Information Exposure | |
Incorrect Type Conversion or Cast | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Improper Validation of Array Index | |
Out-of-bounds Read | |
CVE-2018-17464 | |
Use After Free | |
CVE-2018-17471 | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2018-17476 | |
CVE-2018-17463 | |
CVE-2018-17477 | |
Missing Release of Resource after Effective Lifetime | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Use After Free | |
Information Exposure | |
CVE-2018-17475 | |
CVE-2018-17473 | |
Incomplete Cleanup | |
Improper Validation of Array Index | |
CVE-2018-17459 | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Incorrect Permission Assignment for Critical Resource | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Missing Authorization | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Race Condition | |
Improper Authorization | |
Improper Authorization | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-bounds Read | |
CVE-2018-16075 | |
Improper Authorization | |
Improper Authorization | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2018-6175 | |
Out-of-bounds Write | |
Improper Input Validation | |
Information Exposure | |
Improper Restriction of Rendered UI Layers or Frames | |
Information Exposure | |
Unrestricted Upload of File with Dangerous Type | |
CVE-2018-6167 | |
CVE-2018-6166 | |
Information Exposure | |
Use After Free | |
CVE-2018-6165 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2018-6163 | |
Information Exposure | |
CVE-2018-6173 | |
Race Condition | |
Improper Input Validation | |
Information Exposure | |
CVE-2018-6172 | |
Out-of-bounds Read | |
Information Exposure | |
Out-of-bounds Write | |
CVE-2018-6044 | |
Integer Overflow or Wraparound | |
Incorrect Type Conversion or Cast | |
Out-of-bounds Read | |
CRLF Injection | |
Out-of-Bounds | |
Incorrect Type Conversion or Cast | |
CVE-2010-1765 | |
Improper Data Handling | |
Information Exposure | |
Use After Free | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Open Redirect | |
CVE-2018-6125 | |
CVE-2018-6107 | |
Improper Input Validation | |
Out-of-bounds Read | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Integer Overflow or Wraparound | |
CVE-2018-6103 | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Out-of-bounds Read | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2018-6135 | |
Out-of-bounds Read | |
Arbitrary Code Injection | |
CVE-2018-6098 | |
Improper Privilege Management | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Write | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Improper Input Validation | |
CVE-2018-6108 | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Improper Input Validation | |
Information Exposure | |
Use of Incorrectly-Resolved Name or Reference | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Use After Free | |
Improper Input Validation | |
Improper Data Handling | |
Incorrect Type Conversion or Cast | |
CVE-2016-5194 | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Information Exposure | |
Incorrect Permission Assignment for Critical Resource | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Data Handling | |
Improper Input Validation | |
Race Condition | |
Incorrect Type Conversion or Cast | |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Input Validation | |
CVE-2018-6049 | |
Information Exposure | |
CVE-2016-9652 | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Use of Uninitialized Resource | |
CVE-2018-6105 | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Out-of-bounds Read | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
Incorrect Permission Assignment for Critical Resource | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Incorrect Permission Assignment for Critical Resource | |
Out-of-Bounds | |
Improper Data Handling | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2018-6083 | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Write | |
Improper Input Validation | |
CVE-2018-6104 | |
Out-of-bounds Write | |
Cryptographic Issues | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Data Handling | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-bounds Read | |
Exposure of Resource to Wrong Sphere | |
Use After Free | |
CVE-2017-15391 | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2017-15387 | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
CVE-2017-5078 | |
Incorrect Type Conversion or Cast | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Improper Input Validation | |
Race Condition | |
Improper Input Validation | |
CVE-2017-5120 | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Improper Input Validation | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Incorrect Permission Assignment for Critical Resource | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Privilege Management | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Improper Input Validation | |
Race Condition | |
Out-of-bounds Read | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Incorrect Type Conversion or Cast | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Incorrect Type Conversion or Cast | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Use After Free | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Race Condition | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Improper Preservation of Permissions | |
Out-of-bounds Write | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Use After Free | |
Missing Encryption of Sensitive Data | |
Origin Validation Error | |
Information Exposure | |
Information Exposure | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
NULL Pointer Dereference | |
Cross-site Scripting (XSS) | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Use After Free | |
CVE-2017-5013 | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2017-5015 | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
CVE-2017-5027 | |
Cross-site Scripting (XSS) | |
CVE-2017-5022 | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Numeric Errors | |
Improper Data Handling | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Use After Free | |
Use After Free | |
Improper Access Control | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Information Exposure | |
Integer Overflow or Wraparound | |
Improper Data Handling | |
Improper Access Control | |
Improper Data Handling | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
Improper Access Control | |
Improper Access Control | |
Out-of-bounds Read | |
Improper Input Validation | |
Use After Free | |
Improper Access Control | |
CVE-2016-5175 | |
CVE-2016-7549 | |
Information Exposure | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Improper Access Control | |
Security Features | |
Information Exposure | |
Improper Data Handling | |
Security Features | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Integer Overflow or Wraparound | |
Cross-site Scripting (XSS) | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Incorrect Type Conversion or Cast | |
CVE-2016-5167 | |
Security Features | |
Cross-site Scripting (XSS) | |
Use After Free | |
Integer Overflow or Wraparound | |
Cross-site Scripting (XSS) | |
Use After Free | |
Security Features | |
Improper Data Handling | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Access Control | |
Security Features | |
Use After Free | |
CVE-2016-5146 | |
Use After Free | |
Information Exposure | |
Security Features | |
Security Features | |
Information Exposure | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Authentication | |
Improper Access Control | |
Improper Authorization | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
CVE-2016-1705 | |
Improper Input Validation | |
Use After Free | |
Improper Authorization | |
Out-of-Bounds | |
CVE-2016-1704 | |
Information Exposure | |
CVE-2016-1695 | |
Out-of-Bounds | |
Security Features | |
Out-of-Bounds | |
Improper Access Control | |
Improper Access Control | |
CVE-2016-1701 | |
Security Features | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2016-1674 | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Improper Access Control | |
Improper Access Control | |
CVE-2016-1673 | |
Improper Access Control | |
Information Exposure | |
Improper Access Control | |
CVE-2016-1703 | |
Out-of-Bounds | |
CVE-2016-1690 | |
CVE-2016-1679 | |
Security Features | |
Improper Access Control | |
CVE-2016-1684 | |
Out-of-Bounds | |
CVE-2016-1700 | |
CVE-2016-1663 | |
Improper Input Validation | |
CVE-2016-1662 | |
Improper Access Control | |
CVE-2016-1666 | |
Out-of-Bounds | |
Improper Input Validation | |
Race Condition | |
Security Features | |
Improper Access Control | |
Improper Input Validation | |
Security Features | |
Information Exposure | |
CVE-2016-1655 | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Information Exposure | |
CVE-2016-1659 | |
CVE-2016-1650 | |
CVE-2016-1647 | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2016-1648 | |
Out-of-Bounds | |
CVE-2016-1644 | |
Time and State | |
Improper Input Validation | |
CVE-2016-1642 | |
CVE-2016-1633 | |
Access Restriction Bypass | |
CVE-2016-1639 | |
Improper Access Control | |
CVE-2016-1635 | |
Code | |
CVE-2016-1641 | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
CVE-2016-2843 | |
CVE-2016-1634 | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2016-1620 | |
Information Exposure | |
CVE-2016-2052 | |
Improper Input Validation | |
Out-of-Bounds | |
Information Exposure | |
Security Features | |
CVE-2016-1613 | |
Cryptographic Issues | |
Security Features | |
CVE-2015-6792 | |
Numeric Errors | |
Race Condition | |
CVE-2015-6791 | |
CVE-2015-8548 | |
Improper Input Validation | |
CVE-2015-6788 | |
Out-of-Bounds | |
CVE-2015-6766 | |
CVE-2015-6767 | |
CVE-2015-6777 | |
CVE-2015-8478 | |
CVE-2015-6774 | |
CVE-2015-6775 | |
Access Restriction Bypass | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2015-6787 | |
Access Restriction Bypass | |
Numeric Errors | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Out-of-Bounds | |
Improper Input Validation | |
Access Restriction Bypass | |
CVE-2015-6780 | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
CVE-2015-6765 | |
Buffer Overflow | |
Improper Input Validation | |
CVE-2015-7834 | |
Code | |
CVE-2015-6757 | |
Security Features | |
CVE-2015-6756 | |
Access Restriction Bypass | |
Race Condition | |
Information Exposure | |
CVE-2015-6763 | |
Code | |
Improper Input Validation | |
Improper Access Control | |
Security Features | |
Security Features | |
Access Restriction Bypass | |
CVE-2015-1301 | |
Security Features | |
CVE-2015-6580 | |
CVE-2015-6581 | |
Access Restriction Bypass | |
Security Features | |
Access Restriction Bypass | |
Security Features | |
CVE-2015-1294 | |
CVE-2015-1295 | |
CVE-2015-1299 | |
Security Features | |
CVE-2015-1289 | |
Cross-site Scripting (XSS) | |
CVE-2015-1272 | |
Numeric Errors | |
Improper Data Handling | |
CVE-2015-1276 | |
Security Features | |
CVE-2015-1277 | |
Out-of-Bounds | |
Out-of-Bounds | |
Numeric Errors | |
Security Features | |
Security Features | |
CVE-2015-1282 | |
Code | |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | |
Code | |
Security Features | |
Security Features | |
Security Features | |
Security Features | |
Numeric Errors | |
Out-of-Bounds | |
CVE-2015-1256 | |
Numeric Errors | |
CVE-2015-1255 | |
CVE-2015-1251 | |
CVE-2015-1260 | |
Code | |
CVE-2015-3910 | |
Code | |
Code | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2015-1265 | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Access Control | |
CVE-2015-1243 | |
CVE-2015-1250 | |
CVE-2015-1245 | |
CVE-2015-1242 | |
Code | |
Out-of-Bounds | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
CVE-2015-1249 | |
Out-of-Bounds | |
Access Restriction Bypass | |
CVE-2015-3333 | |
Access Restriction Bypass | |
Improper Input Validation | |
Out-of-Bounds | |
Information Exposure | |
CVE-2015-1237 | |
Code | |
Race Condition | |
Improper Data Handling | |
CVE-2015-1221 | |
Access Restriction Bypass | |
Code | |
Out-of-Bounds | |
Numeric Errors | |
CVE-2015-1216 | |
CVE-2015-1222 | |
CVE-2015-1218 | |
Code | |
CVE-2015-1230 | |
Resource Management Errors | |
CVE-2015-1220 | |
Out-of-Bounds | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Improper Data Handling | |
Access Restriction Bypass | |
CVE-2015-2238 | |
Out-of-Bounds | |
CVE-2015-1223 | |
Resource Management Errors | |
Access Restriction Bypass | |
CVE-2015-1231 | |
Use After Free | |
CVE-2015-1210 | |
CVE-2015-1212 | |
CVE-2015-1211 | |
Out-of-Bounds | |
Numeric Errors | |
Code | |
CVE-2014-9647 | |
CVE-2015-1346 | |
Out-of-Bounds | |
Improper Data Handling | |
Out-of-Bounds | |
Access Restriction Bypass | |
CVE-2014-7930 | |
Code | |
Code | |
CVE-2014-7936 | |
CVE-2015-1205 | |
Resource Management Errors | |
Resource Management Errors | |
Code | |
CVE-2014-7924 | |
CVE-2014-7934 | |
Code | |
Out-of-Bounds | |
CVE-2014-7935 | |
CVE-2014-7933 | |
Numeric Errors | |
CVE-2014-7932 | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2014-7925 | |
Cryptographic Issues | |
Numeric Errors | |
CVE-2011-1796 | |
Improper Input Validation | |
Improper Input Validation | |
Numeric Errors | |
Numeric Errors | |
Numeric Errors | |
Resource Management Errors | |
Improper Input Validation | |
Improper Access Control | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
Numeric Errors | |
Code | |
CVE-2014-7910 | |
Out-of-Bounds | |
Cryptographic Issues | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Out-of-Bounds | |
Use After Free | |
Resource Management Errors | |
CVE-2014-3200 | |
Resource Management Errors | |
Arbitrary Code Injection | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2014-7967 | |
CVE-2014-3178 | |
CVE-2014-3179 | |
CVE-2014-3168 | |
Access Restriction Bypass | |
Out-of-Bounds | |
CVE-2014-3171 | |
Out-of-Bounds | |
CVE-2014-3175 | |
Access Restriction Bypass | |
CVE-2014-3169 | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
CVE-2014-3167 | |
Information Exposure | |
CVE-2014-3165 | |
Access Restriction Bypass | |
CVE-2014-3162 | |
CVE-2014-3154 | |
Out-of-Bounds | |
CVE-2014-3155 | |
Out-of-Bounds | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
CVE-2014-1748 | |
Resource Management Errors | |
Numeric Errors | |
Numeric Errors | |
Resource Management Errors | |
CVE-2014-1749 | |
Numeric Errors | |
Resource Management Errors | |
Resource Management Errors | |
Numeric Errors | |
Improper Input Validation | |
Resource Management Errors | |
CVE-2014-1734 | |
Access Restriction Bypass | |
Improper Input Validation | |
CVE-2014-1735 | |
Resource Management Errors | |
Improper Input Validation | |
Numeric Errors | |
Improper Input Validation | |
CVE-2014-1729 | |
Numeric Errors | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Numeric Errors | |
Resource Management Errors | |
CVE-2014-1728 | |
CVE-2014-1726 | |
Arbitrary Code Injection | |
Resource Management Errors | |
Resource Management Errors | |
Directory Traversal | |
Out-of-Bounds | |
Resource Management Errors | |
CVE-2014-1704 | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2013-6668 | |
CVE-2013-6667 | |
Information Exposure | |
Cryptographic Issues | |
Access Restriction Bypass | |
CVE-2013-6661 | |
Improper Input Validation | |
Access Restriction Bypass | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Cross-site Request Forgery (CSRF) | |
CVE-2014-1681 | |
Resource Management Errors | |
Improper Input Validation | |
Use After Free | |
Improper Authentication | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Authentication | |
CVE-2013-6637 | |
Improper Input Validation | |
Out-of-Bounds | |
Resource Management Errors | |
CVE-2013-6631 | |
Information Exposure | |
Numeric Errors | |
Numeric Errors | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
CVE-2013-2931 | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
CVE-2013-6628 | |
CVE-2013-6626 | |
CVE-2013-2928 | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
CVE-2013-2916 | |
Resource Management Errors | |
CVE-2013-2908 | |
Out-of-Bounds | |
Resource Management Errors | |
Race Condition | |
CVE-2013-2923 | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
CVE-2013-2915 | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Numeric Errors | |
CVE-2013-2887 | |
Resource Management Errors | |
Access Restriction Bypass | |
Resource Management Errors | |
Resource Management Errors | |
Directory Traversal | |
Resource Management Errors | |
CVE-2013-2886 | |
Resource Management Errors | |
Access Restriction Bypass | |
Resource Management Errors | |
CVE-2013-2882 | |
Out-of-Bounds | |
CVE-2013-2868 | |
CVE-2013-2880 | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
CVE-2013-2853 | |
Information Exposure | |
CVE-2013-2867 | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
Improper Input Validation | |
Use After Free | |
Resource Management Errors | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
CVE-2013-2865 | |
Use After Free | |
CVE-2013-2859 | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Race Condition | |
Resource Management Errors | |
Resource Management Errors | |
CVE-2013-2836 | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Resource Management Errors | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Resource Management Errors | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Information Exposure | |
Race Condition | |
Resource Management Errors | |
Improper Authentication | |
Resource Management Errors | |
Resource Management Errors | |
Directory Traversal | |
Out-of-Bounds | |
CVE-2013-0908 | |
Out-of-Bounds | |
Numeric Errors | |
Buffer Overflow | |
Out-of-Bounds | |
CVE-2013-0884 | |
Improper Input Validation | |
Race Condition | |
Numeric Errors | |
Directory Traversal | |
Resource Management Errors | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2013-0892 | |
Out-of-Bounds | |
Improper Input Validation | |
Access Restriction Bypass | |
Race Condition | |
CVE-2013-2268 | |
Access Restriction Bypass | |
Resource Management Errors | |
CVE-2013-0840 | |
CVE-2013-0842 | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Resource Management Errors | |
Numeric Errors | |
CVE-2013-0835 | |
Improper Input Validation | |
Resource Management Errors | |
Resource Management Errors | |
Access Restriction Bypass | |
Directory Traversal | |
Resource Management Errors | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Use After Free | |
Out-of-Bounds | |
CVE-2012-5141 | |
Arbitrary Code Injection | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
CVE-2012-5138 | |
Resource Management Errors | |
Improper Input Validation | |
Out-of-bounds Read | |
Use After Free | |
CVE-2012-5132 | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Numeric Errors | |
Use After Free | |
Use After Free | |
Race Condition | |
Improper Privilege Management | |
Resource Management Errors | |
Out-of-bounds Read | |
Race Condition | |
Out-of-bounds Read | |
CVE-2012-2900 | |
CVE-2012-5111 | |
Out-of-Bounds | |
Resource Management Errors | |
Improper Input Validation | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Race Condition | |
Cross-site Scripting (XSS) | |
CVE-2012-2892 | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
Cryptographic Issues | |
Cryptographic Issues | |
CVE-2012-2867 | |
Out-of-Bounds | |
CVE-2012-2866 | |
Cross-site Scripting (XSS) | |
CVE-2012-2871 | |
Resource Management Errors | |
Race Condition | |
Out-of-Bounds | |
Access Restriction Bypass | |
Resource Management Errors | |
CVE-2012-2853 | |
CVE-2012-2860 | |
Resource Management Errors | |
Numeric Errors | |
CVE-2012-2846 | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
CVE-2012-2826 | |
CVE-2012-2830 | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Improper Input Validation | |
Numeric Errors | |
CVE-2012-2821 | |
Resource Management Errors | |
Resource Management Errors | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
CVE-2011-3107 | |
Resource Management Errors | |
CVE-2011-3109 | |
CVE-2011-3087 | |
Improper Input Validation | |
Resource Management Errors | |
Race Condition | |
Access Restriction Bypass | |
Resource Management Errors | |
Improper Input Validation | |
CVE-2011-3100 | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2011-3101 | |
Resource Management Errors | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Resource Management Errors | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Origin Validation Error | |
Out-of-bounds Read | |
Use After Free | |
Origin Validation Error | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Incorrect Calculation | |
Use After Free | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Improper Certificate Validation | |
Cross-site Scripting (XSS) | |
CVE-2011-3049 | |
Origin Validation Error | |
Use After Free | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Missing Authentication for Critical Function | |
Use After Free | |
Out-of-Bounds | |
Improper Privilege Management | |
Use After Free | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Incorrect Type Conversion or Cast | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Incorrect Type Conversion or Cast | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Certificate Validation | |
Use After Free | |
Out-of-bounds Write | |
CVE-2011-3020 | |
Out-of-bounds Write | |
Use After Free | |
Incorrect Type Conversion or Cast | |
Cleartext Transmission of Sensitive Information | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Resource Exhaustion | |
Use After Free | |
Out-of-bounds Write | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Improper Verification of Cryptographic Signature | |
Out-of-bounds Read | |
CVE-2011-3967 | |
Use After Free | |
CVE-2011-3953 | |
Buffer Overflow | |
Origin Validation Error | |
Improper Input Validation | |
CVE-2011-3955 | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Improper Initialization | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Out-of-bounds Write | |
Improper Input Validation | |
Use After Free | |
Insufficient Comparison | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-Bounds | |
Use After Free | |
Improper Privilege Management | |
Double Free | |
Buffer Overflow | |
Out-of-bounds Read | |
Untrusted Search Path | |
Improper Input Validation | |
CVE-2011-3879 | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Use After Free | |
CVE-2011-3891 | |
Use After Free | |
CVE-2011-3876 | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Race Condition | |
Reliance on Cookies without Validation and Integrity Checking | |
Improper Input Validation | |
CVE-2011-2878 | |
CVE-2011-2879 | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
CVE-2011-2877 | |
Use After Free | |
Race Condition | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Input Validation | |
Improper Certificate Validation | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Origin Validation Error | |
NULL Pointer Dereference | |
Use After Free | |
Off-by-one Error | |
Use After Free | |
CVE-2011-2836 | |
Arbitrary Code Injection | |
Incorrect Default Permissions | |
Use After Free | |
Improper Input Validation | |
Access Restriction Bypass | |
Use After Free | |
Out-of-bounds Read | |
CVE-2011-2837 | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
CVE-2011-3421 | |
CVE-2011-3420 | |
Improper Input Validation | |
Use After Free | |
Integer Overflow or Wraparound | |
Out-of-bounds Write | |
Use After Free | |
CVE-2011-2826 | |
Use After Free | |
Double Free | |
Use After Free | |
Access Restriction Bypass | |
CVE-2011-2360 | |
Use After Free | |
Use After Free | |
Use After Free | |
Arbitrary Code Injection | |
Improper Input Validation | |
Out-of-bounds Write | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
CVE-2011-2798 | |
CVE-2011-2819 | |
Out-of-bounds Read | |
Incorrect Default Permissions | |
CVE-2011-2795 | |
Out-of-bounds Read | |
Information Exposure | |
Improper Authentication | |
Buffer Overflow | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Resource Management Errors | |
Information Exposure | |
Use After Free | |
CVE-2011-2350 | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Cross-site Scripting (XSS) | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
CVE-2011-1812 | |
Cross-site Scripting (XSS) | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Out-of-bounds Write | |
CVE-2011-1801 | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Incorrect Type Conversion or Cast | |
Improper Input Validation | |
Race Condition | |
CVE-2011-1446 | |
Improper Input Validation | |
Incorrect Default Permissions | |
Use After Free | |
CVE-2011-1304 | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Integer Overflow or Wraparound | |
Race Condition | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2011-1439 | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Buffer Overflow | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Numeric Errors | |
CVE-2011-1189 | |
Use After Free | |
CVE-2011-1201 | |
CVE-2011-1188 | |
Use After Free | |
Out-of-bounds Read | |
Improper Input Validation | |
CVE-2011-1194 | |
Information Exposure | |
CVE-2011-1203 | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2011-1185 | |
CVE-2011-1196 | |
CVE-2011-1413 | |
CVE-2011-1199 | |
Incorrect Type Conversion or Cast | |
CVE-2011-1114 | |
Out-of-bounds Read | |
Improper Input Validation | |
CVE-2011-1116 | |
CVE-2011-1112 | |
CVE-2011-1107 | |
CVE-2011-1125 | |
Improper Input Validation | |
Out-of-bounds Read | |
Incorrect Authorization | |
Improper Input Validation | |
Out-of-bounds Read | |
CVE-2011-1115 | |
Integer Overflow or Wraparound | |
CVE-2011-1119 | |
Improper Input Validation | |
CVE-2011-1108 | |
Use After Free | |
CVE-2011-1117 | |
Use After Free | |
Improper Input Validation | |
Resource Exhaustion | |
Out-of-bounds Read | |
Improper Input Validation | |
CVE-2011-0783 | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Access Restriction Bypass | |
Race Condition | |
Improper Input Validation | |
CVE-2011-0470 | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Incorrect Type Conversion or Cast | |
CVE-2011-0474 | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2011-0473 | |
Out-of-Bounds | |
Access of Uninitialized Pointer | |
NULL Pointer Dereference | |
Deserialization of Untrusted Data | |
Improper Input Validation | |
Out-of-bounds Read | |
CVE-2010-4578 | |
Access Restriction Bypass | |
Resource Management Errors | |
Access Restriction Bypass | |
Use After Free | |
Double Free | |
CVE-2010-4490 | |
Access Restriction Bypass | |
CVE-2010-4484 | |
CVE-2010-4482 | |
CVE-2010-4487 | |
Use After Free | |
Improper Authentication | |
Access Restriction Bypass | |
Numeric Errors | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
CVE-2010-4204 | |
Use After Free | |
Use After Free | |
CVE-2010-4205 | |
CVE-2010-4033 | |
CVE-2010-4037 | |
Improper Resource Shutdown or Release | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2010-4041 | |
CVE-2010-3730 | |
Integer Overflow or Wraparound | |
Incorrect Type Conversion or Cast | |
Use After Free | |
Use After Free | |
Use After Free | |
Cross-site Request Forgery (CSRF) | |
Off-by-one Error | |
Use After Free | |
Out-of-Bounds | |
Reachable Assertion | |
Information Exposure | |
CVE-2010-3413 | |
Out-of-Bounds | |
Resource Management Errors | |
Deserialization of Untrusted Data | |
CVE-2010-3249 | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
NULL Pointer Dereference | |
CVE-2010-3256 | |
Use After Free | |
Information Exposure | |
Use After Free | |
CVE-2010-3246 | |
CVE-2010-3250 | |
CVE-2010-3248 | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Information Exposure | |
CVE-2010-3114 | |
CVE-2010-3111 | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2010-3115 | |
CVE-2010-3117 | |
Access Restriction Bypass | |
Credentials Management | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2010-2898 | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2010-2899 | |
CVE-2010-2903 | |
CVE-2010-2897 | |
CVE-2010-2900 | |
Numeric Errors | |
CVE-2010-2652 | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2010-2646 | |
CVE-2010-2645 | |
CVE-2010-2649 | |
CVE-2010-2650 | |
Out-of-Bounds | |
Access Restriction Bypass | |
Information Exposure | |
CVE-2010-1763 | |
Resource Management Errors | |
CVE-2010-1769 | |
Improper Input Validation | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Arbitrary Code Injection | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Information Exposure | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
CVE-2010-1764 | |
Resource Management Errors | |
CVE-2010-1421 | |
CVE-2010-1409 | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Cryptographic Issues | |
Resource Management Errors | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Directory Traversal | |
Resource Management Errors | |
CVE-2010-1422 | |
Access Restriction Bypass | |
Information Exposure | |
Resource Management Errors | |
Resource Management Errors | |
CVE-2010-2110 | |
CVE-2010-2108 | |
CVE-2010-2107 | |
CVE-2010-2106 | |
CVE-2010-2109 | |
CVE-2010-2105 | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2010-1502 | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2010-1500 | |
CVE-2010-1506 | |
Race Condition | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
CVE-2010-1231 | |
Numeric Errors | |
Resource Management Errors | |
Improper Input Validation | |
CVE-2010-1234 | |
Resource Management Errors | |
Information Exposure | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Resource Management Errors | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Access Restriction Bypass | |
Information Exposure | |
Information Exposure | |
Numeric Errors | |
Access Restriction Bypass | |
CVE-2010-0657 | |
Resource Management Errors | |
Resource Management Errors | |
Information Exposure | |
Numeric Errors | |
Numeric Errors | |
Information Exposure | |
Information Exposure | |
Numeric Errors | |
Resource Management Errors | |
Information Exposure | |
Numeric Errors | |
Credentials Management | |
CVE-2010-0315 | |
CVE-2010-0314 | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Access Restriction Bypass | |
Resource Management Errors | |
CVE-2009-0374 | |
Numeric Errors | |
Resource Management Errors | |
Resource Management Errors | |