CVE-2022-34472 | |
CVE-2022-34468 | |
CVE-2022-34479 | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
CVE-2022-31742 | |
Cross-site Scripting (XSS) | |
CVE-2022-31736 | |
Out-of-bounds Write | |
Use of Uninitialized Resource | |
Authentication Bypass | |
Out-of-bounds Read | |
CVE-2022-31740 | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Incorrect Default Permissions | |
Out-of-bounds Write | |
Open Redirect | |
CVE-2022-29914 | |
CVE-2022-29916 | |
Improper Restriction of Rendered UI Layers or Frames | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Inefficient Regular Expression Complexity | |
CVE-2022-26386 | |
Time-of-check Time-of-use (TOCTOU) | |
CVE-2022-26384 | |
CVE-2022-26383 | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2022-22763 | |
CVE-2022-22759 | |
Out-of-bounds Write | |
Information Exposure | |
CVE-2022-22761 | |
Incorrect Authorization | |
CVE-2022-22756 | |
Out-of-bounds Write | |
CVE-2022-22743 | |
Out-of-bounds Read | |
Improper Certificate Validation | |
CVE-2022-22741 | |
Use After Free | |
XML Injection | |
CVE-2022-22739 | |
Out-of-bounds Write | |
CVE-2022-22745 | |
CVE-2022-22748 | |
Race Condition | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Information Exposure | |
Race Condition | |
CVE-2021-43541 | |
Excessive Iteration | |
Cross-site Scripting (XSS) | |
Incorrect Type Conversion or Cast | |
Information Exposure | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Restriction of Rendered UI Layers or Frames | |
Use After Free | |
Origin Validation Error | |
Improper Restriction of Rendered UI Layers or Frames | |
Incorrect Authorization | |
CVE-2021-38500 | |
Use After Free | |
Out-of-bounds Write | |
Race Condition | |
Missing Initialization of Resource | |
Interpretation Conflict | |
Out-of-Bounds | |
Use After Free | |
CVE-2021-29984 | |
Use After Free | |
Out-of-bounds Write | |
Arbitrary Code Injection | |
Out-of-bounds Write | |
Out-of-Bounds | |
Missing Initialization of Resource | |
Operation on a Resource after Expiration or Release | |
Arbitrary Argument Injection | |
Incorrect Calculation | |
Integer Overflow or Wraparound | |
Improper Privilege Management | |
Insufficient Verification of Data Authenticity | |
Authentication Bypass | |
Out-of-Bounds | |
Inadequate Encryption Strength | |
Out-of-Bounds | |
CVE-2021-23978 | |
Information Exposure | |
Information Exposure | |
CVE-2021-23969 | |
Out-of-Bounds | |
CVE-2021-23960 | |
CVE-2021-23961 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2021-23953 | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2020-26973 | |
CVE-2020-35111 | |
Out-of-bounds Write | |
CVE-2020-26976 | |
CVE-2020-26978 | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
CVE-2020-26961 | |
Use After Free | |
Improper Cross-boundary Removal of Sensitive Data | |
Cross-site Scripting (XSS) | |
Improper Restriction of Rendered UI Layers or Frames | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2020-16012 | |
Use After Free | |
CVE-2020-15683 | |
Use After Free | |
Cross-site Scripting (XSS) | |
Use After Free | |
Open Redirect | |
Release of Invalid Pointer or Reference | |
Use After Free | |
Incorrect Authorization | |
Origin Validation Error | |
Out-of-bounds Write | |
CVE-2020-6514 | |
Out-of-bounds Read | |
Out-of-Bounds | |
Use After Free | |
Improper Certificate Validation | |
Use After Free | |
Out-of-Bounds | |
Insufficient Verification of Data Authenticity | |
Use After Free | |
Use After Free | |
Information Exposure | |
Race Condition | |
Buffer Overflow | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | |
Double Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Arbitrary Code Injection | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Buffer Overflow | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Buffer Overflow | |
Buffer Overflow | |
Origin Validation Error | |
Race Condition | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Buffer Overflow | |
Out-of-bounds Read | |
Information Exposure | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Inclusion of Functionality from Untrusted Control Sphere | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Use After Free | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
CVE-2019-11730 | |
Improper Encoding or Escaping of Output | |
Out-of-bounds Read | |
Out-of-Bounds | |
CVE-2019-11711 | |
Information Exposure | |
Improper Input Validation | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Information Exposure | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Origin Validation Error | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-Bounds | |
Out-of-Bounds | |
Reachable Assertion | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Origin Validation Error | |
Out-of-bounds Read | |
Origin Validation Error | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Improper Authentication | |
Use After Free | |
CVE-2018-18506 | |
Out-of-Bounds | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Origin Validation Error | |
Out-of-bounds Write | |
CVE-2018-12395 | |
Incorrect Permission Assignment for Critical Resource | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Write | |
CVE-2018-12392 | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Insufficiently Protected Credentials | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Use After Free | |
Cross-site Request Forgery (CSRF) | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Information Exposure | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Access Control | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Improper Validation of Array Index | |
DEPRECATED: Use of Uninitialized Resource | |
Use After Free | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
Arbitrary Code Injection | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Error Handling | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
CVE-2017-5386 | |
Information Exposure | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-bounds Write | |
Information Exposure | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Incorrect Calculation | |
Out-of-bounds Read | |
CVE-2017-5390 | |
Out-of-Bounds | |
CVE-2017-7830 | |
Out-of-Bounds | |
Security Features | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Arbitrary Code Injection | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Use After Free | |
CVE-2018-5168 | |
Improper Privilege Management | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Use After Free | |
CVE-2018-5117 | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Improper Certificate Validation | |
Information Exposure | |
Out-of-Bounds | |
Origin Validation Error | |
Improper Input Validation | |
Use After Free | |
Security Features | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Cross-site Scripting (XSS) | |
Incorrect Type Conversion or Cast | |
Cross-site Scripting (XSS) | |
Integer Overflow or Wraparound | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Improper Access Control | |
CVE-2016-2821 | |
Security Features | |
Out-of-Bounds | |
CVE-2016-2828 | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
CVE-2016-1961 | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2016-1973 | |
Security Features | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Security Features | |
CVE-2016-1966 | |
Information Exposure | |
CVE-2016-1960 | |
Information Exposure | |
Out-of-Bounds | |
Improper Data Handling | |
Access Restriction Bypass | |
Resource Management Errors | |
Numeric Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2016-1962 | |
CVE-2016-1964 | |
CVE-2016-1979 | |
Out-of-Bounds | |
Improper Data Handling | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
CVE-2007-0801 | |
Arbitrary Code Injection | |
CVE-2006-6497 | |
Security Features | |
CVE-2006-6499 | |
CVE-2006-6498 | |
CVE-2006-6502 | |
Access Restriction Bypass | |
CVE-2006-6585 | |
CVE-2006-5463 | |
CVE-2006-5747 | |
CVE-2006-5464 | |
CVE-2006-5462 | |
CVE-2006-5748 | |
CVE-2006-5633 | |
Improper Input Validation | |
CVE-2006-2723 | |