CVE-2024-4559
| |
CVE-2024-4558
| |
CVE-2024-4331
| |
CVE-2024-4368
| |
CVE-2024-4058
| |
CVE-2024-4059
| |
CVE-2024-4060
| |
CVE-2024-3914
| |
CVE-2024-3843
| |
CVE-2024-3845
| |
CVE-2024-3832
| |
Use After Free
| |
CVE-2024-3838
| |
CVE-2024-3847
| |
CVE-2024-3840
| |
Use After Free
| |
CVE-2024-3841
| |
CVE-2024-3846
| |
CVE-2024-3844
| |
CVE-2024-3833
| |
Out-of-bounds Read
| |
CVE-2024-3515
| |
CVE-2024-3157
| |
CVE-2024-3516
| |
Use After Free
| |
Out-of-Bounds
| |
CVE-2024-3156
| |
CVE-2024-2883
| |
CVE-2024-2886
| |
CVE-2024-2887
| |
CVE-2024-2885
| |
CVE-2024-2629
| |
CVE-2024-2630
| |
Out-of-bounds Read
| |
CVE-2024-2631
| |
CVE-2024-2625
| |
Use After Free
| |
CVE-2024-2628
| |
CVE-2024-2400
| |
CVE-2024-2176
| |
CVE-2024-2173
| |
CVE-2024-2174
| |
CVE-2024-1938
| |
CVE-2024-1939
| |
CVE-2024-1669
| |
CVE-2024-1673
| |
CVE-2024-1676
| |
CVE-2024-1670
| |
CVE-2024-1672
| |
CVE-2024-1671
| |
CVE-2024-1675
| |
CVE-2024-1674
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2024-0810
| |
Integer Underflow
| |
CVE-2024-0805
| |
Use After Free
| |
CVE-2024-0811
| |
Use After Free
| |
Origin Validation Error
| |
CVE-2024-0812
| |
CVE-2024-0809
| |
Use After Free
| |
CVE-2024-0804
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2024-0333
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
CVE-2023-6511
| |
Use After Free
| |
CVE-2023-6512
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Origin Validation Error
| |
Use After Free
| |
Origin Validation Error
| |
Cross-site Scripting (XSS)
| |
CVE-2023-5857
| |
CVE-2023-5850
| |
Use After Free
| |
Use After Free
| |
Insufficient Verification of Data Authenticity
| |
Use After Free
| |
Origin Validation Error
| |
Origin Validation Error
| |
Use After Free
| |
CVE-2023-5485
| |
CVE-2023-5478
| |
CVE-2023-5477
| |
CVE-2023-5475
| |
CVE-2023-5479
| |
Use After Free
| |
CVE-2023-5484
| |
Use After Free
| |
CVE-2023-5486
| |
CVE-2023-5487
| |
CVE-2023-5483
| |
CVE-2023-5481
| |
Out-of-bounds Write
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
CVE-2023-4904
| |
CVE-2023-4908
| |
CVE-2023-4901
| |
CVE-2023-4900
| |
CVE-2023-4909
| |
CVE-2023-4902
| |
CVE-2023-4903
| |
CVE-2023-4907
| |
CVE-2023-4906
| |
CVE-2023-4905
| |
Out-of-bounds Write
| |
CVE-2023-4764
| |
Out-of-bounds Read
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
CVE-2022-4955
| |
CVE-2023-4357
| |
CVE-2023-4360
| |
Use After Free
| |
Use After Free
| |
CVE-2023-4367
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2023-4364
| |
CVE-2023-4359
| |
Use After Free
| |
CVE-2023-4361
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2023-4350
| |
CVE-2023-4365
| |
CVE-2023-4363
| |
Out-of-bounds Write
| |
CVE-2023-4368
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2023-4078
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Arbitrary Command Injection
| |
CVE-2023-4077
| |
Use After Free
| |
CVE-2023-2311
| |
CVE-2022-4917
| |
Improper Input Validation
| |
CVE-2022-4906
| |
Use After Free
| |
Insufficient Verification of Data Authenticity
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
CVE-2023-2313
| |
Out-of-bounds Write
| |
CVE-2022-4915
| |
CVE-2022-4907
| |
CVE-2022-4926
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
CVE-2022-4913
| |
CVE-2022-4910
| |
Out-of-bounds Write
| |
CVE-2022-4923
| |
CVE-2022-4908
| |
CVE-2022-4909
| |
CVE-2022-4922
| |
CVE-2021-4318
| |
CVE-2021-4316
| |
Use After Free
| |
CVE-2021-4323
| |
Use After Free
| |
Use After Free
| |
CVE-2021-4321
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
CVE-2023-3736
| |
CVE-2023-3738
| |
Use After Free
| |
CVE-2023-3737
| |
CVE-2023-3734
| |
CVE-2023-3735
| |
Out-of-bounds Write
| |
CVE-2023-3733
| |
CVE-2023-3740
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2023-2940
| |
CVE-2023-2941
| |
Link Following
| |
CVE-2023-2938
| |
CVE-2023-2937
| |
Use After Free
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2023-2726
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2023-2462
| |
CVE-2023-2465
| |
CVE-2023-2466
| |
CVE-2023-2460
| |
CVE-2023-2463
| |
CVE-2023-2464
| |
Use After Free
| |
CVE-2023-2459
| |
CVE-2023-2468
| |
CVE-2023-2467
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Write
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
CVE-2023-1814
| |
CVE-2023-1813
| |
CVE-2023-1821
| |
CVE-2023-1816
| |
Out-of-bounds Read
| |
CVE-2023-1822
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2023-1817
| |
CVE-2023-1823
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
CVE-2021-30558
| |
Out-of-bounds Read
| |
CVE-2023-1223
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2023-1230
| |
CVE-2023-1224
| |
CVE-2023-1231
| |
CVE-2023-1236
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2023-1228
| |
Use After Free
| |
CVE-2023-1233
| |
CVE-2023-1234
| |
CVE-2023-1226
| |
Out-of-bounds Write
| |
Use After Free
| |
Incorrect Default Permissions
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2023-1232
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2023-1221
| |
CVE-2023-1225
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Integer Overflow or Wraparound
| |
CVE-2023-0697
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2023-0700
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
CVE-2023-0704
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
CVE-2023-0141
| |
CVE-2023-0133
| |
Out-of-bounds Write
| |
CVE-2023-0131
| |
CVE-2023-0140
| |
Use After Free
| |
CVE-2023-0136
| |
CVE-2023-0132
| |
Improper Input Validation
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2023-0130
| |
Use After Free
| |
CVE-2022-4025
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Arbitrary Code Injection
| |
CVE-2022-4187
| |
Use After Free
| |
CVE-2022-4193
| |
Use After Free
| |
CVE-2022-4185
| |
Use After Free
| |
CVE-2022-4195
| |
Use After Free
| |
CVE-2022-4184
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2022-4190
| |
CVE-2022-4189
| |
Use After Free
| |
CVE-2022-4182
| |
CVE-2022-4183
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2022-3443
| |
Improper Input Validation
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2022-3660
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
CVE-2022-3447
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Missing Authentication for Critical Function
| |
CVE-2022-3308
| |
CVE-2022-3316
| |
Race Condition
| |
Improper Resource Shutdown or Release
| |
CVE-2022-3317
| |
CVE-2022-3310
| |
CVE-2022-3313
| |
CVE-2022-3304
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Improper Input Validation
| |
Race Condition
| |
CVE-2022-3044
| |
Incorrect Authorization
| |
Race Condition
| |
Out-of-bounds Write
| |
CVE-2022-3056
| |
Use After Free
| |
Use After Free
| |
CVE-2022-3057
| |
Race Condition
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2022-3054
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
CVE-2022-3047
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2022-3053
| |
Out-of-bounds Write
| |
CVE-2022-2860
| |
Out-of-bounds Write
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Race Condition
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Race Condition
| |
Improper Initialization
| |
Exposure of Resource to Wrong Sphere
| |
Use After Free
| |
Race Condition
| |
Improper Input Validation
| |
Race Condition
| |
Use After Free
| |
Out-of-bounds Read
| |
Race Condition
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2022-2611
| |
Information Exposure
| |
Improper Encoding or Escaping of Output
| |
Race Condition
| |
CVE-2022-2622
| |
Reliance on Cookies without Validation and Integrity Checking
| |
CVE-2022-2616
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
CVE-2022-2165
| |
Use After Free
| |
CVE-2022-2164
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
CVE-2022-2162
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2022-1871
| |
Out-of-bounds Read
| |
Use After Free
| |
CVE-2022-1874
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
CVE-2022-1868
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
CVE-2022-1872
| |
Use After Free
| |
CVE-2022-1862
| |
Use After Free
| |
CVE-2022-1867
| |
Use After Free
| |
CVE-2022-1857
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Use After Free
| |
Origin Validation Error
| |
Use After Free
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Use After Free
| |
Out-of-bounds Write
| |
Exposure of Resource to Wrong Sphere
| |
Improper Input Validation
| |
Cross-site Scripting (XSS)
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Cross-site Scripting (XSS)
| |
Incorrect Authorization
| |
Use After Free
| |
Out-of-bounds Write
| |
Authentication Bypass
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Incorrect Authorization
| |
Use After Free
| |
Authentication Bypass
| |
Authentication Bypass
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Information Exposure
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Directory Traversal
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
NULL Pointer Dereference
| |
Exposure of Resource to Wrong Sphere
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Incorrect Authorization
| |
Authentication Bypass
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2022-0804
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2022-0802
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Link Following
| |
Out-of-bounds Write
| |
CVE-2022-0807
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Read
| |
CVE-2022-0803
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2022-0467
| |
Use After Free
| |
CVE-2022-0466
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2022-0462
| |
CVE-2022-0461
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2022-0291
| |
Use After Free
| |
Use After Free
| |
Incorrect Authorization
| |
Use After Free
| |
Use After Free
| |
CVE-2022-0303
| |
Use After Free
| |
CVE-2022-0305
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2022-0292
| |
CVE-2022-0294
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2022-0118
| |
CVE-2022-0112
| |
Use of Uninitialized Resource
| |
Use After Free
| |
CVE-2022-0097
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2022-0116
| |
Origin Validation Error
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2022-0109
| |
Use After Free
| |
Use After Free
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Out-of-bounds Read
| |
Origin Validation Error
| |
Origin Validation Error
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Origin Validation Error
| |
Incorrect Authorization
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2021-38018
| |
CVE-2021-38021
| |
CVE-2021-38022
| |
CVE-2021-38020
| |
Out-of-bounds Write
| |
CVE-2021-38010
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Information Exposure
| |
Always-Incorrect Control Flow Implementation
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Out-of-bounds Write
| |
Time-of-check Time-of-use (TOCTOU)
| |
Use After Free
| |
Out-of-bounds Write
| |
Improper Encoding or Escaping of Output
| |
Use After Free
| |
Integer Underflow
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
CVE-2021-4054
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Use After Free
| |
Improper Handling of Exceptional Conditions
| |
Improper Input Validation
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Out-of-bounds Read
| |
CVE-2021-37989
| |
CVE-2021-37995
| |
Use After Free
| |
CVE-2021-37990
| |
CVE-2021-37994
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Race Condition
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2021-37980
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
CVE-2021-37976
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2021-37964
| |
Exposure of Resource to Wrong Sphere
| |
Origin Validation Error
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
CVE-2021-37963
| |
Use After Free
| |
Improper Privilege Management
| |
Origin Validation Error
| |
Exposure of Resource to Wrong Sphere
| |
Use After Free
| |
Out-of-bounds Read
| |
CVE-2021-37958
| |
Use After Free
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-Bounds
| |
Exposure of Resource to Wrong Sphere
| |
Use After Free
| |
Use After Free
| |
CVE-2021-30617
| |
CVE-2021-30620
| |
Authentication Bypass
| |
Use After Free
| |
Out-of-bounds Write
| |
Exposure of Resource to Wrong Sphere
| |
Use After Free
| |
CVE-2021-30618
| |
Use After Free
| |
Authentication Bypass
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Race Condition
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Origin Validation Error
| |
Out-of-bounds Write
| |
Use After Free
| |
Incorrect Authorization
| |
Improper Input Validation
| |
Use of Uninitialized Resource
| |
Out-of-bounds Write
| |
CVE-2021-30584
| |
Incorrect Authorization
| |
Use After Free
| |
Incorrect Authorization
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2021-30587
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Incorrect Authorization
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2021-30582
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Out-of-bounds Read
| |
Double Free
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Arbitrary Code Injection
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Inclusion of Functionality from Untrusted Control Sphere
| |
Origin Validation Error
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Insufficient Verification of Data Authenticity
| |
Incorrect Authorization
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Out-of-Bounds
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Information Exposure
| |
Information Exposure
| |
Use of Uninitialized Resource
| |
Authentication Bypass
| |
Authentication Bypass
| |
Use After Free
| |
Use After Free
| |
CVE-2021-21212
| |
Origin Validation Error
| |
Exposure of Resource to Wrong Sphere
| |
Origin Validation Error
| |
Use After Free
| |
Improper Input Validation
| |
CVE-2021-21205
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use of Uninitialized Resource
| |
Improper Authentication
| |
Use After Free
| |
CVE-2021-21187
| |
Incorrect Authorization
| |
CVE-2021-21185
| |
Origin Validation Error
| |
Origin Validation Error
| |
Incorrect Authorization
| |
CVE-2021-21181
| |
Use After Free
| |
Use After Free
| |
CVE-2021-21178
| |
CVE-2021-21176
| |
Improper Authentication
| |
Origin Validation Error
| |
CVE-2021-21174
| |
CVE-2021-21173
| |
CVE-2021-21172
| |
CVE-2021-21171
| |
CVE-2021-21170
| |
Out-of-Bounds
| |
CVE-2021-21168
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Origin Validation Error
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2021-21147
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Improper Authentication
| |
Use After Free
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Out-of-Bounds
| |
Origin Validation Error
| |
Information Exposure
| |
Origin Validation Error
| |
Authentication Bypass
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Authentication
| |
Improper Authentication
| |
Out-of-bounds Write
| |
Improper Authentication
| |
Improper Authentication
| |
Improper Authentication
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Privilege Management
| |
Use After Free
| |
Out-of-bounds Write
|
<87.0.4280.141-0.1~deb10u1
|
Use After Free
|
<87.0.4280.141-0.1~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.141-0.1~deb10u1
|
Use After Free
|
<87.0.4280.141-0.1~deb10u1
|
Use After Free
|
<87.0.4280.141-0.1~deb10u1
|
Use After Free
|
<87.0.4280.141-0.1~deb10u1
|
Use After Free
|
<87.0.4280.141-0.1~deb10u1
|
Improper Restriction of Rendered UI Layers or Frames
|
<87.0.4280.141-0.1~deb10u1
|
Use After Free
|
<87.0.4280.141-0.1~deb10u1
|
Use After Free
|
<87.0.4280.141-0.1~deb10u1
|
Use After Free
|
<87.0.4280.141-0.1~deb10u1
|
CVE-2020-16043
|
<87.0.4280.141-0.1~deb10u1
|
Use After Free
| |
Information Exposure
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Read
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-16035
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-16036
|
<87.0.4280.88-0.4~deb10u1
|
Improper Restriction of Rendered UI Layers or Frames
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-16034
|
<87.0.4280.88-0.4~deb10u1
|
Improper Restriction of Rendered UI Layers or Frames
|
<87.0.4280.88-0.4~deb10u1
|
Improper Restriction of Rendered UI Layers or Frames
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Cross-site Scripting (XSS)
|
<87.0.4280.88-0.4~deb10u1
|
Missing Authorization
|
<87.0.4280.88-0.4~deb10u1
|
Missing Authorization
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Race Condition
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-16022
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-16020
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-16019
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-16014
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-16012
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-16016
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.141-0.1~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6557
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15992
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15988
|
<87.0.4280.88-0.4~deb10u1
|
Improper Initialization
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15985
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Improper Input Validation
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15984
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Read
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15982
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15980
|
<87.0.4280.88-0.4~deb10u1
|
Improper Input Validation
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15979
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Integer Overflow or Wraparound
|
<87.0.4280.88-0.4~deb10u1
|
Improper Input Validation
|
<87.0.4280.88-0.4~deb10u1
|
Integer Overflow or Wraparound
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15973
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15966
|
<87.0.4280.88-0.4~deb10u1
|
Access of Resource Using Incompatible Type ('Type Confusion')
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15963
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15962
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15961
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Race Condition
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-15959
|
<87.0.4280.88-0.4~deb10u1
|
Improper Input Validation
|
<87.0.4280.88-0.4~deb10u1
|
Integer Overflow or Wraparound
|
<87.0.4280.88-0.4~deb10u1
|
Information Exposure
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6568
|
<87.0.4280.88-0.4~deb10u1
|
Improper Input Validation
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6566
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6565
|
<87.0.4280.88-0.4~deb10u1
|
Improper Preservation of Permissions
|
<87.0.4280.88-0.4~deb10u1
|
Incorrect Permission Assignment for Critical Resource
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6563
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6561
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6560
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Read
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Information Exposure
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6538
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Access of Resource Using Incompatible Type ('Type Confusion')
|
<87.0.4280.88-0.4~deb10u1
|
Access of Resource Using Incompatible Type ('Type Confusion')
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6522
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
Improper Input Validation
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-Bounds
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Information Exposure
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6516
|
<87.0.4280.88-0.4~deb10u1
|
Information Exposure
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6514
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Incorrect Default Permissions
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6536
|
<87.0.4280.88-0.4~deb10u1
|
Improper Input Validation
|
<87.0.4280.88-0.4~deb10u1
|
Access of Resource Using Incompatible Type ('Type Confusion')
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6519
|
<87.0.4280.88-0.4~deb10u1
|
Information Exposure
|
<87.0.4280.88-0.4~deb10u1
|
Buffer Overflow
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
CVE-2020-6526
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Incorrect Authorization
|
<87.0.4280.88-0.4~deb10u1
|
Out-of-bounds Write
|
<87.0.4280.88-0.4~deb10u1
|
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Incorrect Authorization
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Improper Input Validation
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Incorrect Default Permissions
| |
Use After Free
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
CVE-2020-6499
| |
Incorrect Default Permissions
| |
CVE-2020-6500
| |
Out-of-Bounds
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Use After Free
| |
CVE-2020-6486
| |
Use After Free
| |
Use After Free
| |
Incorrect Default Permissions
| |
CVE-2020-6478
| |
Incorrect Default Permissions
| |
CVE-2020-6481
| |
Information Exposure
| |
Information Exposure
| |
CVE-2020-6491
| |
Improper Input Validation
| |
Incorrect Default Permissions
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Incorrect Default Permissions
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Incorrect Default Permissions
| |
Information Exposure
| |
Use After Free
| |
CVE-2020-6479
| |
Incorrect Default Permissions
| |
CVE-2020-6475
| |
Incorrect Default Permissions
| |
Cross-site Scripting (XSS)
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
CVE-2020-6460
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
CVE-2020-6435
| |
Incorrect Default Permissions
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
CVE-2020-6437
| |
CVE-2020-6440
| |
CVE-2020-6432
| |
Incorrect Default Permissions
| |
Use After Free
| |
Use After Free
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Insufficient Verification of Data Authenticity
| |
Incorrect Default Permissions
| |
Exposure of Resource to Wrong Sphere
| |
Use After Free
| |
CVE-2020-6433
| |
Out-of-bounds Read
| |
Information Exposure
| |
Incorrect Default Permissions
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Improper Input Validation
| |
CVE-2020-6410
| |
CVE-2020-6409
| |
CVE-2020-6413
| |
Information Exposure
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Improper Input Validation
| |
Information Exposure
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Improper Input Validation
| |
CVE-2020-6414
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Out-of-Bounds
| |
DEPRECATED: Use of Uninitialized Resource
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
| |
Unrestricted Upload of File with Dangerous Type
| |
CVE-2019-13672
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
CVE-2019-13758
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
CVE-2019-13742
| |
Out-of-bounds Read
| |
CVE-2019-13749
| |
Use of Uninitialized Resource
| |
CVE-2019-13743
| |
Out-of-bounds Write
| |
Improper Locking
| |
Out-of-bounds Write
| |
Information Exposure
| |
CVE-2019-13755
| |
Improper Preservation of Permissions
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Out-of-bounds Write
| |
CVE-2019-13746
| |
Origin Validation Error
| |
Missing Authorization
| |
Information Exposure
| |
CVE-2019-13754
| |
CVE-2019-13759
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2019-13756
| |
CVE-2019-13761
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
CVE-2019-13739
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Out-of-bounds Write
| |
CVE-2019-13763
| |
CVE-2019-13757
| |
Information Exposure
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Authentication Bypass
| |
Insecure Storage of Sensitive Information
| |
Authentication Bypass
| |
Authentication Bypass
| |
Authentication Bypass
| |
Incorrect Authorization
| |
CVE-2019-13710
| |
CVE-2019-13718
| |
Insecure Storage of Sensitive Information
| |
Authentication Bypass
| |
Out-of-bounds Write
| |
Information Exposure
| |
Information Exposure
| |
Out-of-bounds Write
| |
Information Exposure
| |
Authentication Bypass
| |
Information Exposure
| |
Arbitrary Code Injection
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2019-13678
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Improper Preservation of Permissions
| |
CVE-2019-13667
| |
Improper Input Validation
| |
CVE-2019-13659
| |
CVE-2019-13680
| |
Incorrect Permission Assignment for Critical Resource
| |
Improper Input Validation
| |
CVE-2019-13661
| |
Use After Free
| |
Incorrect Permission Assignment for Critical Resource
| |
Improper Preservation of Permissions
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
CVE-2019-13674
| |
Information Exposure
| |
CVE-2019-13671
| |
Out-of-bounds Write
| |
Incorrect Permission Assignment for Critical Resource
| |
CVE-2019-13669
| |
Origin Validation Error
| |
Incorrect Permission Assignment for Critical Resource
| |
CVE-2019-13663
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Default Permissions
| |
Missing Authorization
| |
Improper Handling of Exceptional Conditions
| |
CVE-2019-13660
| |
Out-of-bounds Write
| |
Information Exposure
| |
Out-of-bounds Write
| |
CVE-2019-13691
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Improper Input Validation
| |
Incorrect Calculation
| |
Out-of-bounds Write
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Cleartext Storage of Sensitive Information
| |
Out-of-bounds Write
| |
Race Condition
| |
Integer Overflow or Wraparound
| |
CVE-2019-5830
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
CVE-2019-5837
| |
CVE-2019-5833
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Use After Free
| |
CVE-2019-5832
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use of Uninitialized Resource
| |
Improper Data Handling
| |
Cross-site Request Forgery (CSRF)
| |
Cleartext Storage of Sensitive Information
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Open Redirect
| |
Improper Access Control
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
Double Free
| |
Out-of-bounds Read
| |
Race Condition
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Improper Input Validation
| |
Improper Data Handling
| |
Improper Input Validation
| |
Missing Authorization
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Cryptographic Issues
| |
Cleartext Storage of Sensitive Information
| |
Cross-site Scripting (XSS)
| |
Improper Check for Unusual or Exceptional Conditions
| |
Improper Input Validation
| |
CVE-2019-5766
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Improper Privilege Management
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Incorrect Type Conversion or Cast
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Numeric Errors
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Use After Free
| |
CVE-2018-20067
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Information Exposure
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Write
| |
CVE-2018-18348
| |
CVE-2018-18350
| |
Out-of-bounds Write
| |
CVE-2018-18345
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
Improper Input Validation
| |
Incorrect Permission Assignment for Critical Resource
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2018-18357
| |
Incorrect Permission Assignment for Critical Resource
| |
Out-of-bounds Write
| |
Improper Input Validation
| |
CVE-2018-18346
| |
Out-of-bounds Write
| |
CVE-2018-18355
| |
Improper Input Validation
| |
CVE-2018-18353
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |