Authentication Bypass
| |
CVE-2022-34472
| |
CVE-2022-34468
| |
CVE-2022-34479
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Improper Certificate Validation
| |
CVE-2022-31742
| |
Cross-site Scripting (XSS)
| |
CVE-2022-31736
| |
Out-of-bounds Write
| |
Use of Uninitialized Resource
| |
Authentication Bypass
| |
Out-of-bounds Read
| |
CVE-2022-31740
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
CVE-2022-29913
| |
CVE-2022-1520
| |
Incorrect Default Permissions
| |
Out-of-bounds Write
| |
Open Redirect
| |
CVE-2022-29914
| |
CVE-2022-29916
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Certificate Validation
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Inefficient Regular Expression Complexity
| |
CVE-2022-26386
| |
Time-of-check Time-of-use (TOCTOU)
| |
CVE-2022-26384
| |
CVE-2022-26383
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2022-22763
| |
CVE-2022-22759
| |
Out-of-bounds Write
| |
Information Exposure
| |
CVE-2022-22761
| |
Incorrect Authorization
| |
CVE-2022-22756
| |
Out-of-bounds Write
| |
CVE-2022-22743
| |
Out-of-bounds Read
| |
Improper Certificate Validation
| |
CVE-2022-22741
| |
Use After Free
| |
XML Injection
| |
CVE-2022-22739
| |
Out-of-bounds Write
| |
CVE-2022-22745
| |
CVE-2022-22748
| |
Race Condition
| |
CVE-2021-4126
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Use After Free
| |
Information Exposure
| |
Race Condition
| |
CVE-2021-43541
| |
Excessive Iteration
| |
Cross-site Scripting (XSS)
| |
Incorrect Type Conversion or Cast
| |
Information Exposure
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Use After Free
| |
Origin Validation Error
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Incorrect Authorization
| |
CVE-2021-38502
| |
CVE-2021-38500
| |
Use After Free
| |
Out-of-bounds Write
| |
Race Condition
| |
Missing Initialization of Resource
| |
Interpretation Conflict
| |
Out-of-Bounds
| |
Use After Free
| |
CVE-2021-29984
| |
Files or Directories Accessible to External Parties
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
CVE-2021-29957
| |
Cleartext Storage of Sensitive Information
| |
Uncontrolled Search Path Element
| |
Cleartext Storage of Sensitive Information
| |
Race Condition
| |
Missing Initialization of Resource
| |
Operation on a Resource after Expiration or Release
| |
Arbitrary Argument Injection
| |
Incorrect Calculation
| |
Integer Overflow or Wraparound
| |
Improper Privilege Management
| |
Insufficient Verification of Data Authenticity
| |
CVE-2021-23991
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Improper Verification of Cryptographic Signature
| |
Authentication Bypass
| |
Out-of-Bounds
| |
Inadequate Encryption Strength
| |
Out-of-Bounds
| |
CVE-2021-23978
| |
Information Exposure
| |
Information Exposure
| |
CVE-2021-23969
| |
Arbitrary Command Injection
| |
Out-of-Bounds
| |
CVE-2021-23960
| |
CVE-2021-23961
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2021-23953
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2020-26973
| |
CVE-2020-35111
| |
Out-of-bounds Write
| |
CVE-2020-26976
| |
CVE-2020-26978
| |
Information Exposure
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2020-26961
| |
Use After Free
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Cross-site Scripting (XSS)
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
CVE-2020-16012
| |
Use After Free
| |
CVE-2020-15683
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Open Redirect
| |
Release of Invalid Pointer or Reference
| |
Use After Free
| |
Incorrect Authorization
| |
Origin Validation Error
| |
Out-of-bounds Write
| |
Insufficiently Protected Credentials
| |
CVE-2020-6514
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Certificate Validation
| |
Use After Free
| |
Missing Encryption of Sensitive Data
| |
Out-of-Bounds
| |
Insufficient Verification of Data Authenticity
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Origin Validation Error
| |
Race Condition
| |
Buffer Overflow
| |
Information Exposure
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Use After Free
| |
Double Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Arbitrary Code Injection
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Cross-site Scripting (XSS)
| |
Missing Initialization of Resource
| |
Out-of-Bounds
| |
Insufficiently Protected Credentials
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Buffer Overflow
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Buffer Overflow
| |
Origin Validation Error
| |
Race Condition
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Buffer Overflow
| |
Improper Verification of Cryptographic Signature
| |
Cleartext Transmission of Sensitive Information
| |
Out-of-bounds Read
| |
Information Exposure
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Inclusion of Functionality from Untrusted Control Sphere
| |
Cross-site Scripting (XSS)
| |
Arbitrary Code Injection
| |
Out-of-Bounds
| |
Use After Free
| |
Cross-site Request Forgery (CSRF)
| |
Cross-site Scripting (XSS)
| |
CVE-2019-11730
| |
Improper Encoding or Escaping of Output
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
CVE-2019-11711
| |
Improper Input Validation
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Origin Validation Error
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Use After Free
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-Bounds
| |
Reachable Assertion
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Origin Validation Error
| |
Out-of-bounds Read
| |
Origin Validation Error
| |
Improper Verification of Cryptographic Signature
| |
Information Exposure
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-Bounds
| |
Improper Authentication
| |
Use After Free
| |
CVE-2018-18506
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Origin Validation Error
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
CVE-2018-12392
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Insufficiently Protected Credentials
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Use After Free
| |
Information Exposure
| |
Cross-site Request Forgery (CSRF)
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Information Exposure
| |
Out-of-Bounds
| |
Information Exposure
| |
Information Exposure
| |
Integer Overflow or Wraparound
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Improper Input Validation
| |
Arbitrary Code Injection
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2017-7830
| |
Integer Overflow or Wraparound
| |
Out-of-Bounds
| |
CVE-2018-5168
| |
Use After Free
| |
Arbitrary Code Injection
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Use After Free
| |
Inadequate Encryption Strength
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2018-5117
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Missing Encryption of Sensitive Data
| |
Out-of-Bounds
| |
Missing Encryption of Sensitive Data
| |
Improper Input Validation
| |
Cross-site Scripting (XSS)
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Information Exposure
| |
Use After Free
| |
CVE-2006-4571
| |
CVE-2006-4569
| |
Cross-site Scripting (XSS)
| |
CVE-2006-4570
| |
Improper Input Validation
| |
Out-of-Bounds
| |
CVE-2006-4566
| |
CVE-2006-4567
| |
Access Restriction Bypass
| |
CVE-2006-3812
| |
CVE-2006-3811
| |
CVE-2006-3808
| |
CVE-2006-3802
| |
CVE-2006-3805
| |
CVE-2006-3801
| |
CVE-2006-3113
| |
CVE-2006-3810
| |
CVE-2006-3809
| |
CVE-2006-3803
| |
CVE-2006-3807
| |
Numeric Errors
| |
CVE-2006-3804
| |
CVE-2006-2787
| |
CVE-2006-2786
| |
Cross-site Scripting (XSS)
| |
Arbitrary Code Injection
| |
Arbitrary Code Injection
| |
Out-of-Bounds
| |
CVE-2006-2778
| |
Access Restriction Bypass
| |
CVE-2006-2776
| |
Resource Management Errors
| |
Numeric Errors
| |
CVE-2006-1738
| |
CVE-2006-1727
| |
Numeric Errors
| |
Access Restriction Bypass
| |
Resource Management Errors
| |
CVE-2006-1728
| |
Cross-site Scripting (XSS)
| |
Access Restriction Bypass
| |
CVE-2006-1723
| |
Cross-site Scripting (XSS)
| |
CVE-2006-1529
| |
CVE-2006-1734
| |
CVE-2006-1531
| |
Resource Management Errors
| |
CVE-2006-1530
| |
Access Restriction Bypass
| |
CVE-2006-1740
| |
Out-of-Bounds
| |
CVE-2006-1742
| |
CVE-2006-1732
| |
CVE-2006-1724
| |
CVE-2006-1045
| |
Improper Input Validation
| |
CVE-2006-0299
| |
CVE-2006-0297
| |
Improper Input Validation
| |
CVE-2006-0296
| |
CVE-2006-0294
| |
CVE-2006-0295
| |
CVE-2006-0292
| |
CVE-2005-2353
| |