CVE-2024-3854
| |
CVE-2024-3857
| |
CVE-2024-2609
| |
CVE-2024-3859
| |
CVE-2024-3864
| |
CVE-2024-3852
| |
CVE-2024-3861
| |
CVE-2024-3302
| |
CVE-2024-29944
| |
CVE-2024-2614
| |
CVE-2024-2610
| |
CVE-2023-5388
| |
CVE-2024-2611
| |
CVE-2024-2608
| |
CVE-2024-2616
| |
CVE-2024-2607
| |
Unchecked Return Value
| |
CVE-2024-2612
| |
CVE-2024-1549
| |
CVE-2024-1550
| |
CVE-2024-1553
| |
CVE-2024-1551
| |
CVE-2024-1552
| |
CVE-2024-1548
| |
CVE-2024-1547
| |
CVE-2024-1546
| |
Use After Free
| |
Origin Validation Error
| |
CVE-2024-0746
| |
Out-of-bounds Write
| |
CVE-2024-0747
| |
CVE-2024-0742
| |
CVE-2024-0750
| |
Improper Privilege Management
| |
CVE-2024-0755
| |
CVE-2024-0753
| |
Out-of-bounds Write
| |
Race Condition
| |
CVE-2023-6860
| |
CVE-2023-6863
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2023-6865
| |
Improper Restriction of Rendered UI Layers or Frames
| |
CVE-2023-6208
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Directory Traversal
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Use After Free
| |
CVE-2023-5732
| |
CVE-2023-5725
| |
CVE-2023-5728
| |
Improper Restriction of Rendered UI Layers or Frames
| |
CVE-2023-5724
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2023-4581
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Origin Validation Error
| |
CVE-2023-4047
| |
Race Condition
| |
Out-of-bounds Read
| |
CVE-2023-4046
| |
Out-of-bounds Write
| |
CVE-2023-4055
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
CVE-2023-37208
| |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Improper Certificate Validation
| |
Authentication Bypass
| |
Out-of-bounds Read
| |
CVE-2023-32211
| |
CVE-2023-32205
| |
Use of Uninitialized Resource
| |
CVE-2023-32212
| |
Out-of-bounds Write
| |
Double Free
| |
Out-of-bounds Write
| |
Improper Encoding or Escaping of Output
| |
CVE-2023-29550
| |
CVE-2023-29548
| |
Use After Free
| |
CVE-2023-29535
| |
NULL Pointer Dereference
| |
CVE-2023-29533
| |
CVE-2023-25751
| |
CVE-2023-25752
| |
CVE-2023-28164
| |
Incorrect Type Conversion or Cast
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2023-25742
| |
Use After Free
| |
CVE-2023-25737
| |
Out-of-bounds Write
| |
CVE-2023-25728
| |
CVE-2023-25729
| |
Out-of-bounds Write
| |
CVE-2023-25730
| |
CVE-2023-0767
| |
Use After Free
| |
Origin Validation Error
| |
CVE-2023-23603
| |
Improper Check for Unusual or Exceptional Conditions
| |
Out-of-bounds Write
| |
CVE-2023-23598
| |
CVE-2021-4127
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2022-46871
| |
CVE-2022-46874
| |
CVE-2022-46872
| |
Out-of-bounds Write
| |
CVE-2022-46877
| |
CVE-2022-45408
| |
Improper Restriction of Rendered UI Layers or Frames
| |
CVE-2022-45410
| |
Use After Free
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Link Following
| |
Out-of-bounds Write
| |
CVE-2022-45404
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Origin Validation Error
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
CVE-2022-42929
| |
Arbitrary Code Injection
| |
CVE-2022-40957
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Insecure Storage of Sensitive Information
| |
Out-of-bounds Write
| |
Use After Free
| |
Improper Preservation of Permissions
| |
Origin Validation Error
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2022-36319
| |
Race Condition
| |
CVE-2022-34472
| |
CVE-2022-34468
| |
CVE-2022-34479
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
CVE-2022-31742
| |
Cross-site Scripting (XSS)
| |
CVE-2022-31736
| |
Out-of-bounds Write
| |
Use of Uninitialized Resource
| |
Authentication Bypass
| |
Out-of-bounds Read
| |
CVE-2022-31740
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Incorrect Default Permissions
| |
Out-of-bounds Write
| |
Open Redirect
| |
CVE-2022-29914
| |
CVE-2022-29916
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Inefficient Regular Expression Complexity
| |
CVE-2022-26386
| |
Time-of-check Time-of-use (TOCTOU)
| |
CVE-2022-26384
| |
CVE-2022-26383
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2022-22763
| |
CVE-2022-22759
| |
Out-of-bounds Write
| |
Information Exposure
| |
CVE-2022-22761
| |
Incorrect Authorization
| |
CVE-2022-22756
| |
Out-of-bounds Write
| |
CVE-2022-22743
| |
Out-of-bounds Read
| |
Improper Certificate Validation
| |
CVE-2022-22741
| |
Use After Free
| |
XML Injection
| |
CVE-2022-22739
| |
Out-of-bounds Write
| |
CVE-2022-22745
| |
CVE-2022-22748
| |
Race Condition
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Information Exposure
| |
Race Condition
| |
CVE-2021-43541
| |
Excessive Iteration
| |
Cross-site Scripting (XSS)
| |
Incorrect Type Conversion or Cast
| |
Information Exposure
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Use After Free
| |
Origin Validation Error
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Incorrect Authorization
| |
CVE-2021-38500
| |
Use After Free
| |
Out-of-bounds Write
| |
Race Condition
| |
Missing Initialization of Resource
| |
Interpretation Conflict
| |
Out-of-Bounds
| |
Use After Free
| |
CVE-2021-29984
| |
Use After Free
| |
Out-of-bounds Write
| |
Arbitrary Code Injection
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Missing Initialization of Resource
| |
Operation on a Resource after Expiration or Release
| |
Arbitrary Argument Injection
| |
Incorrect Calculation
| |
Integer Overflow or Wraparound
| |
Improper Privilege Management
| |
Insufficient Verification of Data Authenticity
| |
Authentication Bypass
| |
Out-of-Bounds
| |
Inadequate Encryption Strength
| |
Out-of-Bounds
| |
CVE-2021-23978
| |
Information Exposure
| |
Information Exposure
| |
CVE-2021-23969
| |
Out-of-Bounds
| |
CVE-2021-23960
| |
CVE-2021-23961
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
CVE-2021-23953
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2020-26973
| |
CVE-2020-35111
| |
Out-of-bounds Write
| |
CVE-2020-26976
| |
CVE-2020-26978
| |
Information Exposure
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2020-26961
| |
Use After Free
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Cross-site Scripting (XSS)
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
CVE-2020-16012
| |
Use After Free
| |
CVE-2020-15683
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Open Redirect
| |
Release of Invalid Pointer or Reference
| |
Use After Free
| |
Incorrect Authorization
| |
Origin Validation Error
| |
Out-of-bounds Write
| |
CVE-2020-6514
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Certificate Validation
| |
Use After Free
| |
Out-of-Bounds
| |
Insufficient Verification of Data Authenticity
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Race Condition
| |
Buffer Overflow
| |
Information Exposure
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Use After Free
| |
Double Free
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Arbitrary Code Injection
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Cross-site Scripting (XSS)
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Buffer Overflow
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Buffer Overflow
| |
Buffer Overflow
| |
Origin Validation Error
| |
Race Condition
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Buffer Overflow
| |
Out-of-bounds Read
| |
Improper Initialization
| |
Buffer Overflow
| |
Information Exposure
| |
Out-of-Bounds
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Incorrect Default Permissions
| |
Improper Input Validation
| |
Improper Preservation of Permissions
| |
Inclusion of Functionality from Untrusted Control Sphere
| |
CVE-2019-11749
| |
Cross-site Scripting (XSS)
| |
Arbitrary Code Injection
| |
Out-of-Bounds
| |
Use After Free
| |
Cross-site Request Forgery (CSRF)
| |
Cross-site Scripting (XSS)
| |
CVE-2019-11730
| |
Improper Encoding or Escaping of Output
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
CVE-2019-11711
| |
Information Exposure
| |
Improper Input Validation
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Information Exposure
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Origin Validation Error
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Use After Free
| |
Improper Input Validation
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Reachable Assertion
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Origin Validation Error
| |
Out-of-bounds Read
| |
Origin Validation Error
| |
Information Exposure
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-Bounds
| |
Improper Authentication
| |
Use After Free
| |
CVE-2018-18506
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Origin Validation Error
| |
Out-of-bounds Write
| |
CVE-2018-12395
| |
Incorrect Permission Assignment for Critical Resource
| |
Information Exposure
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
CVE-2018-12392
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Improper Input Validation
| |
Incorrect Type Conversion or Cast
| |
Insufficiently Protected Credentials
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Use After Free
| |
Cross-site Request Forgery (CSRF)
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Information Exposure
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Privilege Management
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Input Validation
| |
Improper Input Validation
| |
Use After Free
| |
Security Features
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Certificate Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2018-5168
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
Information Exposure
| |
Arbitrary Code Injection
| |
Use After Free
| |
CVE-2018-5117
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Arbitrary Code Injection
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2017-5390
| |
Out-of-Bounds
| |
Error Handling
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
DEPRECATED: Use of Uninitialized Resource
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Security Features
| |
CVE-2017-7830
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Information Exposure
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Read
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Out-of-bounds Write
| |
Information Exposure
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-Bounds
| |
Information Exposure
| |
CVE-2017-5386
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Information Exposure
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Origin Validation Error
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Improper Validation of Array Index
| |
Out-of-bounds Write
| |
Integer Overflow or Wraparound
| |
Information Exposure
| |
Information Exposure
| |
Out-of-Bounds
| |
Improper Access Control
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Incorrect Calculation
| |
Information Exposure
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Use After Free
| |
Incorrect Type Conversion or Cast
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Information Exposure
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Cross-site Scripting (XSS)
| |
CVE-2016-2828
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2016-2821
| |
Improper Access Control
| |
Security Features
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Information Exposure
| |
Out-of-Bounds
| |
Security Features
| |
CVE-2016-1979
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Numeric Errors
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2016-1966
| |
Security Features
| |
CVE-2016-1961
| |
Improper Data Handling
| |
Access Restriction Bypass
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2016-1964
| |
Information Exposure
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2016-1973
| |
Out-of-Bounds
| |
Resource Management Errors
| |
Out-of-Bounds
| |
CVE-2016-1962
| |
CVE-2016-1960
| |
Improper Data Handling
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
CVE-2007-0801
| |
Security Features
| |
CVE-2006-6498
| |
CVE-2006-6499
| |
Access Restriction Bypass
| |
CVE-2006-6502
| |
Arbitrary Code Injection
| |
CVE-2006-6497
| |
CVE-2006-6585
| |
CVE-2006-5463
| |
CVE-2006-5462
| |
CVE-2006-5748
| |
CVE-2006-5747
| |
CVE-2006-5464
| |
CVE-2006-5633
| |
Improper Input Validation
| |
CVE-2006-2723
| |