Information Exposure | |
Incorrect Type Conversion or Cast | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Improper Validation of Array Index | |
Out-of-bounds Read | |
CVE-2018-17464 | |
Use After Free | |
CVE-2018-17471 | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2018-17476 | |
CVE-2018-17463 | |
CVE-2018-17477 | |
Missing Release of Resource after Effective Lifetime | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Use After Free | |
Information Exposure | |
CVE-2018-17475 | |
CVE-2018-17473 | |
Incomplete Cleanup | |
Improper Validation of Array Index | |
CVE-2018-17459 | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Incorrect Permission Assignment for Critical Resource | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Missing Authorization | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Race Condition | |
Improper Authorization | |
Improper Authorization | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-bounds Read | |
CVE-2018-16075 | |
Improper Authorization | |
Improper Authorization | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2018-6175 | |
Out-of-bounds Write | |
Improper Input Validation | |
Information Exposure | |
Improper Restriction of Rendered UI Layers or Frames | |
Information Exposure | |
Unrestricted Upload of File with Dangerous Type | |
CVE-2018-6167 | |
CVE-2018-6166 | |
Information Exposure | |
Use After Free | |
CVE-2018-6165 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2018-6163 | |
Information Exposure | |
CVE-2018-6173 | |
Race Condition | |
Improper Input Validation | |
Information Exposure | |
CVE-2018-6172 | |
Out-of-bounds Read | |
Information Exposure | |
Out-of-bounds Write | |
CVE-2018-6044 | |
Integer Overflow or Wraparound | |
Incorrect Type Conversion or Cast | |
Out-of-bounds Read | |
CRLF Injection | |
Out-of-Bounds | |
Incorrect Type Conversion or Cast | |
CVE-2010-1765 | |
Improper Data Handling | |
Information Exposure | |
Use After Free | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Open Redirect | |
CVE-2018-6125 | |
CVE-2018-6107 | |
Improper Input Validation | |
Out-of-bounds Read | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Integer Overflow or Wraparound | |
CVE-2018-6103 | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Out-of-bounds Read | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2018-6135 | |
Out-of-bounds Read | |
Arbitrary Code Injection | |
CVE-2018-6098 | |
Improper Privilege Management | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Write | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Improper Input Validation | |
CVE-2018-6108 | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Improper Input Validation | |
Information Exposure | |
Use of Incorrectly-Resolved Name or Reference | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Use After Free | |
Improper Input Validation | |
Improper Data Handling | |
Incorrect Type Conversion or Cast | |
CVE-2016-5194 | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Information Exposure | |
Incorrect Permission Assignment for Critical Resource | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Data Handling | |
Improper Input Validation | |
Race Condition | |
Incorrect Type Conversion or Cast | |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Input Validation | |
CVE-2018-6049 | |
Information Exposure | |
CVE-2016-9652 | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Use of Uninitialized Resource | |
CVE-2018-6105 | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Out-of-bounds Read | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
Incorrect Permission Assignment for Critical Resource | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Incorrect Permission Assignment for Critical Resource | |
Out-of-Bounds | |
Improper Data Handling | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2018-6083 | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Write | |
Improper Input Validation | |
CVE-2018-6104 | |
Out-of-bounds Write | |
Cryptographic Issues | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Data Handling | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
CVE-2017-15391 | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Exposure of Resource to Wrong Sphere | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2017-15387 | |
Use After Free | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Privilege Management | |
Information Exposure | |
Use After Free | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Incorrect Permission Assignment for Critical Resource | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Race Condition | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Read | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Race Condition | |
Improper Input Validation | |
Use After Free | |
Incorrect Type Conversion or Cast | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Incorrect Type Conversion or Cast | |
Use After Free | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Incorrect Type Conversion or Cast | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
CVE-2017-5120 | |
Improper Input Validation | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2017-5078 | |
Out-of-Bounds | |
Use After Free | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
Missing Encryption of Sensitive Data | |
Use After Free | |
Use After Free | |
Improper Preservation of Permissions | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Race Condition | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Origin Validation Error | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
CVE-2017-5013 | |
CVE-2017-5027 | |
Cross-site Scripting (XSS) | |
Improper Restriction of Rendered UI Layers or Frames | |
Information Exposure | |
Use After Free | |
CVE-2017-5015 | |
Use After Free | |
Cross-site Scripting (XSS) | |
NULL Pointer Dereference | |
CVE-2017-5022 | |
Out-of-Bounds | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-Bounds | |
Improper Data Handling | |
Information Exposure | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
Use After Free | |
Integer Overflow or Wraparound | |
Improper Data Handling | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Improper Access Control | |
Information Exposure | |
Improper Access Control | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Numeric Errors | |
Integer Overflow or Wraparound | |
Improper Data Handling | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Improper Access Control | |
Improper Input Validation | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Improper Access Control | |
Use After Free | |
Out-of-bounds Read | |
Improper Access Control | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Use After Free | |
CVE-2016-7549 | |
Improper Access Control | |
CVE-2016-5175 | |
Security Features | |
Improper Data Handling | |
Improper Data Handling | |
Cross-site Scripting (XSS) | |
Use After Free | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Security Features | |
Security Features | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Security Features | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Use After Free | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Incorrect Type Conversion or Cast | |
Information Exposure | |
CVE-2016-5167 | |
Cross-site Scripting (XSS) | |
Use After Free | |
Security Features | |
Out-of-Bounds | |
CVE-2016-5146 | |
Use After Free | |
Improper Access Control | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-Bounds | |
Use After Free | |
CVE-2016-1705 | |
Improper Authorization | |
Improper Authorization | |
Improper Authentication | |
Security Features | |
Information Exposure | |
Security Features | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Improper Access Control | |
Information Exposure | |
Use After Free | |
Use After Free | |
CVE-2016-1704 | |
Improper Access Control | |
CVE-2016-1701 | |
Security Features | |
CVE-2016-1684 | |
Out-of-Bounds | |
Improper Access Control | |
CVE-2016-1674 | |
Out-of-Bounds | |
Improper Access Control | |
Improper Access Control | |
CVE-2016-1690 | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2016-1679 | |
Security Features | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Security Features | |
Out-of-Bounds | |
Improper Access Control | |
Improper Access Control | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2016-1695 | |
CVE-2016-1673 | |
Information Exposure | |
CVE-2016-1700 | |
Information Exposure | |
Information Exposure | |
Improper Access Control | |
CVE-2016-1703 | |
Improper Access Control | |
Improper Input Validation | |
CVE-2016-1662 | |
Security Features | |
CVE-2016-1666 | |
Out-of-Bounds | |
Improper Access Control | |
CVE-2016-1663 | |
Improper Input Validation | |
Improper Input Validation | |
Race Condition | |
CVE-2016-1659 | |
CVE-2016-1655 | |
Security Features | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2016-1647 | |
CVE-2016-1648 | |
CVE-2016-1650 | |
CVE-2016-1644 | |
Out-of-Bounds | |
Time and State | |
CVE-2016-1635 | |
Access Restriction Bypass | |
Improper Access Control | |
CVE-2016-1634 | |
CVE-2016-1639 | |
CVE-2016-1641 | |
CVE-2016-2843 | |
Access Restriction Bypass | |
Code | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2016-1633 | |
Information Exposure | |
CVE-2016-1642 | |
Improper Input Validation | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Information Exposure | |
Information Exposure | |
Security Features | |
CVE-2016-1613 | |
CVE-2016-1620 | |
Out-of-Bounds | |
Cryptographic Issues | |
Security Features | |
Improper Input Validation | |
CVE-2016-2052 | |
Numeric Errors | |
CVE-2015-6792 | |
Race Condition | |
CVE-2015-6791 | |
Improper Input Validation | |
CVE-2015-6788 | |
CVE-2015-8548 | |
CVE-2015-6774 | |
CVE-2015-6780 | |
CVE-2015-6775 | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
CVE-2015-6767 | |
Improper Input Validation | |
CVE-2015-6787 | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2015-6777 | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Improper Input Validation | |
CVE-2015-8478 | |
Out-of-Bounds | |
CVE-2015-6765 | |
Access Restriction Bypass | |
CVE-2015-6766 | |
Out-of-Bounds | |
Numeric Errors | |
Out-of-Bounds | |
Access Restriction Bypass | |
Buffer Overflow | |
Improper Input Validation | |
Security Features | |
Race Condition | |
Access Restriction Bypass | |
Information Exposure | |
CVE-2015-6763 | |
CVE-2015-7834 | |
CVE-2015-6757 | |
Code | |
CVE-2015-6756 | |
Code | |
Improper Access Control | |
Improper Input Validation | |
Access Restriction Bypass | |
CVE-2015-1294 | |
Security Features | |
CVE-2015-6581 | |
Security Features | |
Access Restriction Bypass | |
CVE-2015-6580 | |
CVE-2015-1295 | |
CVE-2015-1301 | |
Security Features | |
Access Restriction Bypass | |
Security Features | |
Security Features | |
Security Features | |
CVE-2015-1299 | |
CVE-2015-1282 | |
Out-of-Bounds | |
Numeric Errors | |
Code | |
CVE-2015-1276 | |
CVE-2015-1272 | |
Numeric Errors | |
CVE-2015-1289 | |
Improper Data Handling | |
Improper Input Validation | |
Code | |
Security Features | |
Security Features | |
Information Exposure | |
CVE-2015-1277 | |
Out-of-Bounds | |
Security Features | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Security Features | |
Security Features | |
Security Features | |
Security Features | |
Out-of-Bounds | |
Numeric Errors | |
CVE-2015-1251 | |
Improper Access Control | |
Cross-site Scripting (XSS) | |
CVE-2015-1265 | |
Code | |
CVE-2015-3910 | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2015-1256 | |
CVE-2015-1260 | |
Numeric Errors | |
Improper Input Validation | |
Code | |
CVE-2015-1255 | |
Code | |
CVE-2015-1250 | |
CVE-2015-1243 | |
Improper Input Validation | |
CVE-2015-1245 | |
CVE-2015-1249 | |
CVE-2015-1237 | |
CVE-2015-3333 | |
Code | |
Out-of-Bounds | |
Information Exposure | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
CVE-2015-1242 | |
Access Restriction Bypass | |
Information Exposure | |
Code | |
Race Condition | |
CVE-2015-2238 | |
Code | |
Improper Data Handling | |