CVE-2024-6292 | |
CVE-2024-6293 | |
CVE-2024-6291 | |
CVE-2024-6290 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Out-of-bounds Write | |
CVE-2024-6101 | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
CVE-2024-5836 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
CVE-2024-5839 | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2024-5840 | |
Use After Free | |
CVE-2024-5843 | |
CVE-2024-5834 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2024-5494 | |
CVE-2024-5497 | |
CVE-2024-5499 | |
CVE-2024-5498 | |
CVE-2024-5495 | |
CVE-2024-5493 | |
CVE-2024-5496 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2024-5160 | |
CVE-2024-5157 | |
CVE-2024-5158 | |
CVE-2024-5159 | |
CVE-2024-4948 | |
CVE-2024-4950 | |
CVE-2024-4949 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Use After Free | |
CVE-2024-4559 | |
CVE-2024-4558 | |
CVE-2024-4331 | |
CVE-2024-4368 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2024-4059 | |
CVE-2024-4060 | |
CVE-2024-3914 | |
CVE-2024-3843 | |
CVE-2024-3845 | |
CVE-2024-3832 | |
Use After Free | |
CVE-2024-3838 | |
CVE-2024-3847 | |
CVE-2024-3840 | |
Use After Free | |
CVE-2024-3841 | |
CVE-2024-3846 | |
CVE-2024-3844 | |
CVE-2024-3833 | |
Out-of-bounds Read | |
CVE-2024-3515 | |
CVE-2024-3157 | |
CVE-2024-3516 | |
Use After Free | |
Out-of-Bounds | |
CVE-2024-3156 | |
CVE-2024-2883 | |
CVE-2024-2886 | |
CVE-2024-2887 | |
CVE-2024-2885 | |
CVE-2024-2629 | |
CVE-2024-2630 | |
Out-of-bounds Read | |
CVE-2024-2631 | |
CVE-2024-2625 | |
Use After Free | |
CVE-2024-2628 | |
CVE-2024-2400 | |
CVE-2024-2176 | |
CVE-2024-2173 | |
CVE-2024-2174 | |
CVE-2024-1938 | |
CVE-2024-1939 | |
CVE-2024-1669 | |
CVE-2024-1673 | |
CVE-2024-1676 | |
CVE-2024-1670 | |
CVE-2024-1672 | |
CVE-2024-1671 | |
CVE-2024-1675 | |
CVE-2024-1674 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2024-0810 | |
Integer Underflow | |
CVE-2024-0805 | |
Use After Free | |
CVE-2024-0811 | |
Use After Free | |
Origin Validation Error | |
CVE-2024-0812 | |
CVE-2024-0809 | |
Use After Free | |
CVE-2024-0804 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2024-0333 | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
CVE-2023-6511 | |
Use After Free | |
CVE-2023-6512 | |
Use After Free | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Origin Validation Error | |
Use After Free | |
Origin Validation Error | |
Cross-site Scripting (XSS) | |
CVE-2023-5857 | |
CVE-2023-5850 | |
Use After Free | |
Use After Free | |
Insufficient Verification of Data Authenticity | |
Use After Free | |
Origin Validation Error | |
Origin Validation Error | |
Use After Free | |
CVE-2023-5485 | |
CVE-2023-5478 | |
CVE-2023-5477 | |
CVE-2023-5475 | |
CVE-2023-5479 | |
Use After Free | |
CVE-2023-5484 | |
Use After Free | |
CVE-2023-5486 | |
CVE-2023-5487 | |
CVE-2023-5483 | |
CVE-2023-5481 | |
Out-of-bounds Write | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
CVE-2023-4904 | |
CVE-2023-4908 | |
CVE-2023-4901 | |
CVE-2023-4900 | |
CVE-2023-4909 | |
CVE-2023-4902 | |
CVE-2023-4903 | |
CVE-2023-4907 | |
CVE-2023-4906 | |
CVE-2023-4905 | |
Out-of-bounds Write | |
CVE-2023-4764 | |
Out-of-bounds Read | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
CVE-2022-4955 | |
CVE-2023-4357 | |
CVE-2023-4360 | |
Use After Free | |
Use After Free | |
CVE-2023-4367 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2023-4364 | |
CVE-2023-4359 | |
Use After Free | |
CVE-2023-4361 | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2023-4350 | |
CVE-2023-4365 | |
CVE-2023-4363 | |
Out-of-bounds Write | |
CVE-2023-4368 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2023-4078 | |
Out-of-bounds Write | |
Out-of-Bounds | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Arbitrary Command Injection | |
CVE-2023-4077 | |
Use After Free | |
CVE-2023-2311 | |
CVE-2022-4917 | |
Improper Input Validation | |
CVE-2022-4906 | |
Use After Free | |
Insufficient Verification of Data Authenticity | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
CVE-2023-2313 | |
Out-of-bounds Write | |
CVE-2022-4915 | |
CVE-2022-4907 | |
CVE-2022-4926 | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
CVE-2022-4913 | |
CVE-2022-4910 | |
Out-of-bounds Write | |
CVE-2022-4923 | |
CVE-2022-4908 | |
CVE-2022-4909 | |
CVE-2022-4922 | |
CVE-2021-4318 | |
CVE-2021-4316 | |
Use After Free | |
CVE-2021-4323 | |
Use After Free | |
Use After Free | |
CVE-2021-4321 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
CVE-2023-3736 | |
CVE-2023-3738 | |
Use After Free | |
CVE-2023-3737 | |
CVE-2023-3734 | |
CVE-2023-3735 | |
Out-of-bounds Write | |
CVE-2023-3733 | |
CVE-2023-3740 | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
CVE-2023-2940 | |
CVE-2023-2941 | |
Link Following | |
CVE-2023-2938 | |
CVE-2023-2937 | |
Use After Free | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2023-2726 | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2023-2462 | |
CVE-2023-2465 | |
CVE-2023-2466 | |
CVE-2023-2460 | |
CVE-2023-2463 | |
CVE-2023-2464 | |
Use After Free | |
CVE-2023-2459 | |
CVE-2023-2468 | |
CVE-2023-2467 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
CVE-2023-1814 | |
CVE-2023-1813 | |
CVE-2023-1821 | |
CVE-2023-1816 | |
Out-of-bounds Read | |
CVE-2023-1822 | |
Out-of-bounds Write | |
Use After Free | |
CVE-2023-1817 | |
CVE-2023-1823 | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
CVE-2021-30558 | |
Out-of-bounds Read | |
CVE-2023-1223 | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
CVE-2023-1230 | |
CVE-2023-1224 | |
CVE-2023-1231 | |
CVE-2023-1236 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2023-1228 | |
Use After Free | |
CVE-2023-1233 | |
CVE-2023-1234 | |
CVE-2023-1226 | |
Out-of-bounds Write | |
Use After Free | |
Incorrect Default Permissions | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2023-1232 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2023-1221 | |
CVE-2023-1225 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Race Condition | |
Integer Overflow or Wraparound | |
CVE-2023-0697 | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2023-0700 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
CVE-2023-0704 | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
CVE-2023-0141 | |
CVE-2023-0133 | |
Out-of-bounds Write | |
CVE-2023-0131 | |
CVE-2023-0140 | |
Use After Free | |
CVE-2023-0136 | |
CVE-2023-0132 | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
CVE-2023-0130 | |
Use After Free | |
CVE-2022-4025 | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Arbitrary Code Injection | |
CVE-2022-4187 | |
Use After Free | |
CVE-2022-4193 | |
Use After Free | |
CVE-2022-4185 | |
Use After Free | |
CVE-2022-4195 | |
Use After Free | |
CVE-2022-4184 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2022-4190 | |
CVE-2022-4189 | |
Use After Free | |
CVE-2022-4182 | |
CVE-2022-4183 | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
CVE-2022-3443 | |
Improper Input Validation | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Use After Free | |
CVE-2022-3660 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
CVE-2022-3447 | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Missing Authentication for Critical Function | |
CVE-2022-3308 | |
CVE-2022-3316 | |
Race Condition | |
Improper Resource Shutdown or Release | |
CVE-2022-3317 | |
CVE-2022-3310 | |
CVE-2022-3313 | |
CVE-2022-3304 | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Improper Input Validation | |
Race Condition | |
CVE-2022-3044 | |
Incorrect Authorization | |
Race Condition | |
Out-of-bounds Write | |
CVE-2022-3056 | |
Use After Free | |
Use After Free | |
CVE-2022-3057 | |
Race Condition | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2022-3054 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
CVE-2022-3047 | |
Out-of-bounds Write | |
Use After Free | |
CVE-2022-3053 | |
Out-of-bounds Write | |
CVE-2022-2860 | |
Out-of-bounds Write | |
Race Condition | |
Use After Free | |
Use After Free | |
Cross-site Scripting (XSS) | |
Race Condition | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Race Condition | |
Improper Initialization | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
Race Condition | |
Improper Input Validation | |
Race Condition | |
Use After Free | |
Out-of-bounds Read | |
Race Condition | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
CVE-2022-2611 | |
Information Exposure | |
Improper Encoding or Escaping of Output | |
Race Condition | |
CVE-2022-2622 | |
Reliance on Cookies without Validation and Integrity Checking | |
CVE-2022-2616 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
CVE-2022-2165 | |
Use After Free | |
CVE-2022-2164 | |
Race Condition | |
Use After Free | |
Use After Free | |
CVE-2022-2162 | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Double Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2022-1871 | |
Out-of-bounds Read | |
Use After Free | |
CVE-2022-1874 | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
CVE-2022-1868 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
CVE-2022-1872 | |
Use After Free | |
CVE-2022-1862 | |
Use After Free | |
CVE-2022-1867 | |
Use After Free | |
CVE-2022-1857 | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
Origin Validation Error | |
Use After Free | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
Out-of-bounds Write | |
Exposure of Resource to Wrong Sphere | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Cross-site Scripting (XSS) | |
Incorrect Authorization | |
Use After Free | |
Out-of-bounds Write | |
Authentication Bypass | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Incorrect Authorization | |
Use After Free | |
Authentication Bypass | |
Authentication Bypass | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Directory Traversal | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
NULL Pointer Dereference | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Incorrect Authorization | |
Authentication Bypass | |
Improper Restriction of Rendered UI Layers or Frames | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Use After Free | |
CVE-2022-0804 | |
Use After Free | |
Out-of-bounds Write | |
CVE-2022-0802 | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Link Following | |
Out-of-bounds Write | |
CVE-2022-0807 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Read | |
CVE-2022-0803 | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2022-0467 | |
Use After Free | |
CVE-2022-0466 | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2022-0462 | |
CVE-2022-0461 | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2022-0291 | |
Use After Free | |
Use After Free | |
Incorrect Authorization | |
Use After Free | |
Use After Free | |
CVE-2022-0303 | |
Use After Free | |
CVE-2022-0305 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2022-0292 | |
CVE-2022-0294 | |
Out-of-bounds Write | |
Use After Free | |
CVE-2022-0118 | |
CVE-2022-0112 | |
Use of Uninitialized Resource | |
Use After Free | |
CVE-2022-0097 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2022-0116 | |
Origin Validation Error | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2022-0109 | |
Use After Free | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-bounds Read | |
Origin Validation Error | |
Origin Validation Error | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Origin Validation Error | |
Incorrect Authorization | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Incorrect Authorization | |
Incorrect Authorization | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2021-38018 | |
CVE-2021-38021 | |
CVE-2021-38022 | |
CVE-2021-38020 | |
Out-of-bounds Write | |
CVE-2021-38010 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Information Exposure | |
Always-Incorrect Control Flow Implementation | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Write | |
Time-of-check Time-of-use (TOCTOU) | |
Use After Free | |
Out-of-bounds Write | |
Improper Encoding or Escaping of Output | |
Use After Free | |
Integer Underflow | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
CVE-2021-4054 | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
Improper Handling of Exceptional Conditions | |
Open Redirect | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Read | |
CVE-2021-37989 | |
CVE-2021-37995 | |
Use After Free | |
CVE-2021-37990 | |
CVE-2021-37994 | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Race Condition | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2021-37980 | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
CVE-2021-37976 | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2021-37964 | |
Exposure of Resource to Wrong Sphere | |
Origin Validation Error | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
CVE-2021-37963 | |
Use After Free | |
Improper Privilege Management | |
Origin Validation Error | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
Out-of-bounds Read | |
CVE-2021-37958 | |
Use After Free | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
Use After Free | |
CVE-2021-30617 | |
CVE-2021-30620 | |
Authentication Bypass | |
Use After Free | |
Out-of-bounds Write | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
CVE-2021-30618 | |
Use After Free | |
Authentication Bypass | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Origin Validation Error | |
Out-of-bounds Write | |
Use After Free | |
Incorrect Authorization | |
Improper Input Validation | |
Use of Uninitialized Resource | |
Out-of-bounds Write | |
CVE-2021-30584 | |
Incorrect Authorization | |
Use After Free | |
Incorrect Authorization | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2021-30587 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Incorrect Authorization | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
CVE-2021-30582 | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Out-of-bounds Read | |
Double Free | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Arbitrary Code Injection | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Inclusion of Functionality from Untrusted Control Sphere | |
Origin Validation Error | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Insufficient Verification of Data Authenticity | |
Incorrect Authorization | |
Use After Free | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Improper Input Validation | |
Information Exposure | |
Information Exposure | |
Use of Uninitialized Resource | |
Authentication Bypass | |
Authentication Bypass | |
Use After Free | |
Use After Free | |
CVE-2021-21212 | |
Origin Validation Error | |
Exposure of Resource to Wrong Sphere | |
Origin Validation Error | |
Use After Free | |
Improper Input Validation | |
CVE-2021-21205 | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use of Uninitialized Resource | |
Improper Authentication | |
Use After Free | |
CVE-2021-21187 | |
Incorrect Authorization | |
CVE-2021-21185 | |
Origin Validation Error | |
Origin Validation Error | |
Incorrect Authorization | |
CVE-2021-21181 | |
Use After Free | |
Use After Free | |
CVE-2021-21178 | |
CVE-2021-21176 | |
Improper Authentication | |
Origin Validation Error | |
CVE-2021-21174 | |
CVE-2021-21173 | |
CVE-2021-21172 | |
CVE-2021-21171 | |
CVE-2021-21170 | |
Out-of-Bounds | |
CVE-2021-21168 | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Origin Validation Error | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2021-21147 | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Improper Authentication | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-Bounds | |
Origin Validation Error | |
Information Exposure | |
Origin Validation Error | |
Authentication Bypass | |
Improper Authentication | |
Improper Authentication | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Authentication | |
Improper Authentication | |
Out-of-bounds Write | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Improper Privilege Management | |
Use After Free | |
Out-of-bounds Write | <87.0.4280.141-0.1~deb10u1 |
Use After Free | <87.0.4280.141-0.1~deb10u1 |
Out-of-bounds Write | <87.0.4280.141-0.1~deb10u1 |
Use After Free | <87.0.4280.141-0.1~deb10u1 |
Use After Free | <87.0.4280.141-0.1~deb10u1 |
Use After Free | <87.0.4280.141-0.1~deb10u1 |
Use After Free | <87.0.4280.141-0.1~deb10u1 |
Improper Restriction of Rendered UI Layers or Frames | <87.0.4280.141-0.1~deb10u1 |
Use After Free | <87.0.4280.141-0.1~deb10u1 |
Use After Free | <87.0.4280.141-0.1~deb10u1 |
Use After Free | <87.0.4280.141-0.1~deb10u1 |
CVE-2020-16043 | <87.0.4280.141-0.1~deb10u1 |
Use After Free | |
Information Exposure | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Read | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-16035 | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-16036 | <87.0.4280.88-0.4~deb10u1 |
Improper Restriction of Rendered UI Layers or Frames | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-16034 | <87.0.4280.88-0.4~deb10u1 |
Improper Restriction of Rendered UI Layers or Frames | <87.0.4280.88-0.4~deb10u1 |
Improper Restriction of Rendered UI Layers or Frames | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Cross-site Scripting (XSS) | <87.0.4280.88-0.4~deb10u1 |
Missing Authorization | <87.0.4280.88-0.4~deb10u1 |
Missing Authorization | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Race Condition | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-16022 | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-16020 | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-16019 | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-16014 | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-16012 | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-16016 | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.141-0.1~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6557 | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15992 | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15988 | <87.0.4280.88-0.4~deb10u1 |
Improper Initialization | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15985 | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15984 | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Read | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15982 | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15980 | <87.0.4280.88-0.4~deb10u1 |
Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15979 | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Integer Overflow or Wraparound | <87.0.4280.88-0.4~deb10u1 |
Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
Integer Overflow or Wraparound | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15973 | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15966 | <87.0.4280.88-0.4~deb10u1 |
Access of Resource Using Incompatible Type ('Type Confusion') | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15963 | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15962 | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15961 | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Race Condition | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-15959 | <87.0.4280.88-0.4~deb10u1 |
Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
Integer Overflow or Wraparound | <87.0.4280.88-0.4~deb10u1 |
Information Exposure | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6568 | <87.0.4280.88-0.4~deb10u1 |
Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6566 | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6565 | <87.0.4280.88-0.4~deb10u1 |
Improper Preservation of Permissions | <87.0.4280.88-0.4~deb10u1 |
Incorrect Permission Assignment for Critical Resource | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6563 | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6561 | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6560 | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Read | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Information Exposure | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6538 | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Access of Resource Using Incompatible Type ('Type Confusion') | <87.0.4280.88-0.4~deb10u1 |
Access of Resource Using Incompatible Type ('Type Confusion') | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6522 | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
Out-of-Bounds | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Information Exposure | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Use After Free | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6516 | <87.0.4280.88-0.4~deb10u1 |
Information Exposure | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6514 | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Incorrect Default Permissions | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6536 | <87.0.4280.88-0.4~deb10u1 |
Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
Access of Resource Using Incompatible Type ('Type Confusion') | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6519 | <87.0.4280.88-0.4~deb10u1 |
Information Exposure | <87.0.4280.88-0.4~deb10u1 |
Buffer Overflow | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
CVE-2020-6526 | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Incorrect Authorization | <87.0.4280.88-0.4~deb10u1 |
Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Incorrect Authorization | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Incorrect Default Permissions | |
Use After Free | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
CVE-2020-6499 | |
Incorrect Default Permissions | |
CVE-2020-6500 | |
Out-of-Bounds | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Use After Free | |
CVE-2020-6486 | |
Use After Free | |
Use After Free | |
Incorrect Default Permissions | |
CVE-2020-6478 | |
Incorrect Default Permissions | |
CVE-2020-6481 | |
Information Exposure | |
Information Exposure | |
CVE-2020-6491 | |
Improper Input Validation | |
Incorrect Default Permissions | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Incorrect Default Permissions | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Incorrect Default Permissions | |
Information Exposure | |
Use After Free | |
CVE-2020-6479 | |
Incorrect Default Permissions | |
CVE-2020-6475 | |
Incorrect Default Permissions | |
Cross-site Scripting (XSS) | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
CVE-2020-6460 | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
CVE-2020-6435 | |
Incorrect Default Permissions | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
CVE-2020-6437 | |
CVE-2020-6440 | |
CVE-2020-6432 | |
Incorrect Default Permissions | |
Use After Free | |
Use After Free | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Insufficient Verification of Data Authenticity | |
Incorrect Default Permissions | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
CVE-2020-6433 | |
Out-of-bounds Read | |
Information Exposure | |
Incorrect Default Permissions | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Improper Input Validation | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2020-6410 | |
CVE-2020-6409 | |
CVE-2020-6413 | |
Information Exposure | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2020-6414 | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
Out-of-Bounds | |
DEPRECATED: Use of Uninitialized Resource | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Unrestricted Upload of File with Dangerous Type | |
CVE-2019-13672 | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2019-13758 | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Improper Input Validation | |
CVE-2019-13742 | |
Out-of-bounds Read | |
CVE-2019-13749 | |
Use of Uninitialized Resource | |
CVE-2019-13743 | |
Out-of-bounds Write | |
Improper Locking | |
Out-of-bounds Write | |
Information Exposure | |
CVE-2019-13755 | |
Improper Preservation of Permissions | |
Out-of-bounds Write | |
Improper Privilege Management | |
Out-of-bounds Write | |
CVE-2019-13746 | |
Origin Validation Error | |
Missing Authorization | |
Information Exposure | |
CVE-2019-13754 | |
CVE-2019-13759 | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2019-13756 | |
CVE-2019-13761 | |
Out-of-bounds Write | |
Out-of-Bounds | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
CVE-2019-13739 | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Out-of-bounds Write | |
CVE-2019-13763 | |
CVE-2019-13757 | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Authentication Bypass | |
Insecure Storage of Sensitive Information | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Incorrect Authorization | |
CVE-2019-13710 | |
CVE-2019-13718 | |
Insecure Storage of Sensitive Information | |
Authentication Bypass | |
Out-of-bounds Write | |
Information Exposure | |
Information Exposure | |
Out-of-bounds Write | |
Information Exposure | |
Authentication Bypass | |
Information Exposure | |
Arbitrary Code Injection | |
Use After Free | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2019-13678 | |
Improper Input Validation | |
Out-of-bounds Write | |
Improper Input Validation | |
Out-of-bounds Write | |
Improper Preservation of Permissions | |
CVE-2019-13667 | |
Improper Input Validation | |
CVE-2019-13659 | |
CVE-2019-13680 | |
Incorrect Permission Assignment for Critical Resource | |
Improper Input Validation | |
CVE-2019-13661 | |
Use After Free | |
Incorrect Permission Assignment for Critical Resource | |
Improper Preservation of Permissions | |
Improper Input Validation | |
Out-of-bounds Read | |
CVE-2019-13674 | |
Information Exposure | |
CVE-2019-13671 | |
Out-of-bounds Write | |
Incorrect Permission Assignment for Critical Resource | |
CVE-2019-13669 | |
Origin Validation Error | |
Incorrect Permission Assignment for Critical Resource | |
CVE-2019-13663 | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Default Permissions | |
Missing Authorization | |
Improper Handling of Exceptional Conditions | |
CVE-2019-13660 | |
Out-of-bounds Write | |
Information Exposure | |
Out-of-bounds Write | |
CVE-2019-13691 | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Improper Input Validation | |
Incorrect Calculation | |
Out-of-bounds Write | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Cleartext Storage of Sensitive Information | |
Out-of-bounds Write | |
Race Condition | |
Integer Overflow or Wraparound | |
CVE-2019-5830 | |
Out-of-bounds Write | |
Improper Input Validation | |
CVE-2019-5837 | |
CVE-2019-5833 | |
Improper Input Validation | |
Out-of-bounds Read | |
Use After Free | |
CVE-2019-5832 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use of Uninitialized Resource | |
Improper Data Handling | |
Cross-site Request Forgery (CSRF) | |
Cleartext Storage of Sensitive Information | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Open Redirect | |
Improper Access Control | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Double Free | |
Out-of-bounds Read | |
Race Condition | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Use After Free | |
Improper Input Validation | |
Improper Data Handling | |
Improper Input Validation | |
Missing Authorization | |
Improper Restriction of Rendered UI Layers or Frames | |
Cryptographic Issues | |
Cleartext Storage of Sensitive Information | |
Cross-site Scripting (XSS) | |
Improper Check for Unusual or Exceptional Conditions | |
Improper Input Validation | |
CVE-2019-5766 | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Privilege Management | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Numeric Errors | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2018-20067 | |
Use After Free | |
Information Exposure | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
CVE-2018-18348 | |
CVE-2018-18350 | |
Out-of-bounds Write | |
CVE-2018-18345 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Incorrect Permission Assignment for Critical Resource | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2018-18357 | |
Incorrect Permission Assignment for Critical Resource | |
Out-of-bounds Write | |
Improper Input Validation | |
CVE-2018-18346 | |
Out-of-bounds Write | |
CVE-2018-18355 | |
Improper Input Validation | |
CVE-2018-18353 | |
Out-of-bounds Write | |
Improper Privilege Management | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-bounds Write | |