chromium-browser vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the chromium-browser package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Information Exposure

<14.0.835.163~r101024-1
  • H
Incorrect Type Conversion or Cast

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<56.0.2924.76-1~deb8u1
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Read

*
  • M
Cross-site Scripting (XSS)

*
  • H
Out-of-bounds Read

*
  • H
Out-of-bounds Read

<51.0.2704.63-1~deb8u1
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • H
Improper Validation of Array Index

*
  • H
Out-of-bounds Read

*
  • M
CVE-2018-17464

*
  • H
Use After Free

*
  • M
CVE-2018-17471

*
  • H
Out-of-Bounds

*
  • C
Improper Input Validation

*
  • M
CVE-2018-17476

*
  • H
CVE-2018-17463

*
  • M
CVE-2018-17477

*
  • H
Missing Release of Resource after Effective Lifetime

*
  • H
Out-of-bounds Read

*
  • H
Out-of-bounds Write

*
  • C
Use After Free

*
  • M
Information Exposure

*
  • M
CVE-2018-17475

*
  • M
CVE-2018-17473

*
  • M
Incomplete Cleanup

*
  • H
Improper Validation of Array Index

*
  • M
CVE-2018-17459

*
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Read

*
  • H
Missing Authorization

*
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Race Condition

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Out-of-bounds Read

*
  • C
Improper Input Validation

*
  • H
Out-of-bounds Read

*
  • M
CVE-2018-16075

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • H
Improper Input Validation

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • M
CVE-2018-6175

*
  • M
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Improper Restriction of Rendered UI Layers or Frames

*
  • M
Information Exposure

*
  • C
Unrestricted Upload of File with Dangerous Type

*
  • M
CVE-2018-6167

*
  • M
CVE-2018-6166

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
CVE-2018-6165

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • M
CVE-2018-6163

*
  • M
Information Exposure

*
  • M
CVE-2018-6173

*
  • H
Race Condition

*
  • H
Improper Input Validation

*
  • M
Information Exposure

*
  • M
CVE-2018-6172

*
  • H
Out-of-bounds Read

*
  • M
Information Exposure

*
  • H
Out-of-bounds Write

*
  • L
CVE-2018-6044

*
  • H
Integer Overflow or Wraparound

*
  • H
Incorrect Type Conversion or Cast

*
  • H
Out-of-bounds Read

*
  • M
CRLF Injection

*
  • H
Out-of-Bounds

*
  • H
Incorrect Type Conversion or Cast

*
  • L
CVE-2010-1765

<5.0.375.55~r47796-1
  • H
Improper Data Handling

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • C
Use After Free

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Improper Input Validation

*
  • M
Open Redirect

*
  • M
CVE-2018-6125

*
  • M
CVE-2018-6107

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Integer Overflow or Wraparound

*
  • M
CVE-2018-6103

*
  • H
Out-of-bounds Write

*
  • H
Integer Overflow or Wraparound

*
  • H
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Out-of-Bounds

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
CVE-2018-6135

*
  • H
Out-of-bounds Read

*
  • H
Arbitrary Code Injection

<55.0.2883.75-1~deb8u1
  • M
CVE-2018-6098

*
  • M
Improper Privilege Management

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • H
Out-of-bounds Read

*
  • H
Out-of-bounds Write

*
  • H
Improper Input Validation

*
  • M
CVE-2018-6108

*
  • M
Improper Input Validation

*
  • H
Incorrect Type Conversion or Cast

*
  • M
Out-of-Bounds

*
  • M
Cross-site Scripting (XSS)

*
  • H
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • H
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Use of Incorrectly-Resolved Name or Reference

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Read

*
  • H
Use After Free

*
  • M
Improper Input Validation

*
  • M
Improper Data Handling

*
  • H
Incorrect Type Conversion or Cast

*
  • C
CVE-2016-5194

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Use After Free

*
  • H
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Cross-site Scripting (XSS)

*
  • H
Out-of-bounds Write

*
  • H
Improper Input Validation

*
  • M
Improper Data Handling

*
  • M
Improper Input Validation

*
  • H
Race Condition

*
  • H
Incorrect Type Conversion or Cast

*
  • C
Out-of-Bounds

*
  • M
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • M
CVE-2018-6049

*
  • M
Information Exposure

*
  • C
CVE-2016-9652

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • M
Information Exposure

*
  • H
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • M
Out-of-Bounds

*
  • M
Use of Uninitialized Resource

*
  • M
CVE-2018-6105

*
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • M
Information Exposure

*
  • H
Out-of-bounds Write

*
  • M
Cross-site Scripting (XSS)

*
  • M
Out-of-bounds Read

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • C
Incorrect Permission Assignment for Critical Resource

<55.0.2883.75-1~deb8u1
  • H
Out-of-Bounds

*
  • M
Information Exposure

*
  • M
Out-of-Bounds

*
  • H
Incorrect Permission Assignment for Critical Resource

*
  • M
Out-of-Bounds

*
  • M
Improper Data Handling

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • H
CVE-2018-6083

*
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Cross-site Scripting (XSS)

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • M
CVE-2018-6104

*
  • H
Out-of-bounds Write

*
  • M
Cryptographic Issues

*
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Out-of-bounds Read

*
  • H
Out-of-Bounds

*
  • M
Improper Data Handling

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Out-of-Bounds

*
  • H
Use After Free

*
  • H
Out-of-Bounds

*
  • M
Cross-site Scripting (XSS)

*
  • H
Integer Overflow or Wraparound

*
  • H
Out-of-bounds Write

*
  • M
CVE-2017-15391

*
  • H
Use After Free

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Read

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • H
Exposure of Resource to Wrong Sphere

*
  • H
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • M
Improper Input Validation

*
  • H
CVE-2017-15387

*
  • C
Use After Free

*
  • H
Out-of-bounds Read

*
  • H
Out-of-Bounds

<44.0.2403.89-1
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • M
Cross-site Scripting (XSS)

*
  • H
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • H
Use After Free

*
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • H
Out-of-bounds Read

*
  • M
Information Exposure

*
  • H
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • H
Out-of-Bounds

*
  • H
Improper Input Validation

*
  • H
Incorrect Type Conversion or Cast

*
  • L
Improper Input Validation

*
  • H
Use After Free

*
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Out-of-bounds Read

*
  • H
Incorrect Type Conversion or Cast

*
  • H
Out-of-Bounds

*
  • H
Out-of-bounds Read

*
  • H
Incorrect Type Conversion or Cast

*
  • H
Incorrect Type Conversion or Cast

*
  • H
Use After Free

*
  • H
Incorrect Type Conversion or Cast

*
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • M
Incorrect Type Conversion or Cast

*
  • H
CVE-2017-5078

*
  • M
Improper Input Validation

*
  • L
Improper Privilege Management

*
  • H
Improper Input Validation

*
  • H
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
CVE-2017-5120

*
  • H
Use After Free

*
  • H
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Out-of-Bounds

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Information Exposure

*
  • H
Race Condition

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • C
Out-of-bounds Read

*
  • H
Use After Free

*
  • M
Improper Input Validation

*
  • H
Out-of-Bounds

*
  • H
Improper Input Validation

*
  • H
Out-of-Bounds

*
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
Use After Free

<53.0.2785.143-1~deb8u1
  • C
Improper Input Validation

<53.0.2785.143-1~deb8u1
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Out-of-bounds Write

<57.0.2987.98-1~deb8u1
  • H
Use After Free

<57.0.2987.98-1~deb8u1
  • M
Improper Input Validation

<57.0.2987.98-1~deb8u1
  • M
Information Exposure

<57.0.2987.98-1~deb8u1
  • H
Use After Free

<57.0.2987.98-1~deb8u1
  • H
Out-of-Bounds

<57.0.2987.98-1~deb8u1
  • H
Use After Free

<57.0.2987.98-1~deb8u1
  • H
Integer Overflow or Wraparound

<57.0.2987.98-1~deb8u1
  • H
Use After Free

<57.0.2987.98-1~deb8u1
  • M
Improper Preservation of Permissions

<57.0.2987.98-1~deb8u1
  • H
Race Condition

<57.0.2987.98-1~deb8u1
  • M
Missing Encryption of Sensitive Data

<57.0.2987.98-1~deb8u1
  • M
Information Exposure

<57.0.2987.98-1~deb8u1
  • H
Use After Free

<57.0.2987.98-1~deb8u1
  • M
Out-of-Bounds

<57.0.2987.98-1~deb8u1
  • M
Cross-site Scripting (XSS)

<57.0.2987.98-1~deb8u1
  • H
Out-of-bounds Write

<57.0.2987.98-1~deb8u1
  • M
Use After Free

<57.0.2987.98-1~deb8u1
  • H
Origin Validation Error

<50.0.2661.94-1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
CVE-2017-5013

<56.0.2924.76-1~deb8u1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
Out-of-Bounds

<56.0.2924.76-1~deb8u1
  • M
Information Exposure

<56.0.2924.76-1~deb8u1
  • M
Improper Restriction of Rendered UI Layers or Frames

<56.0.2924.76-1~deb8u1
  • H
Out-of-Bounds

<56.0.2924.76-1~deb8u1
  • M
Use After Free

<56.0.2924.76-1~deb8u1
  • M
Improper Restriction of Rendered UI Layers or Frames

<56.0.2924.76-1~deb8u1
  • M
Out-of-Bounds

<56.0.2924.76-1~deb8u1
  • H
Out-of-Bounds

<56.0.2924.76-1~deb8u1
  • M
Information Exposure

<56.0.2924.76-1~deb8u1
  • M
Use After Free

<56.0.2924.76-1~deb8u1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
Out-of-Bounds

<56.0.2924.76-1~deb8u1
  • M
CVE-2017-5027

<56.0.2924.76-1~deb8u1
  • M
CVE-2017-5015

<56.0.2924.76-1~deb8u1
  • M
NULL Pointer Dereference

<56.0.2924.76-1~deb8u1
  • M
CVE-2017-5022

<56.0.2924.76-1~deb8u1
  • M
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • H
Out-of-Bounds

<55.0.2883.75-1~deb8u1
  • M
Information Exposure

<55.0.2883.75-1~deb8u1
  • M
Improper Data Handling

<55.0.2883.75-1~deb8u1
  • M
Integer Overflow or Wraparound

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • H
Out-of-bounds Write

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • H
Improper Access Control

<55.0.2883.75-1~deb8u1
  • M
Improper Access Control

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • H
Out-of-bounds Write

<55.0.2883.75-1~deb8u1
  • H
Out-of-bounds Read

<55.0.2883.75-1~deb8u1
  • H
Out-of-Bounds

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • M
Information Exposure

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

<55.0.2883.75-1~deb8u1
  • M
Numeric Errors

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

<55.0.2883.75-1~deb8u1
  • M
Use After Free

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Improper Data Handling

<55.0.2883.75-1~deb8u1
  • M
Integer Overflow or Wraparound

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Information Exposure

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • M
Improper Data Handling

<55.0.2883.75-1~deb8u1
  • M
Improper Access Control

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • M
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

<55.0.2883.75-1~deb8u1
  • H
Out-of-Bounds

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • M
Improper Access Control

<55.0.2883.75-1~deb8u1
  • M
Out-of-bounds Read

<55.0.2883.75-1~deb8u1
  • M
Improper Access Control

<53.0.2785.113-1~deb8u1
  • H
Use After Free

<53.0.2785.113-1~deb8u1
  • H
Use After Free

<53.0.2785.113-1~deb8u1
  • M
Information Exposure

<53.0.2785.113-1~deb8u1
  • H
CVE-2016-7549

<53.0.2785.113-1~deb8u1
  • H
CVE-2016-5175

<53.0.2785.113-1~deb8u1
  • M
Improper Input Validation

<53.0.2785.113-1~deb8u1
  • H
Improper Access Control

<53.0.2785.113-1~deb8u1
  • H
Use After Free

<53.0.2785.89-1~deb8u1
  • H
Use After Free

<53.0.2785.89-1~deb8u1
  • L
Information Exposure

<53.0.2785.89-1~deb8u1
  • H
Integer Overflow or Wraparound

<53.0.2785.89-1~deb8u1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1~deb8u1
  • H
Integer Overflow or Wraparound

<53.0.2785.89-1~deb8u1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1~deb8u1
  • H
Out-of-Bounds

<53.0.2785.89-1~deb8u1
  • H
CVE-2016-5167

<53.0.2785.89-1~deb8u1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1~deb8u1
  • M
Security Features

<53.0.2785.89-1~deb8u1
  • M
Security Features

<53.0.2785.89-1~deb8u1
  • H
Out-of-Bounds

<53.0.2785.89-1~deb8u1
  • H
Incorrect Type Conversion or Cast

<53.0.2785.89-1~deb8u1
  • H
Improper Data Handling

<53.0.2785.89-1~deb8u1
  • H
Arbitrary Code Injection

<53.0.2785.89-1~deb8u1
  • M
Security Features

<53.0.2785.89-1~deb8u1
  • H
Use After Free

<53.0.2785.89-1~deb8u1
  • H
Integer Overflow or Wraparound

<53.0.2785.89-1~deb8u1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1~deb8u1
  • M
Security Features

<53.0.2785.89-1~deb8u1
  • H
Improper Data Handling

<53.0.2785.113-1~deb8u1
  • H
Out-of-Bounds

<52.0.2743.116-1~deb8u1
  • C
Improper Access Control

<52.0.2743.116-1~deb8u1
  • H
Security Features

<52.0.2743.116-1~deb8u1
  • C
Use After Free

<52.0.2743.116-1~deb8u1
  • H
Improper Input Validation

<52.0.2743.116-1~deb8u1
  • C
CVE-2016-5146

<52.0.2743.116-1~deb8u1
  • C
Access Restriction Bypass

<52.0.2743.116-1~deb8u1
  • C
Out-of-Bounds

<52.0.2743.116-1~deb8u1
  • H
Improper Authorization

<52.0.2743.82-1~deb8u1
  • M
Improper Input Validation

<52.0.2743.82-1~deb8u1
  • M
Improper Authentication

<52.0.2743.82-1~deb8u1
  • H
Improper Authorization

<52.0.2743.82-1~deb8u1
  • H
Use After Free

<52.0.2743.82-1~deb8u1
  • M
Improper Access Control

<52.0.2743.82-1~deb8u1
  • H
CVE-2016-1705

<52.0.2743.82-1~deb8u1
  • H
Use After Free

<52.0.2743.82-1~deb8u1
  • H
Information Exposure

<52.0.2743.82-1~deb8u1
  • H
Use After Free

<52.0.2743.82-1~deb8u1
  • M
Improper Input Validation

<52.0.2743.82-1~deb8u1
  • H
Security Features

<52.0.2743.82-1~deb8u1
  • M
Information Exposure

<52.0.2743.82-1~deb8u1
  • H
Security Features

<52.0.2743.82-1~deb8u1
  • H
Out-of-Bounds

<52.0.2743.82-1~deb8u1
  • C
Improper Input Validation

<52.0.2743.82-1~deb8u1
  • H
Out-of-Bounds

<52.0.2743.82-1~deb8u1
  • H
Use After Free

<52.0.2743.82-1~deb8u1
  • H
CVE-2016-1704

<52.0.2743.82-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • H
Improper Access Control

<51.0.2704.63-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1684

<51.0.2704.63-1~deb8u1
  • M
Improper Access Control

<51.0.2704.63-1~deb8u1
  • M
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • M
Improper Access Control

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1674

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1690

<51.0.2704.63-1~deb8u1
  • M
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • M
Out-of-Bounds

<51.0.2704.79-1~deb8u1
  • M
Security Features

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1701

<51.0.2704.79-1~deb8u1
  • H
CVE-2016-1700

<51.0.2704.79-1~deb8u1
  • H
Improper Access Control

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1695

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1703

<51.0.2704.79-1~deb8u1
  • M
Information Exposure

<51.0.2704.63-1~deb8u1
  • H
Security Features

<51.0.2704.79-1~deb8u1
  • M
Information Exposure

<51.0.2704.79-1~deb8u1
  • H
CVE-2016-1673

<51.0.2704.63-1~deb8u1
  • H
Security Features

<51.0.2704.63-1~deb8u1
  • M
Information Exposure

<51.0.2704.63-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • H
Improper Access Control

<51.0.2704.79-1~deb8u1
  • H
CVE-2016-1679

<51.0.2704.63-1~deb8u1
  • M
Improper Access Control

<51.0.2704.63-1~deb8u1
  • M
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • M
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • M
Improper Access Control

<51.0.2704.79-1~deb8u1
  • M
Security Features

<50.0.2661.94-1~deb8u1
  • M
Improper Input Validation

<50.0.2661.94-1~deb8u1
  • H
Improper Access Control

<51.0.2704.63-1~deb8u1
  • C
CVE-2016-1662

<50.0.2661.94-1~deb8u1
  • H
Improper Access Control

<51.0.2704.63-1~deb8u1
  • H
Improper Input Validation

<50.0.2661.94-1~deb8u1
  • H
Improper Input Validation

<50.0.2661.94-1~deb8u1
  • H
CVE-2016-1663

<50.0.2661.94-1~deb8u1
  • M
Race Condition

<51.0.2704.63-1~deb8u1
  • C
CVE-2016-1666

<50.0.2661.94-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • C
CVE-2016-1659

<50.0.2661.75-1~deb8u1
  • H
CVE-2016-1655

<50.0.2661.75-1~deb8u1
  • H
Out-of-Bounds

<50.0.2661.75-1~deb8u1
  • M
Improper Input Validation

<50.0.2661.75-1~deb8u1
  • M
Security Features

<50.0.2661.75-1~deb8u1
  • H
Information Exposure

<50.0.2661.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<50.0.2661.75-1~deb8u1
  • M
Information Exposure

<50.0.2661.75-1~deb8u1
  • H
Out-of-Bounds

<49.0.2623.108-1~deb8u1
  • H
CVE-2016-1650

<49.0.2623.108-1~deb8u1
  • H
CVE-2016-1647

<49.0.2623.108-1~deb8u1
  • H
Out-of-Bounds

<49.0.2623.108-1~deb8u1
  • H
CVE-2016-1648

<49.0.2623.108-1~deb8u1
  • H
CVE-2016-1644

<49.0.2623.87-1~deb8u1
  • H
Out-of-Bounds

<49.0.2623.87-1~deb8u1
  • H
Time and State

<49.0.2623.87-1~deb8u1
  • C
CVE-2016-2843

<49.0.2623.75-1~deb8u1
  • H
CVE-2016-1634

<49.0.2623.75-1~deb8u1
  • M
Improper Access Control

<49.0.2623.75-1~deb8u1
  • H
Access Restriction Bypass

<49.0.2623.75-1~deb8u1
  • C
Access Restriction Bypass

<49.0.2623.75-1~deb8u1
  • H
Access Restriction Bypass

<49.0.2623.75-1~deb8u1
  • C
CVE-2016-1639

<49.0.2623.75-1~deb8u1
  • C
CVE-2016-1642

<49.0.2623.75-1~deb8u1
  • H
CVE-2016-1641

<49.0.2623.75-1~deb8u1
  • M
Code

<49.0.2623.75-1~deb8u1
  • C
CVE-2016-1633

<49.0.2623.75-1~deb8u1
  • H
Improper Input Validation

<49.0.2623.75-1~deb8u1
  • C
CVE-2016-1635

<49.0.2623.75-1~deb8u1
  • M
Information Exposure

<49.0.2623.75-1~deb8u1
  • H
Access Restriction Bypass

<49.0.2623.75-1~deb8u1
  • M
Information Exposure

<49.0.2623.75-1~deb8u1
  • C
Access Restriction Bypass

<48.0.2564.116-1~deb8u1
  • M
Out-of-Bounds

<48.0.2564.116-1~deb8u1
  • H
Access Restriction Bypass

<48.0.2564.116-1~deb8u1
  • H
Access Restriction Bypass

<48.0.2564.116-1~deb8u1
  • H
Access Restriction Bypass

<48.0.2564.116-1~deb8u1
  • M
Out-of-Bounds

<48.0.2564.116-1~deb8u1
  • M
Access Restriction Bypass

<48.0.2564.116-1~deb8u1
  • H
Out-of-Bounds

<48.0.2564.116-1~deb8u1
  • M
Information Exposure

<48.0.2564.82-1~deb8u1
  • H
Improper Input Validation

<48.0.2564.82-1~deb8u1
  • H
CVE-2016-1620

<48.0.2564.82-1~deb8u1
  • H
CVE-2016-1613

<48.0.2564.82-1~deb8u1
  • M
Cryptographic Issues

<48.0.2564.82-1~deb8u1
  • M
Security Features

<48.0.2564.82-1~deb8u1
  • M
Security Features

<48.0.2564.82-1~deb8u1
  • H
CVE-2016-2052

<48.0.2564.82-1
  • M
Information Exposure

<48.0.2564.82-1~deb8u1
  • H
Out-of-Bounds

<48.0.2564.82-1~deb8u1
  • H
Numeric Errors

<47.0.2526.111-1
  • C
CVE-2015-6792

<48.0.2564.82-1~deb8u1
  • C
CVE-2015-8548

<47.0.2526.80-1~deb8u1
  • M
Improper Input Validation

<47.0.2526.80-1~deb8u1
  • C
CVE-2015-6788

<47.0.2526.80-1~deb8u1
  • H
Race Condition

<47.0.2526.80-1~deb8u1
  • C
CVE-2015-6791

<47.0.2526.80-1~deb8u1
  • M
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • H
CVE-2015-6777

<47.0.2526.73-1~deb8u1
  • H
CVE-2015-8478

<47.0.2526-73-1
  • M
Improper Input Validation

<47.0.2526.73-1~deb8u1
  • H
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • H
Out-of-Bounds

<47.0.2526.73-1~deb8u1
  • H
CVE-2015-6767

<47.0.2526.73-1~deb8u1
  • H
CVE-2015-6775

<47.0.2526.73-1~deb8u1
  • H
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • H
CVE-2015-6774

<47.0.2526.73-1~deb8u1
  • C
CVE-2015-6787

<47.0.2526.73-1
  • H
Out-of-Bounds

<47.0.2526.73-1
  • M
CVE-2015-6780

<47.0.2526.73-1~deb8u1
  • H
Out-of-Bounds

<47.0.2526.73-1~deb8u1
  • H
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • M
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • H
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • C
Out-of-Bounds

<47.0.2526.73-1~deb8u1
  • H
Out-of-Bounds

<47.0.2526.73-1~deb8u1
  • M
Out-of-Bounds

<47.0.2526.73-1~deb8u1
  • M
Improper Input Validation

<47.0.2526.73-1~deb8u1
  • C
CVE-2015-6765

<47.0.2526.73-1~deb8u1
  • H
CVE-2015-6766

<47.0.2526.73-1~deb8u1
  • C
Out-of-Bounds

<47.0.2526.73-1
  • M
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • H
Numeric Errors

<47.0.2526.73-1~deb8u1
  • H
Buffer Overflow

<49.0.2623.75-1~deb8u1
  • H
Improper Input Validation

<47.0.2526.73-1~deb8u1
  • M
Code

<46.0.2490.71-1~deb8u1
  • H
Access Restriction Bypass

<46.0.2490.71-1~deb8u1
  • H
Code

<46.0.2490.71-1~deb8u1
  • H
Security Features

<46.0.2490.71-1~deb8u1
  • M
Race Condition

<46.0.2490.71-1~deb8u1
  • M
CVE-2015-6756

<46.0.2490.71-1~deb8u1
  • H
CVE-2015-6757

<46.0.2490.71-1~deb8u1
  • H
CVE-2015-7834

<46.0.2490.71-1
  • M
Information Exposure

<46.0.2490.71-1~deb8u1
  • H
CVE-2015-6763

<46.0.2490.71-1~deb8u1
  • H
Improper Access Control

<46.0.2490.71-1~deb8u1
  • H
Improper Input Validation

<46.0.2490.71-1~deb8u1
  • M
Security Features

<45.0.2454.85-1~deb8u1
  • H
Security Features

<45.0.2454.85-1~deb8u1
  • M
Access Restriction Bypass

<45.0.2454.85-1~deb8u1
  • M
Security Features

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-1301

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-1295

<45.0.2454.85-1~deb8u1
  • M
Security Features

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-6580

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-1294

<45.0.2454.85-1~deb8u1
  • H
Access Restriction Bypass

<45.0.2454.85-1~deb8u1
  • M
Access Restriction Bypass

<45.0.2454.85-1~deb8u1
  • M
Security Features

<45.0.2454.85-1~deb8u1
  • M
Security Features

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-6581

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-1299

<45.0.2454.85-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • H
CVE-2015-1289

<44.0.2403.89-1~deb8u1
  • C
CVE-2015-1276

<44.0.2403.89-1~deb8u1
  • M
Code

<44.0.2403.89-1~deb8u1
  • H
CVE-2015-1277

<44.0.2403.89-1~deb8u1
  • H
Out-of-Bounds

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • H
Improper Input Validation

<44.0.2403.89-1~deb8u1
  • M
Out-of-Bounds

<44.0.2403.89-1~deb8u1
  • M
Out-of-Bounds

<44.0.2403.89-1~deb8u1
  • M
CVE-2015-1282

<44.0.2403.89-1~deb8u1
  • M
Code

<44.0.2403.89-1~deb8u1
  • H
Numeric Errors

<44.0.2403.89-1~deb8u1
  • M
Improper Data Handling

<44.0.2403.89-1~deb8u1
  • H
CVE-2015-1272

<44.0.2403.89-1~deb8u1
  • M
Cross-site Scripting (XSS)

<44.0.2403.89-1~deb8u1
  • M
Numeric Errors

<44.0.2403.89-1~deb8u1
  • M
Information Exposure

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • H
Numeric Errors

<42.0.2311.135-1~deb8u1
  • H
Out-of-Bounds

<42.0.2311.135-1~deb8u1
  • H
CVE-2015-1260

<43.0.2357.65-1~deb8u1
  • M
Improper Input Validation

<43.0.2357.65-1~deb8u1
  • H
CVE-2015-1256

<43.0.2357.65-1~deb8u1
  • M
CVE-2015-1255

<43.0.2357.65-1~deb8u1
  • H
Out-of-Bounds

<43.0.2357.65-1~deb8u1
  • H
Out-of-Bounds

<43.0.2357.65-1~deb8u1
  • M
Cross-site Scripting (XSS)

<43.0.2357.65-1~deb8u1
  • M
Access Restriction Bypass

<43.0.2357.65-1~deb8u1
  • M
CVE-2015-1251

<43.0.2357.65-1~deb8u1
  • H
Improper Access Control

<43.0.2357.65-1~deb8u1
  • M
Code

<43.0.2357.65-1~deb8u1
  • H
CVE-2015-1265

<43.0.2357.65-1~deb8u1
  • H
Code

<43.0.2357.65-1~deb8u1
  • H
Code

<43.0.2357.65-1~deb8u1
  • H
CVE-2015-3910

<43.0.2357.65-1~deb8u1
  • H
Numeric Errors

<43.0.2357.65-1~deb8u1
  • H
CVE-2015-1243

<42.0.2311.135-1~deb8u1
  • H
CVE-2015-1250

<42.0.2311.135-1~deb8u1
  • M
Information Exposure

<42.0.2311.90-1~deb8u1
  • M
Access Restriction Bypass

<42.0.2311.90-1~deb8u1
  • M
Information Exposure

<42.0.2311.90-1~deb8u1
  • M
Out-of-Bounds

<42.0.2311.90-1~deb8u1
  • H
CVE-2015-1249

<42.0.2311.90-1~deb8u1
  • H
CVE-2015-3333

<42.0.2311.90-1~deb8u1
  • M
Improper Input Validation

<42.0.2311.90-1~deb8u1
  • H
Out-of-Bounds

<42.0.2311.90-1~deb8u1
  • M
Access Restriction Bypass

<42.0.2311.90-1~deb8u1
  • H
CVE-2015-1237

<42.0.2311.90-1~deb8u1
  • M
Code

<42.0.2311.90-1~deb8u1
  • H
CVE-2015-1242

<42.0.2311.90-1~deb8u1
  • M
Out-of-Bounds

<42.0.2311.90-1~deb8u1
  • M
CVE-2015-1245

<42.0.2311.90-1~deb8u1
  • M
Access Restriction Bypass

<42.0.2311.90-1~deb8u1
  • M
Access Restriction Bypass

<42.0.2311.90-1~deb8u1
  • M
Race Condition

<41.0.2272.118-1
  • H
Code

<41.0.2272.118-1
  • H
Numeric Errors

<41.0.2272.76-1
  • H
Out-of-Bounds

<41.0.2272.76-1
  • M
Improper Data Handling

<41.0.2272.76-1
  • H
Resource Management Errors

<41.0.2272.76-1
  • M
CVE-2015-1220

<41.0.2272.76-1
  • M
Access Restriction Bypass

<41.0.2272.76-1
  • H
Out-of-Bounds

<41.0.2272.76-1
  • M
Access Restriction Bypass

<41.0.2272.76-1
  • H
Integer Overflow or Wraparound

<41.0.2272.76-1
  • M
Improper Data Handling

<41.0.2272.76-1
  • H
CVE-2015-1231

<41.0.2272.76-1
  • H
CVE-2015-1221

<41.0.2272.76-1
  • H
CVE-2015-1216

<41.0.2272.76-1
  • H
CVE-2015-1222

<41.0.2272.76-1
  • H
CVE-2015-1218

<41.0.2272.76-1
  • H
Out-of-Bounds

<41.0.2272.76-1
  • H
Resource Management Errors

<41.0.2272.76-1
  • H
CVE-2015-2238

<41.0.2272.76-1
  • H
Code

<41.0.2272.76-1
  • H
CVE-2015-1230

<41.0.2272.76-1
  • M
Code

<41.0.2272.76-1
  • M
Access Restriction Bypass

<41.0.2272.76-1
  • M
Out-of-Bounds

<41.0.2272.76-1
  • H
CVE-2015-1223

<41.0.2272.76-1
  • M
CVE-2015-1210

<40.0.2214.111-1
  • H
Use After Free

<40.0.2214.111-1
  • H
CVE-2015-1212

<40.0.2214.111-1
  • H
CVE-2015-1211

<40.0.2214.111-1
  • H
Out-of-Bounds

<40.0.2214.91-1
  • M
Numeric Errors

<40.0.2214.91-1
  • M
Code

<40.0.2214.91-1
  • M
CVE-2014-9647

<40.0.2214.91-1
  • M
Cryptographic Issues

<40.0.2214.91-1
  • M
Access Restriction Bypass

<40.0.2214.91-1
  • M
CVE-2014-7924

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
CVE-2015-1205

<40.0.2214.91-1
  • H
Code

<40.0.2214.91-1
  • H
Code

<40.0.2214.91-1
  • H
Resource Management Errors

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
CVE-2014-7933

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
CVE-2014-7934

<40.0.2214.91-1
  • H
Out-of-Bounds

<40.0.2214.91-1
  • H
Code

<40.0.2214.91-1
  • H
CVE-2014-7935

<40.0.2214.91-1
  • H
Improper Data Handling

<40.0.2214.91-1
  • M
CVE-2014-7936

<40.0.2214.91-1
  • H
CVE-2014-7932

<40.0.2214.91-1
  • H
CVE-2014-7930

<40.0.2214.91-1
  • H
Code

<40.0.2214.91-1
  • H
Numeric Errors

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
Out-of-Bounds

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
CVE-2014-7925

<40.0.2214.91-1
  • H
Resource Management Errors

<40.0.2214.91-1
  • H
CVE-2015-1346

<40.0.2214.91-1
  • H
Improper Input Validation

<11.0.696.65~r84435-1
  • H
Numeric Errors

<11.0.696.65~r84435-1
  • H
Improper Input Validation

<11.0.696.65~r84435-1
  • H
CVE-2011-1796

<11.0.696.65~r84435-1
  • H
Numeric Errors

<11.0.696.65~r84435-1
  • H
Resource Management Errors

<39.0.2171.71-1
  • H
Code

<39.0.2171.71-1
  • H
Numeric Errors

<39.0.2171.71-1
  • H
Numeric Errors

<39.0.2171.71-1
  • H
Resource Management Errors

<39.0.2171.71-1
  • H
CVE-2014-7910

<39.0.2171.71-1
  • M
Improper Input Validation

<39.0.2171.71-1
  • M
Numeric Errors

<39.0.2171.71-1
  • H
Resource Management Errors

<39.0.2171.71-1
  • H
Out-of-Bounds

<39.0.2171.71-1
  • H
Out-of-Bounds

<39.0.2171.71-1
  • M
Improper Access Control

<39.0.2171.71-1
  • L
Cryptographic Issues

<39.0.2171.71-1
  • M
Out-of-Bounds

<39.0.2171.71-1
  • C
Arbitrary Code Injection

<38.0.2125.101-1
  • H
Use After Free

<38.0.2125.101-1
  • H
CVE-2014-3200

<38.0.2125.101-1
  • H
Use After Free

<38.0.2125.101-1
  • H
Access Restriction Bypass

<38.0.2125.101-1
  • H
Use After Free

<38.0.2125.101-1
  • M
Out-of-Bounds

<38.0.2125.101-1
  • H
Use After Free

<38.0.2125.101-1
  • M
Resource Management Errors

<38.0.2125.101-1
  • H
Use After Free

<38.0.2125.101-1
  • H
CVE-2014-7967

<38.0.2125.101-1
  • M
Resource Management Errors

<38.0.2125.101-1
  • M
Access Restriction Bypass

<38.0.2125.101-1
  • H
CVE-2014-3179

<37.0.2062.120-1
  • H
CVE-2014-3178

<37.0.2062.120-1
  • M
Out-of-Bounds

<37.0.2062.120-1
  • M
Out-of-Bounds

<37.0.2062.120-1
  • H
CVE-2014-3169

<37.0.2062.120-1
  • H
CVE-2014-3171

<37.0.2062.120-1
  • C
Arbitrary Code Injection

<37.0.2062.120-1
  • C
Arbitrary Code Injection

<37.0.2062.120-1
  • M
Access Restriction Bypass

<37.0.2062.120-1
  • C
CVE-2014-3175

<37.0.2062.120-1
  • H
CVE-2014-3168

<37.0.2062.120-1
  • M
Access Restriction Bypass

<37.0.2062.120-1
  • H
CVE-2014-3167

<37.0.2062.120-1
  • H
CVE-2014-3165

<37.0.2062.120-1
  • M
Information Exposure

<37.0.2062.120-1
  • M
Access Restriction Bypass

<37.0.2062.120-1
  • M
CVE-2014-3162

<37.0.2062.120-1
  • M
CVE-2014-3155

<35.0.1916.153-1
  • H
Out-of-Bounds

<35.0.1916.153-1
  • H
CVE-2014-3154

<35.0.1916.153-1
  • H
Out-of-Bounds

<35.0.1916.153-1
  • H
Numeric Errors

<35.0.1916.114-1
  • H
Resource Management Errors

<35.0.1916.114-1
  • H
Numeric Errors

<35.0.1916.114-1
  • M
Cross-site Scripting (XSS)

<35.0.1916.114-1
  • M
Information Exposure

<35.0.1916.114-1
  • H
Resource Management Errors

<35.0.1916.114-1
  • M
Out-of-Bounds

<35.0.1916.114-1
  • M
CVE-2014-1748

<35.0.1916.114-1
  • H
CVE-2014-1749

<35.0.1916.114-1
  • H
Resource Management Errors

<34.0.1847.137-1
  • H
Resource Management Errors

<34.0.1847.137-1
  • H
Numeric Errors

<34.0.1847.137-1
  • H
Numeric Errors

<34.0.1847.132-1
  • H
Improper Input Validation

<34.0.1847.132-1
  • H
Resource Management Errors

<34.0.1847.132-1
  • H
Improper Input Validation

<34.0.1847.132-1
  • H
Access Restriction Bypass

<34.0.1847.132-1
  • H
CVE-2014-1734

<34.0.1847.132-1
  • H
CVE-2014-1735

<34.0.1847.132-1
  • H
CVE-2014-1729

<34.0.1847.116-1
  • H
CVE-2014-1728

<34.0.1847.116-1
  • H
Resource Management Errors

<34.0.1847.116-1
  • H
Numeric Errors

<34.0.1847.116-1
  • H
Improper Input Validation

<34.0.1847.116-1
  • M
Improper Input Validation

<34.0.1847.116-1
  • H
Resource Management Errors

<34.0.1847.116-1
  • M
CVE-2014-1726

<34.0.1847.116-1
  • H
Numeric Errors

<34.0.1847.116-1
  • H
Resource Management Errors

<34.0.1847.116-1
  • H
Resource Management Errors

<34.0.1847.116-1
  • H
Resource Management Errors

<34.0.1847.116-1
  • H
Numeric Errors

<34.0.1847.116-1
  • H
Arbitrary Code Injection

<34.0.1847.116-1
  • H
Directory Traversal

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • M
Cross-site Scripting (XSS)

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • C
CVE-2014-1704

<33.0.1750.152-1
  • H
Out-of-Bounds

<33.0.1750.152-1
  • H
Out-of-Bounds

<33.0.1750.152-1
  • H
CVE-2013-6667

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • M
Access Restriction Bypass

<33.0.1750.152-1
  • H
CVE-2013-6668

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • M
Information Exposure

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • M
Cryptographic Issues

<33.0.1750.152-1
  • H
Improper Input Validation

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • M
Access Restriction Bypass

<33.0.1750.152-1
  • M
Access Restriction Bypass

<33.0.1750.152-1
  • H
CVE-2013-6661

<33.0.1750.152-1
  • M
Cross-site Request Forgery (CSRF)

<31.0.1650.57-1
  • C
CVE-2014-1681

<31.0.1650.63-1
  • H
Improper Input Validation

<32.0.1700.123-1
  • H
Resource Management Errors

<32.0.1700.123-1
  • H
Use After Free

<32.0.1700.123-1
  • H
Use After Free

<32.0.1700.123-1
  • M
Use After Free

<32.0.1700.123-1
  • H
Use After Free

<32.0.1700.123-1
  • H
Improper Authentication

<32.0.1700.123-1
  • H
Out-of-Bounds

<31.0.1650.63-1
  • M
Improper Authentication

<31.0.1650.63-1
  • H
Out-of-Bounds

<31.0.1650.63-1
  • M
Resource Management Errors

<31.0.1650.63-1
  • H
CVE-2013-6637

<31.0.1650.63-1
  • M
Improper Input Validation

<31.0.1650.63-1
  • H
Out-of-Bounds

<31.0.1650.63-1
  • H
CVE-2013-6631

<31.0.1650.57-1
  • M
Information Exposure

<31.0.1650.57-1
  • M
Numeric Errors

<31.0.1650.57-1
  • H
Numeric Errors

<31.0.1650.57-1
  • M
Access Restriction Bypass

<31.0.1650.57-1
  • M
Out-of-Bounds

<31.0.1650.57-1
  • H
Resource Management Errors

<31.0.1650.57-1
  • C
CVE-2013-2931

<31.0.1650.57-1
  • M
Resource Management Errors

<31.0.1650.57-1
  • M
CVE-2013-6626

<31.0.1650.57-1
  • H
Resource Management Errors

<31.0.1650.57-1
  • M
Resource Management Errors

<31.0.1650.57-1
  • M
Out-of-Bounds

<31.0.1650.57-1
  • M
CVE-2013-6628

<31.0.1650.57-1
  • H
CVE-2013-2928

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • H
Out-of-Bounds

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • H
Resource Management Errors

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • M
CVE-2013-2915

<30.0.1599.101-1
  • M
CVE-2013-2908

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • H
Resource Management Errors

<30.0.1599.101-1
  • H
Resource Management Errors

<30.0.1599.101-1
  • H
Resource Management Errors

<30.0.1599.101-1
  • M
Out-of-Bounds

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • M
Out-of-Bounds

<30.0.1599.101-1
  • H
CVE-2013-2923

<30.0.1599.101-1
  • M
CVE-2013-2916

<30.0.1599.101-1
  • M
Race Condition

<30.0.1599.101-1
  • M
Out-of-Bounds

<30.0.1599.101-1
  • H
Resource Management Errors

<30.0.1599.101-1
  • H
Resource Management Errors

<29.0.1547.57-1
  • H
Directory Traversal

<29.0.1547.57-1
  • H
CVE-2013-2887

<29.0.1547.57-1
  • H
Resource Management Errors

<29.0.1547.57-1
  • H
Numeric Errors

<29.0.1547.57-1
  • M
Access Restriction Bypass

<29.0.1547.57-1
  • H
Resource Management Errors

<29.0.1547.57-1
  • H
CVE-2013-2886

<28.0.1500.95-1
  • H
Resource Management Errors

<28.0.1500.95-1
  • H
CVE-2013-2882

<28.0.1500.95-1
  • H
Resource Management Errors

<28.0.1500.95-1
  • H
Resource Management Errors

<28.0.1500.95-1
  • M
Access Restriction Bypass

<28.0.1500.95-1
  • H
Resource Management Errors

<28.0.1500.71-1
  • H
CVE-2013-2867

<28.0.1500.71-1
  • M
Out-of-Bounds

<28.0.1500.71-1
  • M
Out-of-Bounds

<28.0.1500.71-1
  • M
Information Exposure

<28.0.1500.71-1
  • M
CVE-2013-2868

<28.0.1500.71-1
  • M
CVE-2013-2853

<28.0.1500.71-1
  • H
Improper Input Validation

<28.0.1500.71-1
  • H
CVE-2013-2880

<28.0.1500.71-1
  • M
Out-of-Bounds

<28.0.1500.71-1
  • M
Out-of-Bounds

<28.0.1500.71-1
  • M
Access Restriction Bypass

<28.0.1500.71-1
  • H
Resource Management Errors

<28.0.1500.71-1
  • H
Use After Free

<27.0.1453.110-1
  • H
CVE-2013-2865

<27.0.1453.110-1
  • M
Out-of-Bounds

<27.0.1453.110-1
  • H
Use After Free

<27.0.1453.110-1
  • H
Use After Free

<27.0.1453.110-1
  • H
Resource Management Errors

<27.0.1453.110-1
  • H
Use After Free

<27.0.1453.110-1
  • H
CVE-2013-2859

<27.0.1453.110-1
  • H
Out-of-Bounds

<27.0.1453.110-1
  • C
Out-of-Bounds

<27.0.1453.110-1
  • M
Out-of-Bounds

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • M
Cross-site Scripting (XSS)

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • M
Race Condition

<27.0.1453.93-1
  • H
CVE-2013-2836

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • M
Information Exposure

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • H
Out-of-Bounds

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • H
Resource Management Errors

<26.0.1410.43-1
  • M
Access Restriction Bypass

<26.0.1410.43-1
  • H
Access Restriction Bypass

<26.0.1410.43-1
  • H
Access Restriction Bypass

<26.0.1410.43-1
  • H
Access Restriction Bypass

<26.0.1410.43-1
  • M
Improper Input Validation

<26.0.1410.43-1
  • M
Out-of-Bounds

<26.0.1410.43-1
  • H
Resource Management Errors

<26.0.1410.43-1
  • M
Access Restriction Bypass

<26.0.1410.43-1
  • H
Resource Management Errors

<26.0.1410.43-1
  • M
Out-of-Bounds

<26.0.1410.43-1
  • H
Arbitrary Code Injection

<25.0.1364.160-1
  • H
Resource Management Errors

<25.0.1364.152-1
  • H
CVE-2013-0908

<25.0.1364.152-1
  • H
Out-of-Bounds

<25.0.1364.152-1
  • H
Resource Management Errors

<25.0.1364.152-1
  • M
Information Exposure

<25.0.1364.152-1
  • H
Out-of-Bounds

<25.0.1364.152-1
  • H
Directory Traversal

<25.0.1364.152-1
  • H
Race Condition

<25.0.1364.152-1
  • H
Resource Management Errors

<25.0.1364.152-1
  • H
Improper Authentication

<25.0.1364.152-1
  • H
Resource Management Errors

<25.0.1364.97-1
  • H
Out-of-Bounds

<25.0.1364.97-1
  • M
Access Restriction Bypass

<25.0.1364.97-1
  • H
Out-of-Bounds

<25.0.1364.97-1
  • M
Numeric Errors

<25.0.1364.97-1
  • M
CVE-2013-0884

<25.0.1364.97-1
  • H
Directory Traversal

<25.0.1364.97-1
  • H
CVE-2013-2268

<25.0.1364.97-1
  • M
Improper Input Validation

<25.0.1364.97-1
  • M
Race Condition

<25.0.1364.97-1
  • H
Resource Management Errors

<25.0.1364.97-1
  • H
Access Restriction Bypass

<25.0.1364.97-1
  • H
Out-of-Bounds

<25.0.1364.97-1
  • M
Improper Input Validation

<25.0.1364.97-1
  • H
CVE-2013-0892

<25.0.1364.97-1
  • H
Numeric Errors

<25.0.1364.97-1
  • H
Access Restriction Bypass

<25.0.1364.97-1
  • M
Race Condition

<25.0.1364.97-1
  • H
Buffer Overflow

<25.0.1364.97-1
  • M
Out-of-Bounds

<25.0.1364.97-1
  • H
Out-of-Bounds

<25.0.1364.97-1
  • C
CVE-2013-0842

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • H
Improper Input Validation

<24.0.1312.68-1
  • C
CVE-2013-0840

<24.0.1312.68-1
  • M
CVE-2013-0835

<24.0.1312.68-1
  • H
Out-of-Bounds

<24.0.1312.68-1
  • H
Improper Input Validation

<24.0.1312.68-1
  • H
Improper Input Validation

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • H
Access Restriction Bypass

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • M
Out-of-Bounds

<24.0.1312.68-1
  • M
Out-of-Bounds

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • H
Directory Traversal

<24.0.1312.68-1
  • H
Numeric Errors

<24.0.1312.68-1
  • M
Access Restriction Bypass

<24.0.1312.68-1
  • M
Access Restriction Bypass

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • M
Resource Management Errors

<24.0.1312.68-1
  • M
Out-of-Bounds

<24.0.1312.68-1
  • C
Use After Free

<24.0.1312.68-1
  • C
Arbitrary Code Injection

<24.0.1312.68-1
  • C
Use After Free

<24.0.1312.68-1
  • C
Out-of-Bounds

<24.0.1312.68-1
  • C
Integer Overflow or Wraparound

<24.0.1312.68-1
  • C
CVE-2012-5141

<24.0.1312.68-1
  • C
CVE-2012-5138

<24.0.1312.68-1
  • C
Use After Free

<24.0.1312.68-1
  • M
CVE-2012-5132

<24.0.1312.68-1
  • M
Out-of-bounds Read

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • M
Improper Input Validation

<24.0.1312.68-1
  • M
Cross-site Scripting (XSS)

*
  • M
Race Condition

<24.0.1312.68-1
  • H
Numeric Errors

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • H
Out-of-Bounds

<24.0.1312.68-1
  • H
Access Restriction Bypass

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • M
Out-of-Bounds

<24.0.1312.68-1
  • C
Improper Privilege Management

<22.0.1229.94~r161065-1
  • C
Resource Management Errors

<22.0.1229.94~r161065-1
  • M
Out-of-bounds Read

<22.0.1229.94~r161065-1
  • H
CVE-2012-2900

<22.0.1229.94~r161065-1
  • H
Race Condition

<22.0.1229.94~r161065-1
  • H
CVE-2012-5111

<22.0.1229.94~r161065-1
  • M
Out-of-bounds Read

<22.0.1229.94~r161065-1
  • M
Improper Input Validation

<22.0.1229.94~r161065-1
  • M
Resource Management Errors

<22.0.1229.94~r161065-1
  • M
Improper Input Validation

<22.0.1229.94~r161065-1
  • M
Out-of-Bounds

<22.0.1229.94~r161065-1
  • M
Cross-site Scripting (XSS)

<22.0.1229.94~r161065-1
  • H
Resource Management Errors

<22.0.1229.94~r161065-1
  • M
Out-of-Bounds

<22.0.1229.94~r161065-1
  • M
CVE-2012-2892

<22.0.1229.94~r161065-1
  • H
Resource Management Errors

<22.0.1229.94~r161065-1
  • H
Out-of-Bounds

<22.0.1229.94~r161065-1
  • H
Out-of-Bounds

<22.0.1229.94~r161065-1
  • H
Out-of-Bounds

<22.0.1229.94~r161065-1
  • H
Resource Management Errors

<22.0.1229.94~r161065-1
  • M
Cross-site Scripting (XSS)

<22.0.1229.94~r161065-1
  • M
Information Exposure

<22.0.1229.94~r161065-1
  • H
Resource Management Errors

<22.0.1229.94~r161065-1
  • M
Resource Management Errors

<22.0.1229.94~r161065-1
  • H
Out-of-Bounds

<22.0.1229.94~r161065-1
  • H
Race Condition

<22.0.1229.94~r161065-1
  • L
Cryptographic Issues

<22.0.1229.94~r161065-1
  • L
Cryptographic Issues

<21.0.1180.57~r148591-1
  • M
CVE-2012-2871

<21.0.1180.89~r154005-1
  • M
Out-of-Bounds

<21.0.1180.89~r154005-1
  • M
Cross-site Scripting (XSS)

<21.0.1180.89~r154005-1
  • M
Race Condition

<21.0.1180.89~r154005-1
  • H
CVE-2012-2866

<21.0.1180.89~r154005-1
  • H
Out-of-Bounds

<21.0.1180.89~r154005-1
  • M
CVE-2012-2867

<21.0.1180.89~r154005-1
  • M
Resource Management Errors

<21.0.1180.89~r154005-1
  • M
CVE-2012-2846

<21.0.1180.57~r148591
  • M
Information Exposure

<21.0.1180.57~r148591
  • M
Out-of-Bounds

<21.0.1180.57~r148591
  • M
CVE-2012-2853

<21.0.1180.57~r148591
  • M
Resource Management Errors

<21.0.1180.57~r148591
  • M
Access Restriction Bypass

<21.0.1180.57~r148591
  • M
CVE-2012-2860

<21.0.1180.57~r148591
  • M
Numeric Errors

<21.0.1180.57~r148591
  • H
Out-of-Bounds

<21.0.1180.57~r148591
  • M
Resource Management Errors

<21.0.1180.57~r148591
  • H
Resource Management Errors

<20.0.1132.57~r145807-1
  • H
Resource Management Errors

<20.0.1132.57~r145807-1
  • M
Information Exposure

<20.0.1132.43~r143823-1
  • H
CVE-2012-2830

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • M
Improper Input Validation

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • M
CVE-2012-2826

<20.0.1132.43~r143823-1
  • H
Numeric Errors

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • M
Improper Input Validation

<20.0.1132.43~r143823-1
  • H
CVE-2012-2821

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • H
CVE-2011-3109

<20.0.1132.21~r139451-1
  • C
Out-of-Bounds

<20.0.1132.21~r139451-1
  • C
Resource Management Errors

<20.0.1132.21~r139451-1
  • H
Resource Management Errors

<20.0.1132.21~r139451-1
  • M
Out-of-Bounds

<20.0.1132.21~r139451-1
  • H
CVE-2011-3107

<20.0.1132.21~r139451-1
  • C
Resource Management Errors

<20.0.1132.21~r139451-1
  • M
Out-of-Bounds

<20.0.1132.21~r139451-1
  • M
Improper Input Validation

<20.0.1132.21~r139451-1
  • C
Resource Management Errors

<20.0.1132.21~r139451-1
  • H
Access Restriction Bypass

<20.0.1132.21~r139451-1
  • H
Race Condition

<20.0.1132.21~r139451-1
  • M
Out-of-Bounds

<20.0.1132.21~r139451-1
  • M
CVE-2011-3100

<20.0.1132.21~r139451-1
  • M
Out-of-Bounds

<20.0.1132.21~r139451-1
  • C
Resource Management Errors

<20.0.1132.21~r139451-1
  • C
Improper Input Validation

<20.0.1132.21~r139451-1
  • H
Resource Management Errors

<20.0.1132.21~r139451-1
  • C
CVE-2011-3087

<20.0.1132.21~r139451-1
  • M
Improper Input Validation

<20.0.1132.21~r139451-1
  • C
CVE-2011-3101

<20.0.1132.21~r139451-1
  • C
Resource Management Errors

<18.0.1025.168~r134367-1
  • H
Race Condition

<18.0.1025.168~r134367-1
  • M
Use After Free

<18.0.1025.168~r134367-1
  • H
Use After Free

<18.0.1025.168~r134367-1
  • M
Use After Free

<18.0.1025.168~r134367-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Origin Validation Error

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Origin Validation Error

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Out-of-bounds Read

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Out-of-bounds Read

<18.0.1025.142~r129054-1
  • M
Cross-site Scripting (XSS)

<18.0.1025.142~r129054-1
  • M
Improper Input Validation

<18.0.1025.142~r129054-1
  • M
Incorrect Calculation

<18.0.1025.142~r129054-1
  • H
Use After Free

<18.0.1025.142~r129054-1
  • M
Out-of-bounds Read

<18.0.1025.142~r129054-1
  • M
Improper Certificate Validation

<18.0.1025.142~r129054-1
  • M
Integer Overflow or Wraparound

<18.0.1025.142~r129054-1
  • M
CVE-2011-3049

<17.0.963.83~r127885-1
  • H
Use After Free

<20.0.1132.21~r139451-1
  • M
Improper Privilege Management

<17.0.963.83~r127885-1
  • M
Use After Free

<17.0.963.83~r127885-1
  • M
Origin Validation Error

<17.0.963.83~r127885-1
  • M
Use After Free

<17.0.963.83~r127885-1
  • M
Missing Authentication for Critical Function

<17.0.963.83~r127885-1
  • C
Exposure of Resource to Wrong Sphere

<20.0.1132.21~r139451-1
  • M
Out-of-Bounds

<17.0.963.83~r127885-1
  • M
Use After Free

<17.0.963.83~r127885-1
  • H
Out-of-Bounds

<17.0.963.83~r127885-1
  • C
Cross-site Scripting (XSS)

<17.0.963.78~r125577-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • H
Buffer Overflow

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Incorrect Type Conversion or Cast

<17.0.963.66~r124982-1
  • M
Incorrect Type Conversion or Cast

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Out-of-bounds Read

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Out-of-bounds Write

<17.0.963.56~r121963-1
  • M
Incorrect Type Conversion or Cast

<17.0.963.56~r121963-1
  • M
Out-of-bounds Read

<17.0.963.56~r121963-1
  • M
Improper Certificate Validation

<17.0.963.56~r121963-1
  • M
CVE-2011-3020

<17.0.963.56~r121963-1
  • H
Out-of-bounds Write

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • H
Use After Free

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • M
Cleartext Transmission of Sensitive Information

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • M
Resource Exhaustion

<17.0.963.56~r121963-1
  • M
Improper Input Validation

<17.0.963.56~r121963-1
  • M
Out-of-bounds Write

<17.0.963.56~r121963-1
  • H
CVE-2011-3955

<17.0.963.56~r121963-1
  • M
Out-of-bounds Read

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • M
Improper Verification of Cryptographic Signature

<17.0.963.56~r121963-1
  • M
Out-of-bounds Read

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • M
Origin Validation Error

<17.0.963.56~r121963-1
  • H
Use After Free

<17.0.963.56~r121963-1
  • M
CVE-2011-3967

<17.0.963.56~r121963-1
  • H
Use After Free

<17.0.963.56~r121963-1
  • H
Race Condition

<17.0.963.56~r121963-1
  • H
CVE-2011-3953

<17.0.963.56~r121963-1
  • H
Buffer Overflow

<17.0.963.56~r121963-1
  • H
Use After Free

<16.0.912.77~r118311-1
  • H
Use After Free

<16.0.912.77~r118311-1
  • H
Improper Initialization

<16.0.912.77~r118311-1
  • H
Out-of-bounds Write

<16.0.912.77~r118311-1
  • H
Use After Free

<16.0.912.77~r118311-1
  • H
Out-of-bounds Write

<16.0.912.75~r116452-1
  • H
Use After Free

<16.0.912.75~r116452-1
  • H
Out-of-bounds Write

<16.0.912.75~r116452-1
  • H
Use After Free

<16.0.912.63~r113337-1
  • H
Use After Free

<16.0.912.63~r113337-1
  • H
Use After Free

<16.0.912.63~r113337-1
  • H
Out-of-bounds Write

<16.0.912.63~r113337-1
  • M
Out-of-Bounds

<16.0.912.63~r113337-1
  • H
Out-of-bounds Write

<16.0.912.63~r113337-1
  • M
Out-of-bounds Read

<16.0.912.63~r113337-1
  • M
Insufficient Comparison

<16.0.912.63~r113337-1
  • M
Out-of-bounds Read

<16.0.912.63~r113337-1
  • M
Improper Input Validation

<16.0.912.63~r113337-1
  • M
Access Restriction Bypass

<17.0.963.56~r121963-1
  • H
Out-of-bounds Write

<15.0.874.121~r109964-1
  • H
Improper Privilege Management

<15.0.874.121~r109964-1
  • H
Buffer Overflow

<15.0.874.121~r109964-1
  • M
Out-of-bounds Read

<15.0.874.121~r109964-1
  • H
Double Free

<15.0.874.121~r109964-1
  • H
Out-of-Bounds

<15.0.874.121~r109964-1
  • M
Use After Free

<15.0.874.121~r109964-1
  • H
Out-of-bounds Write

<15.0.874.121~r109964-1
  • H
Untrusted Search Path

*
  • M
Improper Input Validation

<15.0.874.106~r107270-1
  • H
CVE-2011-3879

<15.0.874.106~r107270-1
  • M
Improper Input Validation

<15.0.874.106~r107270-1
  • H
CVE-2011-3891

<15.0.874.106~r107270-1
  • M
Race Condition

<15.0.874.106~r107270-1
  • H
Use After Free

<15.0.874.106~r107270-1
  • H
Use After Free

<15.0.874.106~r107270-1
  • H
Improper Input Validation

<15.0.874.106~r107270-1
  • M
Use After Free

<15.0.874.106~r107270-1
  • H
Out-of-bounds Write

<15.0.874.106~r107270-1
  • M
CVE-2011-3876

<15.0.874.106~r107270-1
  • H
Use After Free

<15.0.874.106~r107270-1
  • M
Cross-site Scripting (XSS)

<15.0.874.106~r107270-1
  • M
Improper Input Validation

<15.0.874.106~r107270-1
  • H
Use After Free

<15.0.874.106~r107270-1
  • M
Reliance on Cookies without Validation and Integrity Checking

<15.0.874.106~r107270-1
  • M
Improper Input Validation

<15.0.874.106~r107270-1
  • M
Cross-site Scripting (XSS)

<15.0.874.106~r107270-1
  • M
CVE-2011-2877

<14.0.835.202~r103287-1
  • M
CVE-2011-2879

<14.0.835.202~r103287-1
  • M
Use After Free

<14.0.835.202~r103287-1
  • M
Out-of-Bounds

<14.0.835.202~r103287-1
  • H
CVE-2011-2878

<14.0.835.202~r103287-1
  • M
Use After Free

<14.0.835.202~r103287-1
  • M
Improper Input Validation

<14.0.835.163~r101024-1
  • M
Improper Input Validation

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • M
Arbitrary Code Injection

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • M
Use After Free

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • M
Use After Free

<14.0.835.163~r101024-1
  • H
CVE-2011-2836

<14.0.835.163~r101024-1
  • M
Race Condition

<14.0.835.163~r101024-1
  • H
Use After Free

<14.0.835.163~r101024-1
  • M
Incorrect Default Permissions

<14.0.835.163~r101024-1
  • M
Improper Certificate Validation

<14.0.835.163~r101024-1
  • M
Off-by-one Error

<14.0.835.163~r101024-1
  • M
NULL Pointer Dereference

<14.0.835.163~r101024-1
  • H
Use After Free

<14.0.835.163~r101024-1
  • H
Improper Input Validation

<14.0.835.163~r101024-1
  • H
Access Restriction Bypass

<14.0.835.163~r101024-1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • H
CVE-2011-2837

<14.0.835.163~r101024-1
  • M
Use After Free

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • H
Origin Validation Error

<14.0.835.163~r101024-1
  • M
Use After Free

<14.0.835.163~r101024-1
  • C
CVE-2011-3420

<14.0.835.163~r101024-1
  • C
CVE-2011-3421

<14.0.835.163~r101024-1
  • M
Improper Input Validation

<15.0.874.106~r107270-1
  • H
CVE-2011-2826

<13.0.782.215~r97094-1
  • H
Use After Free

<13.0.782.215~r97094-1
  • H
Use After Free

<13.0.782.215~r97094-1
  • H
Integer Overflow or Wraparound

<13.0.782.215~r97094-1
  • H
Double Free

<13.0.782.215~r97094-1
  • H
Use After Free

<13.0.782.215~r97094-1
  • H
Use After Free

<13.0.782.215~r97094-1
  • H
Out-of-bounds Write

<13.0.782.215~r97094-1
  • M
Access Restriction Bypass

<4.0.211.0
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Arbitrary Code Injection

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Information Exposure

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Out-of-bounds Read

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
CVE-2011-2798

<13.0.782.107~r94237-1
  • M
CVE-2011-2819

<13.0.782.107~r94237-1
  • M
Out-of-bounds Read

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Information Exposure

<13.0.782.107~r94237-1
  • M
Improper Authentication

<13.0.782.107~r94237-1
  • M
CVE-2011-2795

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Out-of-bounds Write

<13.0.782.107~r94237-1
  • M
Buffer Overflow

<13.0.782.107~r94237-1
  • M
CVE-2011-2360

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Incorrect Default Permissions

<13.0.782.107~r94237-1
  • H
Out-of-Bounds

<12.0.742.91~r87961-1
  • M
Resource Management Errors

<14.0.835.157~r99685-1
  • M
Information Exposure

*
  • M
Use After Free

<12.0.742.112~r90304-1
  • M
Out-of-Bounds

<12.0.742.112~r90304-1
  • M
CVE-2011-2350

<12.0.742.112~r90304-1
  • M
Use After Free

<12.0.742.112~r90304-1
  • M
Use After Free

<12.0.742.112~r90304-1
  • H
Improper Input Validation

<12.0.742.91~r87961-1
  • M
Improper Input Validation

<12.0.742.91~r87961-1
  • M
Out-of-Bounds

<12.0.742.91~r87961-1
  • M
Cross-site Scripting (XSS)

<12.0.742.91~r87961-1
  • M
Information Exposure

<12.0.742.91~r87961-1
  • M
Use After Free

<12.0.742.91~r87961-1
  • M
Cross-site Scripting (XSS)

<12.0.742.91~r87961-1
  • M
Cross-site Scripting (XSS)

<12.0.742.91~r87961-1
  • M
Use After Free

<12.0.742.91~r87961-1
  • M
Use After Free

<12.0.742.91~r87961-1
  • M
Improper Input Validation

<12.0.742.91~r87961-1
  • M
Use After Free

<12.0.742.91~r87961-1
  • H
CVE-2011-1812

<12.0.742.91~r87961-1
  • C
Out-of-Bounds

<11.0.696.71~r86024-1
  • C
Out-of-bounds Write

<11.0.696.71~r86024-1
  • M
CVE-2011-1801

<11.0.696.71~r86024-1
  • H
Improper Input Validation

<11.0.696.71~r86024-1
  • H
Integer Overflow or Wraparound

<11.0.696.68~r84545-1
  • M
Incorrect Type Conversion or Cast

<11.0.696.68~r84545-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • M
CVE-2011-1446

<11.0.696.65~r84435-1
  • M
CVE-2011-1304

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • H
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • M
CVE-2011-1439

<11.0.696.65~r84435-1
  • M
Out-of-bounds Read

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Race Condition

<11.0.696.65~r84435-1
  • M
Use After Free

<11.0.696.65~r84435-1
  • H
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Integer Overflow or Wraparound

<11.0.696.65~r84435-1
  • H
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Incorrect Type Conversion or Cast

<11.0.696.65~r84435-1
  • M
Race Condition

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Use After Free

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Use After Free

<11.0.696.65~r84435-1
  • M
Incorrect Default Permissions

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • H
Out-of-bounds Write

<10.0.648.205~r81283-1
  • H
Use After Free

<10.0.648.205~r81283-1
  • M
NULL Pointer Dereference

<12.0.742.91~r87961-1
  • H
Improper Input Validation

<10.0.648.204~r79063-1
  • H
Buffer Overflow

<10.0.648.204~r79063-1
  • H
Use After Free

<10.0.648.204~r79063-1
  • H
Improper Input Validation

<10.0.648.204~r79063-1
  • H
Improper Input Validation

<10.0.648.204~r79063-1
  • H
Use After Free

<10.0.648.204~r79063-1
  • C
Numeric Errors

<10.0.648.133~r77742-1
  • M
CVE-2011-1413

<10.0.648.127~r76697-1
  • H
CVE-2011-1189

<10.0.648.127~r76697-1
  • M
Improper Input Validation

<10.0.648.127~r76697-1
  • M
CVE-2011-1194

<10.0.648.127~r76697-1
  • H
CVE-2011-1185

<10.0.648.127~r76697-1
  • M
Incorrect Type Conversion or Cast

<10.0.648.127~r76697-1
  • H
CVE-2011-1199

<10.0.648.127~r76697-1
  • H
CVE-2011-1188

<10.0.648.127~r76697-1
  • M
Out-of-bounds Read

<10.0.648.127~r76697-1
  • H
CVE-2011-1196

<10.0.648.127~r76697-1
  • H
Improper Input Validation

<10.0.648.127~r76697-1
  • H
Use After Free

<10.0.648.127~r76697-1
  • M
Information Exposure

<10.0.648.127~r76697-1
  • H
Out-of-Bounds

<10.0.648.127~r76697-1
  • H
Use After Free

<10.0.648.127~r76697-1
  • H
CVE-2011-1203

<10.0.648.127~r76697-1
  • H
CVE-2011-1201

<10.0.648.127~r76697-1
  • M
Improper Input Validation

<10.0.648.127~r76697-1
  • H
CVE-2011-1119

<9.0.597.107~r75357-1
  • H
Improper Input Validation

<9.0.597.107~r75357-1
  • H
Improper Input Validation

<9.0.597.107~r75357-1
  • H
CVE-2011-1114

<9.0.597.107~r75357-1
  • H
CVE-2011-1112

<9.0.597.107~r75357-1
  • M
Out-of-bounds Read

<9.0.597.107~r75357-1
  • M
Out-of-bounds Read

<9.0.597.107~r75357-1
  • H
Use After Free

<9.0.597.107~r75357-1
  • H
CVE-2011-1125

<9.0.597.107~r75357-1
  • H
CVE-2011-1116

<9.0.597.107~r75357-1
  • H
CVE-2011-1117

<9.0.597.107~r75357-1
  • H
Integer Overflow or Wraparound

<9.0.597.107~r75357-1
  • H
Improper Input Validation

<9.0.597.107~r75357-1
  • H
Incorrect Authorization

<9.0.597.107~r75357-1
  • M
Out-of-bounds Read

<9.0.597.107~r75357-1
  • M
CVE-2011-1107

<9.0.597.107~r75357-1
  • M
Improper Input Validation

<9.0.597.107~r75357-1
  • H
CVE-2011-1115

<9.0.597.107~r75357-1
  • M
CVE-2011-1108

<9.0.597.107~r75357-1
  • C
Use After Free

<9.0.597.98~r74359-1
  • H
Improper Input Validation

<9.0.597.98~r74359-1
  • H
Resource Exhaustion

<9.0.597.98~r74359-1
  • H
Improper Input Validation

<9.0.597.98~r74359-1
  • M
Out-of-bounds Read

<9.0.597.98~r74359-1
  • H
Improper Input Validation

<9.0.597.84~r72991-1
  • M
Improper Input Validation

<9.0.597.84~r72991-1
  • H
Use After Free

<9.0.597.84~r72991-1
  • M
CVE-2011-0783

<9.0.597.84~r72991-1
  • H
Access Restriction Bypass

<9.0.597.84~r72991-1
  • M
Race Condition

<9.0.597.84~r72991-1
  • C
CVE-2011-0474

<6.0.472.63~r59945-5
  • M
Incorrect Type Conversion or Cast

<6.0.472.63~r59945-5
  • C
Out-of-Bounds

<6.0.472.63~r59945-5
  • H
Access of Uninitialized Pointer

<9.0.597.45~r70550-1
  • C
Improper Input Validation

<9.0.597.45~r70550-1
  • M
CVE-2011-0470

<9.0.597.45~r70550-1
  • C
CVE-2011-0473

<6.0.472.63~r59945-5
  • H
Improper Input Validation

<6.0.472.63~r59945-5
  • C
Improper Input Validation

<6.0.472.63~r59945-5
  • M
Incorrect Type Conversion or Cast

<6.0.472.63~r59945-5
  • C
Improper Input Validation

<6.0.472.63~r59945-5
  • M
NULL Pointer Dereference

<6.0.472.63~r59945-4
  • H
Deserialization of Untrusted Data

<6.0.472.63~r59945-4
  • H
CVE-2010-4578

<6.0.472.63~r59945-4
  • H
Out-of-bounds Read

<6.0.472.63~r59945-4
  • M
Improper Input Validation

<6.0.472.63~r59945-4
  • M
Use After Free

<6.0.472.63~r59945-3
  • M
CVE-2010-4482

*
  • M
CVE-2010-4484

<9.0.597.83~r72435-1
  • H
CVE-2010-4490

<6.0.472.63~r59945-3
  • H
CVE-2010-4487

<6.0.472.63~r59945-3
  • M
Access Restriction Bypass

<9.0.597.83~r72435-1
  • M
Access Restriction Bypass

<9.0.597.45~r70550-1
  • H
Resource Management Errors

<6.0.472.63~r59945-3
  • H
Double Free

<5.0.375.29~r46008-1
  • M
Access Restriction Bypass

<6.0.472.63~r59945-3
  • M
Improper Authentication

<9.0.597.83~r72435-1
  • H
Use After Free

<6.0.472.63~r59945-3
  • M
Access Restriction Bypass

<29.0.1547.57-1
  • H
Numeric Errors

<29.0.1547.57-1
  • C
Use After Free

<6.0.472.63~r59945-2
  • H
Out-of-bounds Write

<6.0.472.63~r59945-2
  • H
Improper Input Validation

<6.0.472.63~r59945-2
  • H
Improper Input Validation

<6.0.472.63~r59945-2
  • C
Integer Overflow or Wraparound

<6.0.472.63~r59945-2
  • C
Use After Free

<6.0.472.63~r59945-2
  • C
CVE-2010-4205

<6.0.472.63~r59945-2
  • C
CVE-2010-4204

<6.0.472.63~r59945-2
  • M
CVE-2010-4037

*
  • H
Improper Resource Shutdown or Release

<9.0.570
  • C
Improper Input Validation

<6.0.472.63~r59945-1
  • M
CVE-2010-4033

<6.0.472.63~r59945-1
  • M
Improper Input Validation

<6.0.472.63~r59945-1
  • H
Improper Input Validation

<6.0.472.63~r59945-1
  • H
Improper Input Validation

<6.0.472.63~r59945-1
  • H
Improper Input Validation

<6.0.472.63~r59945-1
  • C
CVE-2010-4041

<6.0.472.63~r59945-1
  • H
CVE-2010-3730

<6.0.472.62~r59676-1
  • C
Integer Overflow or Wraparound

<6.0.472.62~r59676-1
  • H
Incorrect Type Conversion or Cast

<6.0.472.62~r59676-1
  • H
Use After Free

<6.0.472.59~r59126-1
  • H
Use After Free

<5.0.375.55~r47796-1
  • M
Cross-site Request Forgery (CSRF)

<5.0.375.29~r46008-1
  • H
Use After Free

<6.0.472.59~r59126-1
  • H
Use After Free

<6.0.472.59~r59126-1
  • H
Off-by-one Error

<5.0.375.55~r47796-1
  • M
Information Exposure

<6.0.472.59~r59126-1
  • M
Reachable Assertion

<6.0.472.59~r59126-1
  • C
Out-of-Bounds

<6.0.472.59~r59126-1
  • M
CVE-2010-3413

<6.0.472.59~r59126-1
  • C
Out-of-Bounds

<6.0.472.59~r59126-1
  • H
Resource Management Errors

<5.0.375.127~r55887-1
  • C
Use After Free

<6.0.472.53~r57914-1
  • M
CVE-2010-3248

<6.0.472.53~r57914-1
  • H
CVE-2010-3249

<6.0.472.53~r57914-1
  • M
Information Exposure

<6.0.472.53~r57914-1
  • M
CVE-2010-3256

<6.0.472.53~r57914-1
  • M
NULL Pointer Dereference

<6.0.472.53~r57914-1
  • H
Use After Free

<6.0.472.53~r57914-1
  • H
Deserialization of Untrusted Data

<6.0.472.53~r57914-1
  • M
Improper Input Validation

<6.0.472.53~r57914-1
  • C
Integer Overflow or Wraparound

<6.0.472.53~r57914-1
  • C
Out-of-Bounds

<6.0.472.53~r57914-1
  • M
CVE-2010-3250

<6.0.472.53~r57914-1
  • H
Out-of-Bounds

<6.0.472.53~r57914-1
  • M
CVE-2010-3246

<6.0.472.53~r57914-1
  • C
Out-of-Bounds

<5.0.375.127~r55887-1
  • C
Out-of-Bounds

<5.0.375.127~r55887-1
  • M
CVE-2010-3115

<5.0.375.127~r55887-1
  • C
Out-of-Bounds

<5.0.375.127~r55887-1
  • M
Information Exposure

<5.0.375.127~r55887-1
  • C
CVE-2010-3114

<5.0.375.127~r55887-1
  • C
CVE-2010-3117

<5.0.375.127~r55887-1
  • C
CVE-2010-3111

<5.0.375.127~r55887-1
  • C
Use After Free

<5.0.375.127~r55887-1
  • C
Out-of-Bounds

<5.0.375.127~r55887-1
  • C
Access Restriction Bypass

<5.0.342.9~r43360-1
  • C
Credentials Management

<5.0.375.99~r51029-2
  • H
Resource Management Errors

<5.0.375.125~r53311-1
  • H
Out-of-Bounds

<5.0.375.127~r55887-1
  • H
Resource Management Errors

<5.0.375.125~r53311-1
  • H
Out-of-Bounds

<5.0.375.125~r53311-1
  • H
Out-of-Bounds

<5.0.375.127~r55887-1
  • H
Out-of-Bounds

<5.0.375.127~r55887-1
  • H
Resource Management Errors

<5.0.375.99~r51029-1
  • H
Out-of-Bounds

<5.0.375.99~r51029-1
  • H
Out-of-Bounds

<5.0.375.127~r55887-1
  • C
CVE-2010-2898

<5.0.375.125~r53311-1
  • C
Out-of-Bounds

<5.0.375.125~r53311-1
  • C
Out-of-Bounds

<5.0.375.125~r53311-1
  • C
CVE-2010-2897

<5.0.375.125~r53311-1
  • C
CVE-2010-2900

<5.0.375.125~r53311-1
  • H
CVE-2010-2903

<5.0.375.125~r53311-1
  • M
CVE-2010-2899

<5.0.375.125~r53311-1
  • H
Numeric Errors

<5.0.375.55~r47796-1
  • H
CVE-2010-2646

<5.0.375.99~r51029-1
  • M
CVE-2010-2649

<5.0.375.99~r51029-1
  • M
CVE-2010-2645

<5.0.375.99~r51029-1
  • H
Out-of-Bounds

<5.0.375.99~r51029-1
  • H
Out-of-Bounds

<5.0.375.99~r51029-1
  • M
CVE-2010-2652

<5.0.375.99~r51029-1
  • H
CVE-2010-2650

<5.0.375.99~r51029-1
  • H
Out-of-Bounds

<5.0.375.99~r51029-1
  • M
Access Restriction Bypass

<5.0.375.55~r47796-1
  • M
Information Exposure

<5.0.342.9~r43360-1
  • C
CVE-2010-1763

<5.0.375.55~r47796-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • C
CVE-2010-1769

<5.0.375.55~r47796-1
  • M
Cross-site Scripting (XSS)

<5.0.375.70~r48679-1
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<5.0.375.70~r48679-1
  • C
Improper Input Validation

<5.0.375.70~r48679-1
  • C
Use After Free

<5.0.375.70~r48679-1
  • H
Arbitrary Code Injection

<5.0.375.55~r47796-1
  • C
Use After Free

<5.0.375.70~r48679-1
  • H
Access Restriction Bypass

<5.0.375.70~r48679-1
  • M
Improper Input Validation

<5.0.375.55~r47796-1
  • H
Resource Management Errors

<5.0.375.55~r47796-1
  • H
Resource Management Errors

<5.0.375.55~r47796-1
  • M
Cross-site Scripting (XSS)

<5.0.375.55~r47796-1
  • M
Information Exposure

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<5.0.375.55~r47796-1
  • M
CVE-2010-1764

<5.0.375.55~r47796-1
  • H
Out-of-Bounds

<5.0.375.55~r47796-1
  • M
Cross-site Scripting (XSS)

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<5.0.375.29~r46008-1
  • M
CVE-2010-1421

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<5.0.375.55~r47796-1
  • H
Arbitrary Code Injection

<5.0.375.70~r48679-1
  • H
Out-of-Bounds

<5.0.342.9~r43360-1
  • H
Arbitrary Code Injection

<5.0.375.70~r48679-1
  • M
Cross-site Scripting (XSS)

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • M
Information Exposure

<5.0.342.9~r43360-1
  • M
CVE-2010-1409

<5.0.342.9~r43360-1
  • M
Access Restriction Bypass

<5.0.375.70~r48679-1
  • M
Directory Traversal

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • M
Cross-site Scripting (XSS)

<5.0.342.9~r43360-1
  • M
Cryptographic Issues

<5.0.375.70~r48679-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

<5.0.342.9~r43360-1
  • M
CVE-2010-1422

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<5.0.375.70~r48679-1
  • H
Out-of-Bounds

<5.0.342.9~r43360-1
  • H
Out-of-Bounds

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • H
Out-of-Bounds

<5.0.375.29~r46008-1
  • M
Access Restriction Bypass

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.375.70~r48679-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • H
Out-of-Bounds

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • M
Cross-site Scripting (XSS)

<5.0.342.9~r43360-1
  • M
Information Exposure

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • H
CVE-2010-2110

<5.0.375.55~r47796-1
  • H
CVE-2010-2108

<5.0.375.55~r47796-1
  • H
CVE-2010-2109

<5.0.375.55~r47796-1
  • C
CVE-2010-2105

<5.0.375.55~r47796-1
  • M
CVE-2010-2106

<5.0.375.55~r47796-1
  • C
CVE-2010-2107

<5.0.375.55~r47796-1
  • M
Resource Management Errors

*
  • M
Resource Management Errors

<5.0.375.55~r47796-1
  • M
Out-of-Bounds

<5.0.375.29~r46008-1
  • H
Out-of-Bounds

<5.0.375.29~r46008-1
  • C
Access Restriction Bypass

<5.0.375.29~r46008-1
  • C
Access Restriction Bypass

<5.0.375.29~r46008-1
  • M
Cross-site Scripting (XSS)

<5.0.375.29~r46008-1
  • M
Cross-site Scripting (XSS)

<5.0.375.29~r46008-1
  • H
CVE-2010-1502

<5.0.375.29~r46008-1
  • H
CVE-2010-1500

<5.0.375.29~r46008-1
  • H
CVE-2010-1506

<5.0.375.29~r46008-1
  • C
Race Condition

<5.0.375.29~r46008-1
  • H
CVE-2010-1234

<5.0.375.29~r46008-1
  • C
Numeric Errors

<5.0.375.29~r46008-1
  • H
CVE-2010-1231

<5.0.375.29~r46008-1
  • H
Improper Input Validation

<5.0.375.29~r46008-1
  • C
Resource Management Errors

<5.0.375.29~r46008-1
  • M
Cross-site Scripting (XSS)

<5.0.375.29~r46008-1
  • M
Resource Management Errors

<5.0.375.29~r46008-1
  • M
Improper Input Validation

<5.0.375.29~r46008-1
  • C
Information Exposure

<5.0.375.29~r46008-1
  • M
Resource Management Errors

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Arbitrary Code Injection

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Numeric Errors

<5.0.375.29~r46008-1
  • L
Access Restriction Bypass

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<5.0.375.29~r46008-1
  • H
Arbitrary Code Injection

<5.0.375.29~r46008-1
  • H
Numeric Errors

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • M
Access Restriction Bypass

<5.0.375.29~r46008-1
  • H
CVE-2010-0657

<5.0.375.29~r46008-1
  • C
Numeric Errors

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • M
Resource Management Errors

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • M
Numeric Errors

<5.0.375.29~r46008-1
  • H
Numeric Errors

<5.0.375.29~r46008-1
  • M
Credentials Management

<5.0.375.29~r46008-1
  • M
CVE-2010-0315

<5.0.375.29~r46008-1
  • M
CVE-2010-0314

<5.0.375.29~r46008-1
  • M
Resource Management Errors

*
  • M
Cross-site Scripting (XSS)

<5.0.375.70~r48679-2
  • M
Improper Authentication

<5.0.342.9~r43360-1
  • H
Access Restriction Bypass

*
  • M
Resource Management Errors

<5.0.375.38~r46659-1
  • M
CVE-2009-0374

*
  • C
Resource Management Errors

<5.0.375.29~r46008-1
  • H
Numeric Errors

<5.0.375.29~r46008-1
  • M
Resource Management Errors

<5.0.375.29~r46008-1