| Code | |
| Improper Input Validation | |
| CVE-2015-1245 | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| CVE-2015-3333 | |
| Access Restriction Bypass | |
| Code | |
| Race Condition | |
| CVE-2015-1216 | |
| Out-of-Bounds | |
| Improper Data Handling | |
| Code | |
| Resource Management Errors | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| CVE-2015-1223 | |
| Access Restriction Bypass | |
| CVE-2015-1218 | |
| CVE-2015-1230 | |
| Out-of-Bounds | |
| Improper Data Handling | |
| CVE-2015-1231 | |
| Code | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| CVE-2015-1221 | |
| CVE-2015-1222 | |
| CVE-2015-1220 | |
| Numeric Errors | |
| CVE-2015-2238 | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Use After Free | |
| CVE-2015-1212 | |
| CVE-2015-1210 | |
| CVE-2015-1211 | |
| Out-of-Bounds | |
| Numeric Errors | |
| Code | |
| CVE-2014-9647 | |
| Out-of-Bounds | |
| CVE-2014-7924 | |
| CVE-2014-7932 | |
| Out-of-Bounds | |
| CVE-2014-7935 | |
| Out-of-Bounds | |
| CVE-2014-7934 | |
| CVE-2015-1346 | |
| Access Restriction Bypass | |
| CVE-2014-7930 | |
| Out-of-Bounds | |
| Code | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Code | |
| CVE-2015-1205 | |
| CVE-2014-7925 | |
| Numeric Errors | |
| Code | |
| CVE-2014-7933 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2014-7936 | |
| Code | |
| Out-of-Bounds | |
| Improper Data Handling | |
| Cryptographic Issues | |
| Improper Input Validation | |
| Improper Input Validation | |
| Numeric Errors | |
| Numeric Errors | |
| CVE-2011-1796 | |
| CVE-2014-7910 | |
| Out-of-Bounds | |
| Numeric Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Code | |
| Improper Access Control | |
| Improper Input Validation | |
| Resource Management Errors | |
| Numeric Errors | |
| Resource Management Errors | |
| Numeric Errors | |
| Cryptographic Issues | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Use After Free | |
| Use After Free | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Use After Free | |
| CVE-2014-7967 | |
| Resource Management Errors | |
| Use After Free | |
| Use After Free | |
| CVE-2014-3200 | |
| CVE-2014-3179 | |
| CVE-2014-3178 | |
| CVE-2014-3168 | |
| CVE-2014-3171 | |
| Access Restriction Bypass | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Access Restriction Bypass | |
| CVE-2014-3175 | |
| Out-of-Bounds | |
| CVE-2014-3169 | |
| Information Exposure | |
| CVE-2014-3165 | |
| CVE-2014-3167 | |
| Access Restriction Bypass | |
| CVE-2014-3162 | |
| CVE-2014-3155 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2014-3154 | |
| Numeric Errors | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Numeric Errors | |
| CVE-2014-1749 | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| CVE-2014-1748 | |
| Numeric Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Numeric Errors | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| CVE-2014-1735 | |
| Resource Management Errors | |
| CVE-2014-1734 | |
| Improper Input Validation | |
| Resource Management Errors | |
| Resource Management Errors | |
| Numeric Errors | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |
| CVE-2014-1726 | |
| Numeric Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Numeric Errors | |
| CVE-2014-1729 | |
| CVE-2014-1728 | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Directory Traversal | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2014-1704 | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2013-6668 | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| CVE-2013-6667 | |
| Resource Management Errors | |
| Cryptographic Issues | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Information Exposure | |
| CVE-2013-6661 | |
| Cross-site Request Forgery (CSRF) | |
| Improper Input Validation | |
| Resource Management Errors | |
| CVE-2014-1681 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Authentication | |
| Use After Free | |
| Resource Management Errors | |
| Improper Authentication | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2013-6637 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| CVE-2013-6631 | |
| Numeric Errors | |
| Information Exposure | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Resource Management Errors | |
| CVE-2013-6626 | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Resource Management Errors | |
| CVE-2013-2931 | |
| Out-of-Bounds | |
| CVE-2013-6628 | |
| Resource Management Errors | |
| CVE-2013-2928 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2013-2908 | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2013-2923 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Race Condition | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2013-2915 | |
| Resource Management Errors | |
| CVE-2013-2916 | |
| Access Restriction Bypass | |
| CVE-2013-2887 | |
| Directory Traversal | |
| Resource Management Errors | |
| Numeric Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2013-2882 | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| CVE-2013-2886 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Out-of-Bounds | |
| CVE-2013-2867 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| CVE-2013-2868 | |
| Out-of-Bounds | |
| CVE-2013-2880 | |
| CVE-2013-2853 | |
| Information Exposure | |
| Out-of-Bounds | |
| Use After Free | |
| Resource Management Errors | |
| CVE-2013-2865 | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| CVE-2013-2859 | |
| Use After Free | |
| Information Exposure | |
| Race Condition | |
| Cross-site Scripting (XSS) | |
| CVE-2013-2836 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Arbitrary Code Injection | |
| Information Exposure | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Directory Traversal | |
| Improper Authentication | |
| CVE-2013-0908 | |
| Resource Management Errors | |
| Race Condition | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Numeric Errors | |
| Race Condition | |
| Out-of-Bounds | |
| CVE-2013-0884 | |
| Race Condition | |
| Access Restriction Bypass | |
| CVE-2013-0892 | |
| CVE-2013-2268 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Directory Traversal | |
| Buffer Overflow | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Improper Input Validation | |
| CVE-2013-0840 | |
| CVE-2013-0842 | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Use After Free | |
| Resource Management Errors | |
| CVE-2013-0835 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Directory Traversal | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Out-of-Bounds | |
| CVE-2012-5141 | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Use After Free | |
| Arbitrary Code Injection | |
| CVE-2012-5138 | |
| Use After Free | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Improper Input Validation | |
| CVE-2012-5132 | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Numeric Errors | |
| Use After Free | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Improper Privilege Management | |
| CVE-2012-5111 | |
| Out-of-bounds Read | |
| Race Condition | |
| Out-of-bounds Read | |
| CVE-2012-2900 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| CVE-2012-2892 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Race Condition | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Information Exposure | |
| Improper Input Validation | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Cryptographic Issues | |
| Cryptographic Issues | |
| CVE-2012-2867 | |
| Out-of-Bounds | |
| CVE-2012-2866 | |
| Race Condition | |
| CVE-2012-2871 | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| CVE-2012-2846 | |
| Numeric Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| CVE-2012-2860 | |
| CVE-2012-2853 | |
| Out-of-Bounds | |
| Information Exposure | |
| Resource Management Errors | |
| Resource Management Errors | |
| Information Exposure | |
| Numeric Errors | |
| Resource Management Errors | |
| Improper Input Validation | |
| CVE-2012-2830 | |
| Improper Input Validation | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2012-2821 | |
| CVE-2012-2826 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| CVE-2011-3107 | |
| CVE-2011-3109 | |
| CVE-2011-3087 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| CVE-2011-3100 | |
| CVE-2011-3101 | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Race Condition | |
| Resource Management Errors | |
| Resource Management Errors | |
| Use After Free | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Origin Validation Error | |
| Use After Free | |
| Origin Validation Error | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Improper Certificate Validation | |
| Incorrect Calculation | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| CVE-2011-3049 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Missing Authentication for Critical Function | |
| Exposure of Resource to Wrong Sphere | |
| Improper Privilege Management | |
| Use After Free | |
| Origin Validation Error | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Buffer Overflow | |
| Out-of-bounds Read | |
| Use After Free | |
| Incorrect Type Conversion or Cast | |
| Incorrect Type Conversion or Cast | |
| Incorrect Type Conversion or Cast | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Cleartext Transmission of Sensitive Information | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2011-3020 | |
| Out-of-bounds Write | |
| Improper Certificate Validation | |
| Use After Free | |
| Race Condition | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Buffer Overflow | |
| Use After Free | |
| CVE-2011-3955 | |
| Use After Free | |
| Use After Free | |
| Improper Verification of Cryptographic Signature | |
| CVE-2011-3953 | |
| Out-of-bounds Read | |
| CVE-2011-3967 | |
| Resource Exhaustion | |
| Use After Free | |
| Origin Validation Error | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Improper Initialization | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Use After Free | |
| Insufficient Comparison | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Improper Privilege Management | |
| Out-of-Bounds | |
| Use After Free | |
| Double Free | |
| Buffer Overflow | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Untrusted Search Path | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| CVE-2011-3876 | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Use After Free | |
| CVE-2011-3879 | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Race Condition | |
| CVE-2011-3891 | |
| Improper Input Validation | |
| Use After Free | |
| CVE-2011-2877 | |
| Out-of-Bounds | |
| CVE-2011-2879 | |
| Use After Free | |
| CVE-2011-2878 | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Use After Free | |
| Incorrect Default Permissions | |
| Improper Certificate Validation | |
| Off-by-one Error | |
| Arbitrary Code Injection | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| CVE-2011-2837 | |
| Use After Free | |
| CVE-2011-2836 | |
| Race Condition | |
| Origin Validation Error | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2011-3421 | |
| CVE-2011-3420 | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Double Free | |
| Use After Free | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| CVE-2011-2826 | |
| Access Restriction Bypass | |
| CVE-2011-2360 | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Incorrect Default Permissions | |
| CVE-2011-2798 | |
| Arbitrary Code Injection | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| Use After Free | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Authentication | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| CVE-2011-2819 | |
| CVE-2011-2795 | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Information Exposure | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| CVE-2011-2350 | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| CVE-2011-1812 | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| CVE-2011-1801 | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Incorrect Type Conversion or Cast | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Improper Input Validation | |
| Incorrect Default Permissions | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2011-1446 | |
| Use After Free | |
| Race Condition | |
| Race Condition | |
| CVE-2011-1439 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Incorrect Type Conversion or Cast | |
| Improper Input Validation | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| CVE-2011-1304 | |
| Use After Free | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| Buffer Overflow | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Numeric Errors | |
| CVE-2011-1199 | |
| Improper Input Validation | |
| Information Exposure | |
| CVE-2011-1189 | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| CVE-2011-1203 | |
| CVE-2011-1194 | |
| CVE-2011-1413 | |
| CVE-2011-1201 | |
| Incorrect Type Conversion or Cast | |
| Out-of-bounds Read | |
| CVE-2011-1188 | |
| Improper Input Validation | |
| CVE-2011-1196 | |
| CVE-2011-1185 | |
| CVE-2011-1117 | |
| Improper Input Validation | |
| CVE-2011-1108 | |
| Out-of-bounds Read | |
| CVE-2011-1107 | |
| CVE-2011-1119 | |
| Improper Input Validation | |
| CVE-2011-1112 | |
| Improper Input Validation | |
| CVE-2011-1114 | |
| CVE-2011-1116 | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2011-1115 | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Incorrect Authorization | |
| Out-of-bounds Read | |
| CVE-2011-1125 | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Improper Input Validation | |
| Resource Exhaustion | |
| Use After Free | |
| Access Restriction Bypass | |
| CVE-2011-0783 | |
| Improper Input Validation | |
| Use After Free | |
| Race Condition | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| CVE-2011-0470 | |
| CVE-2011-0473 | |
| Improper Input Validation | |
| Incorrect Type Conversion or Cast | |
| Incorrect Type Conversion or Cast | |
| CVE-2011-0474 | |
| Access of Uninitialized Pointer | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2010-4578 | |
| Deserialization of Untrusted Data | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| CVE-2010-4487 | |
| Double Free | |
| Improper Authentication | |
| CVE-2010-4490 | |
| Use After Free | |
| CVE-2010-4484 | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| CVE-2010-4482 | |
| Access Restriction Bypass | |
| Use After Free | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Use After Free | |
| CVE-2010-4204 | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2010-4205 | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2010-4037 | |
| CVE-2010-4033 | |
| Improper Resource Shutdown or Release | |
| CVE-2010-4041 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| CVE-2010-3730 | |
| Incorrect Type Conversion or Cast | |
| Use After Free | |
| Off-by-one Error | |
| Use After Free | |
| Use After Free | |
| Cross-site Request Forgery (CSRF) | |
| Use After Free | |
| Out-of-Bounds | |
| Reachable Assertion | |
| Out-of-Bounds | |
| Information Exposure | |
| CVE-2010-3413 | |
| Resource Management Errors | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2010-3249 | |
| Deserialization of Untrusted Data | |
| Use After Free | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| CVE-2010-3250 | |
| CVE-2010-3248 | |
| CVE-2010-3246 | |
| CVE-2010-3256 | |
| Improper Input Validation | |
| Use After Free | |
| CVE-2010-3114 | |
| Out-of-Bounds | |
| Information Exposure | |
| CVE-2010-3115 | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2010-3111 | |
| CVE-2010-3117 | |
| Access Restriction Bypass | |
| Credentials Management | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2010-2899 | |
| Out-of-Bounds | |
| CVE-2010-2898 | |
| CVE-2010-2903 | |
| CVE-2010-2897 | |
| Out-of-Bounds | |
| CVE-2010-2900 | |
| Numeric Errors | |
| CVE-2010-2645 | |
| CVE-2010-2652 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2010-2646 | |
| Out-of-Bounds | |
| CVE-2010-2650 | |
| CVE-2010-2649 | |
| Access Restriction Bypass | |
| Information Exposure | |
| CVE-2010-1769 | |
| Resource Management Errors | |
| CVE-2010-1763 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Arbitrary Code Injection | |
| Use After Free | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2010-1764 | |
| Resource Management Errors | |
| Arbitrary Code Injection | |
| Resource Management Errors | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| CVE-2010-1421 | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Directory Traversal | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| CVE-2010-1409 | |
| Resource Management Errors | |
| Cryptographic Issues | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| CVE-2010-1422 | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Information Exposure | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| CVE-2010-2108 | |
| CVE-2010-2109 | |
| CVE-2010-2110 | |
| CVE-2010-2105 | |
| CVE-2010-2106 | |
| CVE-2010-2107 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| CVE-2010-1502 | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| CVE-2010-1500 | |
| CVE-2010-1506 | |
| Race Condition | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Input Validation | |
| Numeric Errors | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| CVE-2010-1231 | |
| CVE-2010-1234 | |
| Improper Input Validation | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Information Exposure | |
| Information Exposure | |
| Numeric Errors | |
| Numeric Errors | |
| Numeric Errors | |
| Information Exposure | |
| Information Exposure | |
| Access Restriction Bypass | |
| Information Exposure | |
| Resource Management Errors | |
| CVE-2010-0657 | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Numeric Errors | |
| Information Exposure | |
| Numeric Errors | |
| Credentials Management | |
| CVE-2010-0315 | |
| CVE-2010-0314 | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Improper Authentication | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| CVE-2009-0374 | |
| Numeric Errors | |
| Resource Management Errors | |
| Resource Management Errors | |