| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2024-6101 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2024-5836 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2024-5839 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-5840 | |
| Use After Free | |
| CVE-2024-5843 | |
| CVE-2024-5834 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| CVE-2024-3843 | |
| CVE-2024-3845 | |
| CVE-2024-3832 | |
| Use After Free | |
| CVE-2024-3838 | |
| Cross-site Scripting (XSS) | |
| CVE-2024-3840 | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| CVE-2024-3846 | |
| CVE-2024-3844 | |
| CVE-2024-3833 | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-Bounds | |
| CVE-2024-3156 | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2024-2629 | |
| CVE-2024-2630 | |
| Out-of-bounds Read | |
| CVE-2024-2631 | |
| CVE-2024-2625 | |
| Use After Free | |
| CVE-2024-2628 | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| CVE-2024-1672 | |
| CVE-2024-1671 | |
| CVE-2024-1675 | |
| CVE-2024-1674 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| CVE-2024-0810 | |
| Integer Underflow | |
| CVE-2024-0805 | |
| Use After Free | |
| CVE-2024-0811 | |
| Use After Free | |
| Origin Validation Error | |
| CVE-2024-0812 | |
| CVE-2024-0809 | |
| Use After Free | |
| CVE-2024-0804 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2024-0333 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| CVE-2023-6511 | |
| Use After Free | |
| CVE-2023-6512 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Origin Validation Error | |
| Use After Free | |
| Origin Validation Error | |
| Cross-site Scripting (XSS) | |
| CVE-2023-5857 | |
| CVE-2023-5850 | |
| Use After Free | |
| Use After Free | |
| Insufficient Verification of Data Authenticity | |
| Use After Free | |
| Origin Validation Error | |
| Origin Validation Error | |
| Use After Free | |
| CVE-2023-5485 | |
| CVE-2023-5478 | |
| CVE-2023-5477 | |
| CVE-2023-5475 | |
| CVE-2023-5479 | |
| Use After Free | |
| CVE-2023-5484 | |
| Use After Free | |
| CVE-2023-5486 | |
| CVE-2023-5487 | |
| CVE-2023-5483 | |
| CVE-2023-5481 | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| CVE-2023-4904 | |
| CVE-2023-4908 | |
| CVE-2023-4901 | |
| CVE-2023-4900 | |
| CVE-2023-4909 | |
| CVE-2023-4902 | |
| CVE-2023-4903 | |
| CVE-2023-4907 | |
| CVE-2023-4906 | |
| CVE-2023-4905 | |
| Out-of-bounds Write | |
| CVE-2023-4764 | |
| Out-of-bounds Read | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2022-4955 | |
| CVE-2023-4357 | |
| CVE-2023-4360 | |
| Use After Free | |
| Use After Free | |
| CVE-2023-4367 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-4364 | |
| CVE-2023-4359 | |
| Use After Free | |
| CVE-2023-4361 | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2023-4350 | |
| CVE-2023-4365 | |
| CVE-2023-4363 | |
| Out-of-bounds Write | |
| CVE-2023-4368 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-4078 | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Arbitrary Command Injection | |
| CVE-2023-4077 | |
| Use After Free | |
| CVE-2023-2311 | |
| CVE-2022-4917 | |
| Improper Input Validation | |
| CVE-2022-4906 | |
| Use After Free | |
| Insufficient Verification of Data Authenticity | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| CVE-2023-2313 | |
| Out-of-bounds Write | |
| CVE-2022-4915 | |
| CVE-2022-4907 | |
| CVE-2022-4926 | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| CVE-2022-4913 | |
| CVE-2022-4910 | |
| Out-of-bounds Write | |
| CVE-2022-4923 | |
| CVE-2022-4908 | |
| CVE-2022-4909 | |
| CVE-2022-4922 | |
| CVE-2021-4318 | |
| CVE-2021-4316 | |
| Use After Free | |
| CVE-2021-4323 | |
| Use After Free | |
| Use After Free | |
| CVE-2021-4321 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| CVE-2023-3736 | |
| CVE-2023-3738 | |
| Use After Free | |
| CVE-2023-3737 | |
| CVE-2023-3734 | |
| CVE-2023-3735 | |
| Out-of-bounds Write | |
| CVE-2023-3733 | |
| CVE-2023-3740 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2023-2940 | |
| CVE-2023-2941 | |
| Link Following | |
| CVE-2023-2938 | |
| CVE-2023-2937 | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-2726 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| CVE-2023-2462 | |
| CVE-2023-2465 | |
| CVE-2023-2466 | |
| CVE-2023-2460 | |
| CVE-2023-2463 | |
| CVE-2023-2464 | |
| Use After Free | |
| CVE-2023-2459 | |
| CVE-2023-2468 | |
| CVE-2023-2467 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| CVE-2023-1814 | |
| CVE-2023-1813 | |
| CVE-2023-1821 | |
| CVE-2023-1816 | |
| Out-of-bounds Read | |
| CVE-2023-1822 | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2023-1817 | |
| CVE-2023-1823 | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2021-30558 | |
| Out-of-bounds Read | |
| CVE-2023-1223 | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2023-1230 | |
| CVE-2023-1224 | |
| CVE-2023-1231 | |
| CVE-2023-1236 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-1228 | |
| Use After Free | |
| CVE-2023-1233 | |
| CVE-2023-1234 | |
| CVE-2023-1226 | |
| Out-of-bounds Write | |
| Use After Free | |
| Incorrect Default Permissions | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2023-1232 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-1221 | |
| CVE-2023-1225 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Integer Overflow or Wraparound | |
| CVE-2023-0697 | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-0700 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Integer Overflow or Wraparound | |
| CVE-2023-0704 | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2023-0141 | |
| CVE-2023-0133 | |
| Out-of-bounds Write | |
| CVE-2023-0131 | |
| CVE-2023-0140 | |
| Use After Free | |
| CVE-2023-0136 | |
| CVE-2023-0132 | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2023-0130 | |
| Use After Free | |
| CVE-2022-4025 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Arbitrary Code Injection | |
| CVE-2022-4187 | |
| Use After Free | |
| CVE-2022-4193 | |
| Use After Free | |
| CVE-2022-4185 | |
| Use After Free | |
| CVE-2022-4195 | |
| Use After Free | |
| CVE-2022-4184 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2022-4190 | |
| CVE-2022-4189 | |
| Use After Free | |
| CVE-2022-4182 | |
| CVE-2022-4183 | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2022-3443 | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2022-3660 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| CVE-2022-3447 | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Missing Authentication for Critical Function | |
| CVE-2022-3308 | |
| CVE-2022-3316 | |
| Race Condition | |
| Improper Resource Shutdown or Release | |
| CVE-2022-3317 | |
| CVE-2022-3310 | |
| CVE-2022-3313 | |
| CVE-2022-3304 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Input Validation | |
| Race Condition | |
| CVE-2022-3044 | |
| Incorrect Authorization | |
| Race Condition | |
| Out-of-bounds Write | |
| CVE-2022-3056 | |
| Use After Free | |
| Use After Free | |
| CVE-2022-3057 | |
| Race Condition | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2022-3054 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| CVE-2022-3047 | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2022-3053 | |
| Out-of-bounds Write | |
| CVE-2022-2860 | |
| Out-of-bounds Write | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Race Condition | |
| Use After Free | |
| CVE-2022-2856 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Improper Initialization | |
| Exposure of Resource to Wrong Sphere | |
| Use After Free | |
| Race Condition | |
| Improper Input Validation | |
| Race Condition | |
| Use After Free | |
| Out-of-bounds Read | |
| Race Condition | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2022-2611 | |
| Information Exposure | |
| Improper Encoding or Escaping of Output | |
| Race Condition | |
| CVE-2022-2622 | |
| Reliance on Cookies without Validation and Integrity Checking | |
| CVE-2022-2616 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2022-2165 | |
| Use After Free | |
| CVE-2022-2164 | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| CVE-2022-2162 | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Double Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| CVE-2022-1871 | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2022-1874 | |
| Use After Free | |
| Exposure of Resource to Wrong Sphere | |
| Use After Free | |
| Exposure of Resource to Wrong Sphere | |
| CVE-2022-1868 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| CVE-2022-1872 | |
| Use After Free | |
| CVE-2022-1862 | |
| Use After Free | |
| CVE-2022-1867 | |
| Use After Free | |
| CVE-2022-1857 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Exposure of Resource to Wrong Sphere | |
| Use After Free | |
| Origin Validation Error | |
| Use After Free | |
| Use After Free | |
| Exposure of Resource to Wrong Sphere | |
| Use After Free | |
| Out-of-bounds Write | |
| Exposure of Resource to Wrong Sphere | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Cross-site Scripting (XSS) | |
| Incorrect Authorization | |
| Use After Free | |
| Out-of-bounds Write | |
| Authentication Bypass | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Exposure of Resource to Wrong Sphere | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Incorrect Authorization | |
| Use After Free | |
| Authentication Bypass | |
| Authentication Bypass | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Information Exposure | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Directory Traversal | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| NULL Pointer Dereference | |
| Exposure of Resource to Wrong Sphere | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Incorrect Authorization | |
| Authentication Bypass | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2022-0804 | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2022-0802 | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Link Following | |
| Out-of-bounds Write | |
| CVE-2022-0807 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| CVE-2022-0803 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| CVE-2022-0467 | |
| Use After Free | |
| CVE-2022-0466 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2022-0462 | |
| CVE-2022-0461 | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| CVE-2022-0291 | |
| Use After Free | |
| Use After Free | |
| Incorrect Authorization | |
| Use After Free | |
| Use After Free | |
| CVE-2022-0303 | |
| Use After Free | |
| CVE-2022-0305 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| CVE-2022-0292 | |
| CVE-2022-0294 | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2022-0118 | |
| CVE-2022-0112 | |
| Use of Uninitialized Resource | |
| Use After Free | |
| CVE-2022-0097 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2022-0116 | |
| Origin Validation Error | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2022-0109 | |
| Use After Free | |
| Use After Free | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-bounds Read | |
| Origin Validation Error | |
| Origin Validation Error | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Origin Validation Error | |
| Incorrect Authorization | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2021-38018 | |
| CVE-2021-38021 | |
| CVE-2021-38022 | |
| CVE-2021-38020 | |
| Out-of-bounds Write | |
| CVE-2021-38010 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Information Exposure | |
| Always-Incorrect Control Flow Implementation | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Write | |
| Time-of-check Time-of-use (TOCTOU) | |
| Use After Free | |
| Out-of-bounds Write | |
| Improper Encoding or Escaping of Output | |
| Use After Free | |
| Integer Underflow | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| CVE-2021-4054 | |
| Use After Free | |
| Exposure of Resource to Wrong Sphere | |
| Use After Free | |
| Improper Handling of Exceptional Conditions | |
| Open Redirect | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2021-37989 | |
| CVE-2021-37995 | |
| Use After Free | |
| CVE-2021-37990 | |
| CVE-2021-37994 | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Race Condition | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2021-37980 | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| CVE-2021-37976 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| CVE-2021-37964 | |
| Exposure of Resource to Wrong Sphere | |
| Origin Validation Error | |
| Use After Free | |
| Exposure of Resource to Wrong Sphere | |
| CVE-2021-37963 | |
| Use After Free | |
| Improper Privilege Management | |
| Origin Validation Error | |
| Exposure of Resource to Wrong Sphere | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2021-37958 | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-Bounds | |
| Exposure of Resource to Wrong Sphere | |
| Use After Free | |
| Use After Free | |
| CVE-2021-30617 | |
| CVE-2021-30620 | |
| Authentication Bypass | |
| Use After Free | |
| Out-of-bounds Write | |
| Exposure of Resource to Wrong Sphere | |
| Use After Free | |
| CVE-2021-30618 | |
| Use After Free | |
| Authentication Bypass | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Origin Validation Error | |
| Out-of-bounds Write | |
| Use After Free | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Use of Uninitialized Resource | |
| Out-of-bounds Write | |
| CVE-2021-30584 | |
| Incorrect Authorization | |
| Use After Free | |
| Incorrect Authorization | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2021-30587 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Incorrect Authorization | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2021-30582 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Out-of-bounds Read | |
| Double Free | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Arbitrary Code Injection | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Origin Validation Error | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Insufficient Verification of Data Authenticity | |
| Incorrect Authorization | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Information Exposure | |
| Information Exposure | |
| Use of Uninitialized Resource | |
| Authentication Bypass | |
| Authentication Bypass | |
| Use After Free | |
| Use After Free | |
| CVE-2021-21212 | |
| Origin Validation Error | |
| Exposure of Resource to Wrong Sphere | |
| Origin Validation Error | |
| Use After Free | |
| Improper Input Validation | |
| CVE-2021-21205 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use of Uninitialized Resource | |
| Improper Authentication | |
| Use After Free | |
| CVE-2021-21187 | |
| Incorrect Authorization | |
| CVE-2021-21185 | |
| Origin Validation Error | |
| Origin Validation Error | |
| Incorrect Authorization | |
| CVE-2021-21181 | |
| Use After Free | |
| Use After Free | |
| CVE-2021-21178 | |
| CVE-2021-21176 | |
| Improper Authentication | |
| Origin Validation Error | |
| CVE-2021-21174 | |
| CVE-2021-21173 | |
| CVE-2021-21172 | |
| CVE-2021-21171 | |
| CVE-2021-21170 | |
| Out-of-Bounds | |
| CVE-2021-21168 | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Origin Validation Error | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2021-21147 | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Authentication | |
| Use After Free | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | |
| Origin Validation Error | |
| Information Exposure | |
| Origin Validation Error | |
| Authentication Bypass | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Authentication | |
| Improper Authentication | |
| Out-of-bounds Write | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Privilege Management | |
| Use After Free | |
| Out-of-bounds Write | <87.0.4280.141-0.1~deb10u1 |
| Use After Free | <87.0.4280.141-0.1~deb10u1 |
| Out-of-bounds Write | <87.0.4280.141-0.1~deb10u1 |
| Use After Free | <87.0.4280.141-0.1~deb10u1 |
| Use After Free | <87.0.4280.141-0.1~deb10u1 |
| Use After Free | <87.0.4280.141-0.1~deb10u1 |
| Use After Free | <87.0.4280.141-0.1~deb10u1 |
| Improper Restriction of Rendered UI Layers or Frames | <87.0.4280.141-0.1~deb10u1 |
| Use After Free | <87.0.4280.141-0.1~deb10u1 |
| Use After Free | <87.0.4280.141-0.1~deb10u1 |
| Use After Free | <87.0.4280.141-0.1~deb10u1 |
| CVE-2020-16043 | <87.0.4280.141-0.1~deb10u1 |
| Use After Free | |
| Information Exposure | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Read | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-16035 | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-16036 | <87.0.4280.88-0.4~deb10u1 |
| Improper Restriction of Rendered UI Layers or Frames | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-16034 | <87.0.4280.88-0.4~deb10u1 |
| Improper Restriction of Rendered UI Layers or Frames | <87.0.4280.88-0.4~deb10u1 |
| Improper Restriction of Rendered UI Layers or Frames | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Cross-site Scripting (XSS) | <87.0.4280.88-0.4~deb10u1 |
| Missing Authorization | <87.0.4280.88-0.4~deb10u1 |
| Missing Authorization | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Race Condition | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-16022 | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-16020 | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-16019 | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-16014 | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-16012 | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-16016 | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.141-0.1~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6557 | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15992 | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15988 | <87.0.4280.88-0.4~deb10u1 |
| Improper Initialization | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15985 | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15984 | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Read | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15982 | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15980 | <87.0.4280.88-0.4~deb10u1 |
| Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15979 | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Integer Overflow or Wraparound | <87.0.4280.88-0.4~deb10u1 |
| Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
| Integer Overflow or Wraparound | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15973 | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15966 | <87.0.4280.88-0.4~deb10u1 |
| Access of Resource Using Incompatible Type ('Type Confusion') | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15963 | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15962 | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15961 | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Race Condition | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-15959 | <87.0.4280.88-0.4~deb10u1 |
| Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
| Integer Overflow or Wraparound | <87.0.4280.88-0.4~deb10u1 |
| Information Exposure | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6568 | <87.0.4280.88-0.4~deb10u1 |
| Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6566 | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6565 | <87.0.4280.88-0.4~deb10u1 |
| Improper Preservation of Permissions | <87.0.4280.88-0.4~deb10u1 |
| Incorrect Permission Assignment for Critical Resource | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6563 | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6561 | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6560 | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Read | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Information Exposure | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6538 | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Access of Resource Using Incompatible Type ('Type Confusion') | <87.0.4280.88-0.4~deb10u1 |
| Access of Resource Using Incompatible Type ('Type Confusion') | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6522 | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
| Out-of-Bounds | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Information Exposure | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6516 | <87.0.4280.88-0.4~deb10u1 |
| Information Exposure | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6514 | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Incorrect Default Permissions | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6536 | <87.0.4280.88-0.4~deb10u1 |
| Improper Input Validation | <87.0.4280.88-0.4~deb10u1 |
| Access of Resource Using Incompatible Type ('Type Confusion') | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6519 | <87.0.4280.88-0.4~deb10u1 |
| Information Exposure | <87.0.4280.88-0.4~deb10u1 |
| Buffer Overflow | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| CVE-2020-6526 | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Incorrect Authorization | <87.0.4280.88-0.4~deb10u1 |
| Out-of-bounds Write | <87.0.4280.88-0.4~deb10u1 |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Incorrect Authorization | |
| Incorrect Default Permissions | |
| Incorrect Default Permissions | |
| Improper Input Validation | |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Write | |
| Incorrect Default Permissions | |
| Use After Free | |
| Incorrect Default Permissions | |
| Incorrect Default Permissions | |
| CVE-2020-6499 | |
| Incorrect Default Permissions | |
| CVE-2020-6500 | |
| Out-of-Bounds | |
| Incorrect Default Permissions | |
| Incorrect Default Permissions | |
| Use After Free | |
| CVE-2020-6486 | |
| Use After Free | |
| Use After Free | |
| Incorrect Default Permissions | |
| CVE-2020-6478 | |
| Incorrect Default Permissions | |
| CVE-2020-6481 | |
| Information Exposure | |
| Information Exposure | |
| CVE-2020-6491 | |
| Improper Input Validation | |
| Incorrect Default Permissions | |
| Use After Free | |
| Exposure of Resource to Wrong Sphere | |
| Incorrect Default Permissions | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Incorrect Default Permissions | |
| Information Exposure | |
| Use After Free | |
| CVE-2020-6479 | |
| Incorrect Default Permissions | |
| CVE-2020-6475 | |
| Incorrect Default Permissions | |
| Cross-site Scripting (XSS) | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| CVE-2020-6460 | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| CVE-2020-6435 | |
| Incorrect Default Permissions | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| CVE-2020-6437 | |
| CVE-2020-6440 | |
| CVE-2020-6432 | |
| Incorrect Default Permissions | |
| Use After Free | |
| Use After Free | |
| Incorrect Default Permissions | |
| Incorrect Default Permissions | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Insufficient Verification of Data Authenticity | |
| Incorrect Default Permissions | |
| Exposure of Resource to Wrong Sphere | |
| Use After Free | |
| CVE-2020-6433 | |
| Out-of-bounds Read | |
| Information Exposure | |
| Incorrect Default Permissions | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2020-6410 | |
| CVE-2020-6409 | |
| CVE-2020-6413 | |
| Information Exposure | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2020-6414 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| DEPRECATED: Use of Uninitialized Resource | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| Unrestricted Upload of File with Dangerous Type | |
| CVE-2019-13672 | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | |
| CVE-2019-13758 | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| CVE-2019-13742 | |
| Out-of-bounds Read | |
| CVE-2019-13749 | |
| Use of Uninitialized Resource | |
| CVE-2019-13743 | |
| Out-of-bounds Write | |
| Improper Locking | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2019-13755 | |
| Improper Preservation of Permissions | |
| Out-of-bounds Write | |
| Improper Privilege Management | |
| Out-of-bounds Write | |
| CVE-2019-13746 | |
| Origin Validation Error | |
| Missing Authorization | |
| Information Exposure | |
| CVE-2019-13754 | |
| CVE-2019-13759 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2019-13756 | |
| CVE-2019-13761 | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| CVE-2019-13739 | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Out-of-bounds Write | |
| CVE-2019-13763 | |
| CVE-2019-13757 | |
| Information Exposure | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Authentication Bypass | |
| Insecure Storage of Sensitive Information | |
| Authentication Bypass | |
| Authentication Bypass | |
| Authentication Bypass | |
| Incorrect Authorization | |
| CVE-2019-13710 | |
| CVE-2019-13718 | |
| Insecure Storage of Sensitive Information | |
| Authentication Bypass | |
| Out-of-bounds Write | |
| Information Exposure | |
| Information Exposure | |
| Out-of-bounds Write | |
| Information Exposure | |
| Authentication Bypass | |
| Information Exposure | |
| Arbitrary Code Injection | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2019-13678 | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Improper Preservation of Permissions | |
| CVE-2019-13667 | |
| Improper Input Validation | |
| CVE-2019-13659 | |
| CVE-2019-13680 | |
| Incorrect Permission Assignment for Critical Resource | |
| Improper Input Validation | |
| CVE-2019-13661 | |
| Use After Free | |
| Incorrect Permission Assignment for Critical Resource | |
| Improper Preservation of Permissions | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| CVE-2019-13674 | |
| Information Exposure | |
| CVE-2019-13671 | |
| Out-of-bounds Write | |
| Incorrect Permission Assignment for Critical Resource | |
| CVE-2019-13669 | |
| Origin Validation Error | |
| Incorrect Permission Assignment for Critical Resource | |
| CVE-2019-13663 | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Default Permissions | |
| Missing Authorization | |
| Improper Handling of Exceptional Conditions | |
| CVE-2019-13660 | |
| Out-of-bounds Write | |
| Information Exposure | |
| Out-of-bounds Write | |
| CVE-2019-13691 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Input Validation | |
| Incorrect Calculation | |
| Out-of-bounds Write | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Cleartext Storage of Sensitive Information | |
| Out-of-bounds Write | |
| Race Condition | |
| Integer Overflow or Wraparound | |
| CVE-2019-5830 | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| CVE-2019-5837 | |
| CVE-2019-5833 | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2019-5832 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use of Uninitialized Resource | |
| Improper Data Handling | |
| Cross-site Request Forgery (CSRF) | |
| Cleartext Storage of Sensitive Information | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Open Redirect | |
| Improper Access Control | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Integer Overflow or Wraparound | |
| Double Free | |
| Out-of-bounds Read | |
| Race Condition | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Improper Input Validation | |
| Improper Data Handling | |
| Improper Input Validation | |
| Missing Authorization | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Cryptographic Issues | |
| Cleartext Storage of Sensitive Information | |
| Cross-site Scripting (XSS) | |
| Improper Check for Unusual or Exceptional Conditions | |
| Improper Input Validation | |
| CVE-2019-5766 | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Privilege Management | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Incorrect Type Conversion or Cast | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Numeric Errors | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2018-20067 | |
| Improper Input Validation | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Write | |
| CVE-2018-18348 | |
| CVE-2018-18350 | |
| Out-of-bounds Write | |
| CVE-2018-18345 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Incorrect Permission Assignment for Critical Resource | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2018-18357 | |
| Incorrect Permission Assignment for Critical Resource | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| CVE-2018-18346 | |
| Out-of-bounds Write | |
| CVE-2018-18355 | |
| Improper Input Validation | |
| CVE-2018-18353 | |
| Out-of-bounds Write | |
| Improper Privilege Management | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |