| CVE-2024-5691 |  | 
| CVE-2024-5702 |  | 
| CVE-2024-5700 |  | 
| Information Exposure |  | 
| CVE-2024-5688 |  | 
| CVE-2024-5693 |  | 
| CVE-2024-5696 |  | 
| Incomplete Cleanup |  | 
| CVE-2024-4769 |  | 
| CVE-2024-4770 |  | 
| CVE-2024-4367 |  | 
| Out-of-bounds Write |  | 
| CVE-2024-4768 |  | 
| CVE-2024-3859 |  | 
| CVE-2024-3854 |  | 
| CVE-2024-3864 |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Use After Free |  | 
| CVE-2024-3857 |  | 
| CVE-2024-3852 |  | 
| CVE-2024-2609 |  | 
| CVE-2024-29944 |  | 
| CVE-2024-2612 |  | 
| CVE-2024-2607 |  | 
| Information Exposure |  | 
| CVE-2024-2610 |  | 
| Unchecked Return Value |  | 
| CVE-2024-2611 |  | 
| Out-of-bounds Write |  | 
| CVE-2024-2608 |  | 
| Out-of-bounds Write |  | 
| CVE-2024-1551 |  | 
| CVE-2024-1546 |  | 
| CVE-2024-1547 |  | 
| Incorrect Conversion between Numeric Types |  | 
| CVE-2024-1549 |  | 
| CVE-2024-1548 |  | 
| CVE-2024-1553 |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Improper Privilege Management |  | 
| CVE-2024-0755 |  | 
| Origin Validation Error |  | 
| CVE-2024-0750 |  | 
| CVE-2024-0742 |  | 
| CVE-2024-0753 |  | 
| Out-of-bounds Write |  | 
| CVE-2024-0747 |  | 
| CVE-2024-0746 |  | 
| CVE-2023-6860 |  | 
| CVE-2023-6863 |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| CVE-2023-6865 |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Race Condition |  | 
| Directory Traversal |  | 
| Use After Free |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Write |  | 
| CVE-2023-6208 |  | 
| Use After Free |  | 
| CVE-2023-5732 |  | 
| CVE-2023-5725 |  | 
| CVE-2023-5728 |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| CVE-2023-5724 |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| CVE-2023-4581 |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Origin Validation Error |  | 
| CVE-2023-4047 |  | 
| Race Condition |  | 
| Out-of-bounds Read |  | 
| CVE-2023-4046 |  | 
| Out-of-bounds Write |  | 
| CVE-2023-4055 |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| CVE-2023-37208 |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Improper Certificate Validation |  | 
| Authentication Bypass |  | 
| Out-of-bounds Read |  | 
| CVE-2023-32211 |  | 
| CVE-2023-32205 |  | 
| Use of Uninitialized Resource |  | 
| CVE-2023-32212 |  | 
| Out-of-bounds Write |  | 
| Double Free |  | 
| Out-of-bounds Write |  | 
| Improper Encoding or Escaping of Output |  | 
| CVE-2023-29550 |  | 
| CVE-2023-29548 |  | 
| Use After Free |  | 
| CVE-2023-29535 |  | 
| NULL Pointer Dereference |  | 
| CVE-2023-29533 |  | 
| CVE-2023-25751 |  | 
| CVE-2023-25752 |  | 
| CVE-2023-28164 |  | 
| Incorrect Type Conversion or Cast |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| CVE-2023-25742 |  | 
| Use After Free |  | 
| CVE-2023-25737 |  | 
| Out-of-bounds Write |  | 
| CVE-2023-25728 |  | 
| CVE-2023-25729 |  | 
| Out-of-bounds Write |  | 
| CVE-2023-25730 |  | 
| CVE-2023-0767 |  | 
| Use After Free |  | 
| Origin Validation Error |  | 
| CVE-2023-23603 |  | 
| Improper Check for Unusual or Exceptional Conditions |  | 
| Out-of-bounds Write |  | 
| CVE-2023-23598 |  | 
| CVE-2021-4127 |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| CVE-2022-46871 |  | 
| CVE-2022-46874 |  | 
| CVE-2022-46872 |  | 
| Out-of-bounds Write |  | 
| CVE-2022-46877 |  | 
| CVE-2022-45408 |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| CVE-2022-45410 |  | 
| Use After Free |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Link Following |  | 
| Out-of-bounds Write |  | 
| CVE-2022-45404 |  | 
| Cross-site Scripting (XSS) |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Origin Validation Error |  | 
| NULL Pointer Dereference |  | 
| Out-of-bounds Write |  | 
| CVE-2022-42929 |  | 
| Arbitrary Code Injection |  | 
| CVE-2022-40957 |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Insecure Storage of Sensitive Information |  | 
| Out-of-bounds Write |  | 
| Improper Preservation of Permissions |  | 
| Origin Validation Error |  | 
| Out-of-bounds Write |  | 
| CVE-2022-36319 |  | 
| Race Condition |  | 
| CVE-2022-34472 |  | 
| CVE-2022-34468 |  | 
| CVE-2022-34479 |  | 
| Use After Free |  | 
| Integer Overflow or Wraparound |  | 
| Use After Free |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| CVE-2022-31742 |  | 
| Cross-site Scripting (XSS) |  | 
| CVE-2022-31736 |  | 
| Out-of-bounds Write |  | 
| Use of Uninitialized Resource |  | 
| Authentication Bypass |  | 
| Out-of-bounds Read |  | 
| CVE-2022-31740 |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Incorrect Default Permissions |  | 
| Out-of-bounds Write |  | 
| Open Redirect |  | 
| CVE-2022-29914 |  | 
| CVE-2022-29916 |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Inefficient Regular Expression Complexity |  | 
| CVE-2022-26386 |  | 
| Time-of-check Time-of-use (TOCTOU) |  | 
| CVE-2022-26384 |  | 
| CVE-2022-26383 |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| CVE-2022-22763 |  | 
| CVE-2022-22759 |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| CVE-2022-22761 |  | 
| Incorrect Authorization |  | 
| CVE-2022-22756 |  | 
| Out-of-bounds Write |  | 
| CVE-2022-22743 |  | 
| Out-of-bounds Read |  | 
| Improper Certificate Validation |  | 
| CVE-2022-22741 |  | 
| Use After Free |  | 
| XML Injection |  | 
| CVE-2022-22739 |  | 
| Out-of-bounds Write |  | 
| CVE-2022-22745 |  | 
| CVE-2022-22748 |  | 
| Race Condition |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Race Condition |  | 
| CVE-2021-43541 |  | 
| Excessive Iteration |  | 
| Cross-site Scripting (XSS) |  | 
| Incorrect Type Conversion or Cast |  | 
| Information Exposure |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Use After Free |  | 
| Origin Validation Error |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Incorrect Authorization |  | 
| CVE-2021-38500 |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Race Condition |  | 
| Missing Initialization of Resource |  | 
| Interpretation Conflict |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| CVE-2021-29984 |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Arbitrary Code Injection |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Missing Initialization of Resource |  | 
| Operation on a Resource after Expiration or Release |  | 
| Arbitrary Argument Injection |  | 
| Incorrect Calculation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Privilege Management |  | 
| Insufficient Verification of Data Authenticity |  | 
| Authentication Bypass |  | 
| Out-of-Bounds |  | 
| Inadequate Encryption Strength |  | 
| Out-of-Bounds |  | 
| CVE-2021-23978 |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| CVE-2021-23969 |  | 
| Out-of-Bounds |  | 
| CVE-2021-23960 |  | 
| CVE-2021-23961 |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| CVE-2021-23953 |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| CVE-2020-26973 |  | 
| CVE-2020-35111 |  | 
| Out-of-bounds Write |  | 
| CVE-2020-26976 |  | 
| CVE-2020-26978 |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| CVE-2020-26961 |  | 
| Use After Free |  | 
| Improper Cross-boundary Removal of Sensitive Data |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| CVE-2020-16012 |  | 
| Use After Free |  | 
| CVE-2020-15683 |  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Open Redirect |  | 
| Release of Invalid Pointer or Reference |  | 
| Use After Free |  | 
| Incorrect Authorization |  | 
| Origin Validation Error |  | 
| Out-of-bounds Write |  | 
| CVE-2020-6514 |  | 
| Out-of-bounds Read |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Improper Certificate Validation |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Insufficient Verification of Data Authenticity |  | 
| Use After Free |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Race Condition |  | 
| Buffer Overflow |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Double Free |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Use After Free |  | 
| Arbitrary Code Injection |  | 
| Out-of-bounds Read |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Read |  | 
| Cross-site Scripting (XSS) |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Buffer Overflow |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Buffer Overflow |  | 
| Buffer Overflow |  | 
| Origin Validation Error |  | 
| Race Condition |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Buffer Overflow |  | 
| Out-of-bounds Read |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Inclusion of Functionality from Untrusted Control Sphere |  | 
| Cross-site Scripting (XSS) |  | 
| Arbitrary Code Injection |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Scripting (XSS) |  | 
| CVE-2019-11730 |  | 
| Improper Encoding or Escaping of Output |  | 
| Out-of-bounds Read |  | 
| Out-of-Bounds |  | 
| CVE-2019-11711 |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Information Exposure |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Origin Validation Error |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Reachable Assertion |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Origin Validation Error |  | 
| Out-of-bounds Read |  | 
| Origin Validation Error |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Improper Authentication |  | 
| Use After Free |  | 
| CVE-2018-18506 |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Origin Validation Error |  | 
| Out-of-bounds Write |  | 
| CVE-2018-12395 |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| CVE-2018-12392 |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Incorrect Type Conversion or Cast |  | 
| Insufficiently Protected Credentials |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Out-of-Bounds |  | 
| Integer Overflow or Wraparound |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Read |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| CVE-2017-7830 |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Improper Privilege Management |  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Arbitrary Code Injection |  | 
| Out-of-Bounds |  | 
| CVE-2017-5390 |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Read |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| CVE-2017-5386 |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Use After Free |  | 
| Error Handling |  | 
| DEPRECATED: Use of Uninitialized Resource |  | 
| CVE-2018-5117 |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Read |  | 
| Out-of-Bounds |  | 
| Origin Validation Error |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Improper Validation of Array Index |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Improper Access Control |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Read |  | 
| Out-of-Bounds |  | 
| Integer Overflow or Wraparound |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Security Features |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Integer Overflow or Wraparound |  | 
| Incorrect Calculation |  | 
| Use After Free |  | 
| Use After Free |  | 
| CVE-2018-5168 |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Arbitrary Code Injection |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Improper Certificate Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Security Features |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Integer Overflow or Wraparound |  | 
| Cross-site Scripting (XSS) |  | 
| Out-of-Bounds |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Incorrect Type Conversion or Cast |  | 
| Use After Free |  | 
| Integer Overflow or Wraparound |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Improper Access Control |  | 
| Security Features |  | 
| CVE-2016-2828 |  | 
| CVE-2016-2821 |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| CVE-2016-1964 |  | 
| CVE-2016-1973 |  | 
| Improper Data Handling |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Security Features |  | 
| Out-of-Bounds |  | 
| CVE-2016-1962 |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| CVE-2016-1960 |  | 
| Information Exposure |  | 
| CVE-2016-1966 |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Security Features |  | 
| CVE-2016-1979 |  | 
| Out-of-Bounds |  | 
| CVE-2016-1961 |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Improper Data Handling |  | 
| Information Exposure |  | 
| Numeric Errors |  | 
| Resource Management Errors |  | 
| Access Restriction Bypass |  | 
| CVE-2007-0801 |  | 
| CVE-2006-6498 |  | 
| Security Features |  | 
| Arbitrary Code Injection |  | 
| CVE-2006-6499 |  | 
| Access Restriction Bypass |  | 
| CVE-2006-6497 |  | 
| CVE-2006-6502 |  | 
| CVE-2006-6585 |  | 
| CVE-2006-5463 |  | 
| CVE-2006-5462 |  | 
| CVE-2006-5747 |  | 
| CVE-2006-5748 |  | 
| CVE-2006-5464 |  | 
| CVE-2006-5633 |  | 
| Improper Input Validation |  | 
| CVE-2006-2723 |  |