chromium-browser vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the chromium-browser package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Information Exposure

<14.0.835.163~r101024-1
  • H
Incorrect Type Conversion or Cast

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<56.0.2924.76-3
  • M
Improper Input Validation

<68.0.3440.75-1~deb9u1
  • M
Improper Input Validation

<68.0.3440.75-1~deb9u1
  • H
Out-of-bounds Read

<63.0.3239.84-1~deb9u1
  • H
Use After Free

<71.0.3578.80-1~deb9u1
  • M
Improper Input Validation

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Read

<51.0.2704.63-1
  • M
Improper Input Validation

<71.0.3578.80-1~deb9u1
  • H
Use After Free

<69.0.3497.81-1~deb9u1
  • M
Cross-site Scripting (XSS)

<70.0.3538.67-1~deb9u1
  • H
Improper Input Validation

<71.0.3578.80-1~deb9u1
  • M
CVE-2018-20067

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Read

<68.0.3440.75-1~deb9u1
  • H
Integer Overflow or Wraparound

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • M
CVE-2018-18348

<71.0.3578.80-1~deb9u1
  • M
CVE-2018-18350

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • M
CVE-2018-18345

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • M
Improper Input Validation

<71.0.3578.80-1~deb9u1
  • M
Improper Input Validation

<71.0.3578.80-1~deb9u1
  • M
Incorrect Permission Assignment for Critical Resource

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • M
CVE-2018-18357

<71.0.3578.80-1~deb9u1
  • M
Incorrect Permission Assignment for Critical Resource

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • H
Improper Input Validation

<71.0.3578.80-1~deb9u1
  • M
CVE-2018-18346

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • M
CVE-2018-18355

<71.0.3578.80-1~deb9u1
  • H
Improper Input Validation

<71.0.3578.80-1~deb9u1
  • M
CVE-2018-18353

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • M
Improper Privilege Management

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Read

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<71.0.3578.80-1~deb9u1
  • H
Out-of-bounds Write

<70.0.3538.110-1~deb9u1
  • H
Improper Validation of Array Index

<70.0.3538.102-1~deb9u1
  • H
Out-of-bounds Read

<70.0.3538.67-1~deb9u1
  • M
CVE-2018-17464

<70.0.3538.67-1~deb9u1
  • H
Use After Free

<70.0.3538.67-1~deb9u1
  • M
CVE-2018-17471

<70.0.3538.67-1~deb9u1
  • H
Out-of-Bounds

<70.0.3538.67-1~deb9u1
  • C
Improper Input Validation

<70.0.3538.67-1~deb9u1
  • M
CVE-2018-17476

<70.0.3538.67-1~deb9u1
  • H
CVE-2018-17463

<70.0.3538.67-1~deb9u1
  • M
CVE-2018-17477

<70.0.3538.67-1~deb9u1
  • H
Missing Release of Resource after Effective Lifetime

<70.0.3538.67-1~deb9u1
  • H
Out-of-bounds Read

<70.0.3538.67-1~deb9u1
  • H
Out-of-bounds Write

<70.0.3538.67-1~deb9u1
  • C
Use After Free

<70.0.3538.67-1~deb9u1
  • M
Information Exposure

<70.0.3538.67-1~deb9u1
  • M
CVE-2018-17475

<70.0.3538.67-1~deb9u1
  • M
CVE-2018-17473

<70.0.3538.67-1~deb9u1
  • M
Incomplete Cleanup

<70.0.3538.67-1~deb9u1
  • H
Improper Validation of Array Index

<69.0.3497.92-1~deb9u1
  • M
CVE-2018-17459

<69.0.3497.92-1~deb9u1
  • M
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • H
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • M
Information Exposure

<69.0.3497.81-1~deb9u1
  • M
Out-of-bounds Write

<69.0.3497.81-1~deb9u1
  • H
Out-of-bounds Write

<69.0.3497.81-1~deb9u1
  • M
Out-of-bounds Write

<69.0.3497.81-1~deb9u1
  • H
Use After Free

<69.0.3497.81-1~deb9u1
  • M
Incorrect Permission Assignment for Critical Resource

<69.0.3497.81-1~deb9u1
  • H
Out-of-bounds Write

<69.0.3497.81-1~deb9u1
  • H
Out-of-bounds Read

<69.0.3497.81-1~deb9u1
  • H
Missing Authorization

<69.0.3497.81-1~deb9u1
  • M
Improper Input Validation

<69.0.3497.81-1~deb9u1
  • M
Cross-site Scripting (XSS)

<69.0.3497.81-1~deb9u1
  • M
Race Condition

<69.0.3497.81-1~deb9u1
  • M
Improper Authorization

<69.0.3497.81-1~deb9u1
  • M
Improper Authorization

<69.0.3497.81-1~deb9u1
  • M
Out-of-bounds Read

<69.0.3497.81-1~deb9u1
  • C
Improper Input Validation

<69.0.3497.81-1~deb9u1
  • H
Out-of-bounds Read

<69.0.3497.81-1~deb9u1
  • M
CVE-2018-16075

<69.0.3497.81-1~deb9u1
  • M
Improper Authorization

<69.0.3497.81-1~deb9u1
  • M
Improper Authorization

<69.0.3497.81-1~deb9u1
  • M
Improper Input Validation

<69.0.3497.81-1~deb9u1
  • H
Out-of-bounds Write

<69.0.3497.81-1~deb9u1
  • M
Out-of-bounds Write

<69.0.3497.81-1~deb9u1
  • M
Out-of-bounds Read

<69.0.3497.81-1~deb9u1
  • H
Improper Input Validation

<68.0.3440.75-1~deb9u1
  • H
Out-of-bounds Write

<68.0.3440.75-1~deb9u1
  • H
Out-of-bounds Write

<68.0.3440.75-1~deb9u1
  • M
CVE-2018-6175

<68.0.3440.75-1~deb9u1
  • M
Out-of-bounds Write

<68.0.3440.75-1~deb9u1
  • M
Improper Input Validation

<68.0.3440.75-1~deb9u1
  • M
Information Exposure

<68.0.3440.75-1~deb9u1
  • M
Improper Restriction of Rendered UI Layers or Frames

<68.0.3440.75-1~deb9u1
  • M
Information Exposure

<68.0.3440.75-1~deb9u1
  • C
Unrestricted Upload of File with Dangerous Type

<68.0.3440.75-1~deb9u1
  • M
CVE-2018-6167

<68.0.3440.75-1~deb9u1
  • M
CVE-2018-6166

<68.0.3440.75-1~deb9u1
  • M
Information Exposure

<68.0.3440.75-1~deb9u1
  • M
Use After Free

<68.0.3440.75-1~deb9u1
  • M
CVE-2018-6165

<68.0.3440.75-1~deb9u1
  • H
Out-of-bounds Write

<68.0.3440.75-1~deb9u1
  • H
Out-of-bounds Write

<68.0.3440.75-1~deb9u1
  • M
CVE-2018-6163

<68.0.3440.75-1~deb9u1
  • M
Information Exposure

<68.0.3440.75-1~deb9u1
  • M
CVE-2018-6173

<68.0.3440.75-1~deb9u1
  • H
Race Condition

<68.0.3440.75-1~deb9u1
  • H
Improper Input Validation

<68.0.3440.75-1~deb9u1
  • M
Information Exposure

<68.0.3440.75-1~deb9u1
  • M
CVE-2018-6172

<68.0.3440.75-1~deb9u1
  • H
Out-of-bounds Read

<68.0.3440.75-1~deb9u1
  • M
Information Exposure

<68.0.3440.75-1~deb9u1
  • H
Out-of-bounds Write

<68.0.3440.75-1~deb9u1
  • H
Integer Overflow or Wraparound

<68.0.3440.75-1~deb9u1
  • H
Incorrect Type Conversion or Cast

<68.0.3440.75-1~deb9u1
  • H
Out-of-bounds Read

<67.0.3396.87-1~deb9u1
  • M
CRLF Injection

<67.0.3396.87-1~deb9u1
  • H
Out-of-Bounds

<62.0.3202.75-1~deb9u1
  • H
Incorrect Type Conversion or Cast

<67.0.3396.87-1~deb9u1
  • L
CVE-2010-1765

<5.0.375.55~r47796-1
  • H
Improper Data Handling

<66.0.3359.117-1~deb9u1
  • M
Information Exposure

<66.0.3359.117-1~deb9u1
  • H
Use After Free

<64.0.3282.119-1~deb9u1
  • C
Use After Free

<67.0.3396.87-1~deb9u1
  • M
Information Exposure

<66.0.3359.117-1~deb9u1
  • M
Information Exposure

<66.0.3359.117-1~deb9u1
  • M
Information Exposure

<64.0.3282.119-1~deb9u1
  • H
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • M
Open Redirect

<63.0.3239.84-1~deb9u1
  • M
CVE-2018-6125

<67.0.3396.87-1~deb9u1
  • M
CVE-2018-6107

<66.0.3359.117-1~deb9u1
  • M
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • M
Out-of-bounds Read

<67.0.3396.87-1~deb9u1
  • M
Information Exposure

<66.0.3359.117-1~deb9u1
  • M
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • M
Information Exposure

<66.0.3359.117-1~deb9u1
  • H
Integer Overflow or Wraparound

<66.0.3359.117-1~deb9u1
  • M
CVE-2018-6103

<66.0.3359.117-1~deb9u1
  • H
Out-of-bounds Write

<66.0.3359.117-1~deb9u1
  • H
Integer Overflow or Wraparound

<66.0.3359.117-1~deb9u1
  • H
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • M
Out-of-bounds Read

<67.0.3396.87-1~deb9u1
  • M
Out-of-Bounds

<63.0.3239.84-1~deb9u1
  • M
Information Exposure

<64.0.3282.119-1~deb9u1
  • H
Use After Free

<62.0.3202.89-1~deb9u1
  • H
Out-of-bounds Write

<67.0.3396.87-1~deb9u1
  • M
Improper Input Validation

<63.0.3239.84-1~deb9u1
  • M
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • M
CVE-2018-6135

<67.0.3396.87-1~deb9u1
  • H
Out-of-bounds Read

<66.0.3359.117-1~deb9u1
  • H
Arbitrary Code Injection

<55.0.2883.75-1
  • M
CVE-2018-6098

<66.0.3359.117-1~deb9u1
  • M
Improper Privilege Management

<66.0.3359.117-1~deb9u1
  • M
Cross-site Scripting (XSS)

<64.0.3282.119-1~deb9u1
  • M
Improper Input Validation

<63.0.3239.84-1~deb9u1
  • M
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • H
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • M
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • M
Out-of-bounds Write

<67.0.3396.87-1~deb9u1
  • M
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • H
Use After Free

<66.0.3359.117-1~deb9u1
  • H
Out-of-bounds Read

<66.0.3359.117-1~deb9u1
  • H
Out-of-bounds Write

<67.0.3396.87-1~deb9u1
  • H
Improper Input Validation

<67.0.3396.87-1~deb9u1
  • M
CVE-2018-6108

<66.0.3359.117-1~deb9u1
  • M
Improper Input Validation

<63.0.3239.84-1~deb9u1
  • H
Incorrect Type Conversion or Cast

<63.0.3239.84-1~deb9u1
  • M
Out-of-Bounds

<64.0.3282.119-1~deb9u1
  • M
Cross-site Scripting (XSS)

<66.0.3359.117-1~deb9u1
  • H
Out-of-bounds Write

<63.0.3239.84-1~deb9u1
  • M
Out-of-bounds Read

<67.0.3396.87-1~deb9u1
  • H
Improper Input Validation

<67.0.3396.87-1~deb9u1
  • M
Information Exposure

<67.0.3396.87-1~deb9u1
  • M
Use of Incorrectly-Resolved Name or Reference

<66.0.3359.117-1~deb9u1
  • H
Out-of-bounds Write

<66.0.3359.117-1~deb9u1
  • H
Out-of-bounds Read

<64.0.3282.119-1~deb9u1
  • H
Use After Free

<67.0.3396.87-1~deb9u1
  • M
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • M
Improper Data Handling

<66.0.3359.117-1~deb9u1
  • H
Incorrect Type Conversion or Cast

<66.0.3359.117-1~deb9u1
  • C
CVE-2016-5194

<54.0.2840.101-1
  • M
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • H
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • H
Use After Free

<63.0.3239.84-1~deb9u1
  • H
Improper Input Validation

<67.0.3396.87-1~deb9u1
  • M
Information Exposure

<64.0.3282.119-1~deb9u1
  • M
Incorrect Permission Assignment for Critical Resource

<64.0.3282.119-1~deb9u1
  • M
Cross-site Scripting (XSS)

<66.0.3359.117-1~deb9u1
  • H
Out-of-bounds Write

<66.0.3359.117-1~deb9u1
  • H
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • M
Improper Data Handling

<66.0.3359.117-1~deb9u1
  • M
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • H
Race Condition

<66.0.3359.117-1~deb9u1
  • H
Incorrect Type Conversion or Cast

<66.0.3359.117-1~deb9u1
  • C
Out-of-Bounds

<62.0.3202.89-1~deb9u1
  • M
Out-of-bounds Read

<67.0.3396.87-1~deb9u1
  • M
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • M
CVE-2018-6049

<64.0.3282.119-1~deb9u1
  • M
Information Exposure

<66.0.3359.117-1~deb9u1
  • C
CVE-2016-9652

<55.0.2883.75-1
  • M
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • H
Use After Free

<64.0.3282.119-1~deb9u1
  • M
Information Exposure

<66.0.3359.117-1~deb9u1
  • H
Information Exposure

<64.0.3282.119-1~deb9u1
  • M
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • M
Information Exposure

<66.0.3359.117-1~deb9u1
  • H
Use After Free

<66.0.3359.117-1~deb9u1
  • M
Out-of-Bounds

<63.0.3239.84-1~deb9u1
  • M
Use of Uninitialized Resource

<67.0.3396.87-1~deb9u1
  • M
CVE-2018-6105

<66.0.3359.117-1~deb9u1
  • M
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • H
Improper Input Validation

<67.0.3396.87-1~deb9u1
  • M
NULL Pointer Dereference

<66.0.3359.117-1~deb9u1
  • M
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • H
Use After Free

<66.0.3359.117-1~deb9u1
  • M
Information Exposure

<67.0.3396.87-1~deb9u1
  • H
Out-of-bounds Write

<66.0.3359.117-1~deb9u1
  • M
Cross-site Scripting (XSS)

<66.0.3359.117-1~deb9u1
  • M
Out-of-bounds Read

<66.0.3359.117-1~deb9u1
  • M
Information Exposure

<66.0.3359.117-1~deb9u1
  • L
Information Exposure

<64.0.3282.119-1~deb9u1
  • M
Information Exposure

<66.0.3359.117-1~deb9u1
  • H
Use After Free

<63.0.3239.84-1~deb9u1
  • H
Out-of-bounds Write

<67.0.3396.87-1~deb9u1
  • C
Incorrect Permission Assignment for Critical Resource

<54.0.2840.101-1
  • H
Out-of-Bounds

<63.0.3239.84-1~deb9u1
  • M
Information Exposure

<67.0.3396.87-1~deb9u1
  • M
Out-of-Bounds

<63.0.3239.84-1~deb9u1
  • H
Incorrect Permission Assignment for Critical Resource

<66.0.3359.117-1~deb9u1
  • M
Out-of-Bounds

<62.0.3202.75-1~deb9u1
  • M
Improper Data Handling

<66.0.3359.117-1~deb9u1
  • H
Out-of-bounds Write

<66.0.3359.117-1~deb9u1
  • H
Out-of-bounds Write

<67.0.3396.87-1~deb9u1
  • H
CVE-2018-6083

<66.0.3359.117-1~deb9u1
  • M
Out-of-Bounds

<63.0.3239.84-1~deb9u1
  • M
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • H
Improper Input Validation

<66.0.3359.117-1~deb9u1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<67.0.3396.87-1~deb9u1
  • M
Cross-site Scripting (XSS)

<63.0.3239.84-1~deb9u1
  • H
Use After Free

<66.0.3359.117-1~deb9u1
  • H
Out-of-bounds Write

<67.0.3396.87-1~deb9u1
  • M
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • M
CVE-2018-6104

<66.0.3359.117-1~deb9u1
  • H
Out-of-bounds Write

<66.0.3359.117-1~deb9u1
  • M
Cryptographic Issues

<63.0.3239.84-1~deb9u1
  • M
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • M
Cross-site Scripting (XSS)

<64.0.3282.119-1~deb9u1
  • M
Out-of-bounds Read

<67.0.3396.87-1~deb9u1
  • H
Out-of-Bounds

<63.0.3239.84-1~deb9u1
  • M
Improper Data Handling

<67.0.3396.87-1~deb9u1
  • M
Cross-site Scripting (XSS)

<67.0.3396.87-1~deb9u1
  • M
Improper Input Validation

<64.0.3282.119-1~deb9u1
  • M
Information Exposure

<68.0.3440.75-1~deb9u1
  • H
Out-of-Bounds

<60.0.3112.78-1~deb9u1
  • L
Out-of-bounds Write

<62.0.3202.75-1
  • M
Improper Input Validation

<62.0.3202.75-1~deb9u1
  • M
Use After Free

<62.0.3202.75-1~deb9u1
  • H
Use After Free

<62.0.3202.75-1~deb9u1
  • H
Out-of-bounds Write

<62.0.3202.75-1~deb9u1
  • H
Out-of-bounds Read

<62.0.3202.75-1~deb9u1
  • H
Exposure of Resource to Wrong Sphere

<62.0.3202.75-1~deb9u1
  • M
CVE-2017-15391

<62.0.3202.75-1~deb9u1
  • H
Use After Free

<62.0.3202.75-1~deb9u1
  • H
Out-of-Bounds

<62.0.3202.75-1~deb9u1
  • H
Use After Free

<62.0.3202.75-1~deb9u1
  • M
Improper Input Validation

<62.0.3202.75-1~deb9u1
  • M
Cross-site Scripting (XSS)

<62.0.3202.75-1~deb9u1
  • H
Out-of-Bounds

<62.0.3202.75-1~deb9u1
  • M
Improper Input Validation

<62.0.3202.75-1~deb9u1
  • H
Out-of-Bounds

<62.0.3202.75-1~deb9u1
  • M
Improper Input Validation

<62.0.3202.75-1~deb9u1
  • H
CVE-2017-15387

<62.0.3202.75-1~deb9u1
  • H
Integer Overflow or Wraparound

<62.0.3202.75-1~deb9u1
  • M
Improper Input Validation

<62.0.3202.75-1~deb9u1
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • H
Out-of-Bounds

<44.0.2403.89-1
  • M
Information Exposure

<60.0.3112.78-1~deb9u1
  • H
Use After Free

<59.0.3071.86-1
  • H
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • H
Out-of-bounds Read

<58.0.3029.81-1
  • H
Out-of-Bounds

<61.0.3163.100-1~deb9u1
  • H
Use After Free

<59.0.3071.86-1
  • H
Out-of-bounds Read

<57.0.2987.133-1
  • M
Improper Input Validation

<58.0.3029.81-1
  • H
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • M
Cross-site Scripting (XSS)

<59.0.3071.86-1
  • M
Information Exposure

<61.0.3163.100-1~deb9u1
  • H
Use After Free

<58.0.3029.81-1
  • H
Use After Free

<61.0.3163.100-1~deb9u1
  • L
Improper Input Validation

<59.0.3071.86-1
  • M
Improper Input Validation

<59.0.3071.86-1
  • M
Information Exposure

<60.0.3112.78-1~deb9u1
  • H
Use After Free

<60.0.3112.78-1~deb9u1
  • M
Improper Input Validation

<58.0.3029.81-1
  • H
Use After Free

<60.0.3112.78-1~deb9u1
  • M
Cross-site Scripting (XSS)

<58.0.3029.81-1
  • H
Out-of-Bounds

<60.0.3112.78-1~deb9u1
  • M
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • M
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • M
Out-of-Bounds

<61.0.3163.100-1~deb9u1
  • M
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • H
Out-of-Bounds

<61.0.3163.100-1~deb9u1
  • M
CVE-2017-5120

<61.0.3163.100-1~deb9u1
  • M
Incorrect Permission Assignment for Critical Resource

<61.0.3163.100-1~deb9u1
  • H
Incorrect Type Conversion or Cast

<61.0.3163.100-1~deb9u1
  • H
Incorrect Type Conversion or Cast

<59.0.3071.86-1
  • H
Race Condition

<58.0.3029.96-1
  • H
Out-of-Bounds

<57.0.2987.133-1
  • H
Improper Input Validation

<61.0.3163.100-1~deb9u1
  • H
Out-of-Bounds

<61.0.3163.100-1~deb9u1
  • M
Information Exposure

<59.0.3071.86-1
  • H
Incorrect Type Conversion or Cast

<61.0.3163.100-1~deb9u1
  • H
Out-of-bounds Read

<57.0.2987.133-1
  • M
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • H
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • M
Improper Input Validation

<58.0.3029.81-1
  • H
Out-of-Bounds

<61.0.3163.100-1~deb9u1
  • M
Information Exposure

<59.0.3071.86-1
  • M
Improper Input Validation

<58.0.3029.81-1
  • H
Improper Input Validation

<59.0.3071.86-1
  • M
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • M
Improper Input Validation

<59.0.3071.86-1
  • H
Use After Free

<58.0.3029.81-1
  • H
Out-of-Bounds

<57.0.2987.133-1
  • H
Use After Free

<60.0.3112.78-1~deb9u1
  • H
Use After Free

<60.0.3112.78-1~deb9u1
  • M
Improper Input Validation

<59.0.3071.86-1
  • M
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • H
Incorrect Type Conversion or Cast

<60.0.3112.78-1~deb9u1
  • M
Improper Input Validation

<59.0.3071.86-1
  • H
Use After Free

<59.0.3071.86-1
  • M
Race Condition

<58.0.3029.81-1
  • M
Improper Input Validation

<59.0.3071.86-1
  • M
Improper Input Validation

<59.0.3071.86-1
  • M
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • M
Information Exposure

<60.0.3112.78-1~deb9u1
  • H
Out-of-Bounds

<58.0.3029.81-1
  • H
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • L
Improper Privilege Management

<59.0.3071.86-1
  • H
Out-of-bounds Read

<58.0.3029.81-1
  • M
Improper Input Validation

<60.0.3112.78-1~deb9u1
  • H
Incorrect Type Conversion or Cast

<58.0.3029.81-1
  • C
Out-of-bounds Read

<57.0.2987.133-1
  • M
Incorrect Type Conversion or Cast

<60.0.3112.78-1~deb9u1
  • H
CVE-2017-5078

<59.0.3071.86-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • C
Improper Input Validation

<53.0.2785.143-1
  • H
Use After Free

<53.0.2785.143-1
  • H
Integer Overflow or Wraparound

<57.0.2987.98-1
  • H
Integer Overflow or Wraparound

<57.0.2987.98-1
  • H
Integer Overflow or Wraparound

<57.0.2987.98-1
  • H
Integer Overflow or Wraparound

<57.0.2987.98-1
  • H
Integer Overflow or Wraparound

<57.0.2987.98-1
  • M
Improper Input Validation

<57.0.2987.98-1
  • M
Cross-site Scripting (XSS)

<57.0.2987.98-1
  • M
Use After Free

<57.0.2987.98-1
  • H
Use After Free

<57.0.2987.98-1
  • M
Information Exposure

<57.0.2987.98-1
  • H
Use After Free

<57.0.2987.98-1
  • H
Out-of-bounds Write

<57.0.2987.98-1
  • M
Information Exposure

<57.0.2987.98-1
  • H
Out-of-bounds Write

<57.0.2987.98-1
  • H
Out-of-Bounds

<57.0.2987.98-1
  • H
Use After Free

<57.0.2987.98-1
  • M
Missing Encryption of Sensitive Data

<57.0.2987.98-1
  • H
Use After Free

<57.0.2987.98-1
  • H
Use After Free

<57.0.2987.98-1
  • M
Out-of-Bounds

<57.0.2987.98-1
  • H
Race Condition

<57.0.2987.98-1
  • H
Integer Overflow or Wraparound

<57.0.2987.98-1
  • M
Improper Preservation of Permissions

<57.0.2987.98-1
  • H
Origin Validation Error

<50.0.2661.94-1
  • M
NULL Pointer Dereference

<56.0.2924.76-3
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-3
  • H
Out-of-Bounds

<56.0.2924.76-3
  • M
Use After Free

<56.0.2924.76-3
  • M
CVE-2017-5022

<56.0.2924.76-3
  • M
Improper Restriction of Rendered UI Layers or Frames

<56.0.2924.76-3
  • M
CVE-2017-5015

<56.0.2924.76-3
  • M
CVE-2017-5013

<56.0.2924.76-3
  • M
Out-of-Bounds

<44.0.2403.157-1
  • M
Information Exposure

<56.0.2924.76-3
  • M
Improper Restriction of Rendered UI Layers or Frames

<56.0.2924.76-3
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-3
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-3
  • M
Use After Free

<56.0.2924.76-3
  • M
CVE-2017-5027

<56.0.2924.76-3
  • H
Out-of-Bounds

<56.0.2924.76-3
  • M
Out-of-Bounds

<44.0.2403.157-1
  • M
Information Exposure

<56.0.2924.76-3
  • M
Out-of-Bounds

<56.0.2924.76-3
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-3
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-3
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-3
  • M
Use After Free

<55.0.2883.75-1
  • M
Information Exposure

<55.0.2883.75-1
  • H
Out-of-Bounds

<54.0.2840.101-1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1
  • M
Improper Input Validation

<55.0.2883.75-1
  • H
Use After Free

<55.0.2883.75-1
  • M
Improper Data Handling

<55.0.2883.75-1
  • M
Use After Free

<55.0.2883.75-1
  • H
Improper Access Control

<55.0.2883.75-1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1
  • M
Improper Input Validation

<55.0.2883.75-1
  • M
Improper Data Handling

<55.0.2883.75-1
  • H
Out-of-bounds Write

<55.0.2883.75-1
  • M
Numeric Errors

<55.0.2883.75-1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1
  • M
Use After Free

<55.0.2883.75-1
  • M
Information Exposure

<54.0.2840.101-1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1
  • M
Integer Overflow or Wraparound

<55.0.2883.75-1
  • H
Use After Free

<55.0.2883.75-1
  • M
Improper Data Handling

<55.0.2883.75-1
  • H
Out-of-bounds Read

<54.0.2840.101-1
  • M
Information Exposure

<55.0.2883.75-1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1
  • M
Improper Access Control

<55.0.2883.75-1
  • H
Out-of-Bounds

<44.0.2403.157-1
  • H
Use After Free

<55.0.2883.75-1
  • M
Integer Overflow or Wraparound

<55.0.2883.75-1
  • H
Out-of-bounds Write

<55.0.2883.75-1
  • M
Improper Input Validation

<54.0.2840.101-1
  • M
Improper Input Validation

<54.0.2840.101-1
  • M
Improper Access Control

<54.0.2840.101-1
  • M
Improper Input Validation

<54.0.2840.101-1
  • M
Improper Access Control

<54.0.2840.101-1
  • H
Use After Free

<54.0.2840.101-1
  • H
Use After Free

<54.0.2840.101-1
  • H
Use After Free

<54.0.2840.101-1
  • H
Out-of-Bounds

<54.0.2840.101-1
  • M
Cross-site Scripting (XSS)

<54.0.2840.101-1
  • M
Cross-site Scripting (XSS)

<54.0.2840.101-1
  • M
Out-of-bounds Read

<54.0.2840.101-1
  • M
Use After Free

<54.0.2840.101-1
  • M
Improper Access Control

<53.0.2785.113-1
  • H
CVE-2016-5175

<53.0.2785.113-1
  • M
Improper Input Validation

<53.0.2785.113-1
  • H
Use After Free

<53.0.2785.113-1
  • H
CVE-2016-7549

<53.0.2785.113-1
  • H
Use After Free

<53.0.2785.113-1
  • M
Information Exposure

<53.0.2785.113-1
  • H
Improper Access Control

<53.0.2785.113-1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1
  • H
Improper Data Handling

<53.0.2785.89-1
  • H
Integer Overflow or Wraparound

<53.0.2785.89-1
  • M
Security Features

<53.0.2785.89-1
  • H
Use After Free

<53.0.2785.89-1
  • H
Use After Free

<53.0.2785.89-1
  • H
Arbitrary Code Injection

<53.0.2785.89-1
  • H
Integer Overflow or Wraparound

<53.0.2785.89-1
  • M
Security Features

<53.0.2785.89-1
  • M
Security Features

<53.0.2785.89-1
  • H
Out-of-Bounds

<53.0.2785.89-1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1
  • H
Use After Free

<53.0.2785.89-1
  • H
Integer Overflow or Wraparound

<53.0.2785.89-1
  • H
Improper Data Handling

<53.0.2785.92-1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1
  • H
CVE-2016-5167

<53.0.2785.89-1
  • L
Information Exposure

<53.0.2785.89-1
  • H
Out-of-Bounds

<53.0.2785.89-1
  • H
Incorrect Type Conversion or Cast

<53.0.2785.89-1
  • M
Security Features

<53.0.2785.89-1
  • H
Security Features

<52.0.2743.116-1
  • C
Access Restriction Bypass

<52.0.2743.116-1
  • C
Use After Free

<52.0.2743.116-1
  • C
CVE-2016-5146

<52.0.2743.116-1
  • H
Out-of-Bounds

<52.0.2743.116-1
  • H
Improper Input Validation

<52.0.2743.116-1
  • C
Improper Access Control

<52.0.2743.116-1
  • C
Out-of-Bounds

<52.0.2743.116-1
  • H
CVE-2016-1705

<52.0.2743.82-1
  • H
Out-of-Bounds

<52.0.2743.82-1
  • H
Security Features

<52.0.2743.82-1
  • H
Security Features

<52.0.2743.82-1
  • H
Use After Free

<52.0.2743.82-1
  • M
Improper Access Control

<52.0.2743.82-1
  • H
Use After Free

<52.0.2743.82-1
  • M
Information Exposure

<52.0.2743.82-1
  • H
Information Exposure

<52.0.2743.82-1
  • M
Improper Input Validation

<52.0.2743.82-1
  • C
Improper Input Validation

<52.0.2743.82-1
  • H
Improper Authorization

<52.0.2743.82-1
  • H
Use After Free

<52.0.2743.82-1
  • H
Improper Authorization

<52.0.2743.82-1
  • H
Out-of-Bounds

<52.0.2743.82-1
  • H
Use After Free

<52.0.2743.82-1
  • M
Improper Authentication

<52.0.2743.82-1
  • H
CVE-2016-1704

<52.0.2743.82-1
  • H
Out-of-Bounds

<51.0.2704.63-1
  • M
Information Exposure

<51.0.2704.63-1
  • H
CVE-2016-1690

<51.0.2704.63-1
  • H
CVE-2016-1674

<51.0.2704.63-1
  • H
CVE-2016-1684

<51.0.2704.63-1
  • H
Out-of-Bounds

<51.0.2704.63-1
  • H
Improper Access Control

<51.0.2704.79-1
  • M
Improper Access Control

<51.0.2704.63-1
  • H
CVE-2016-1679

<51.0.2704.63-1
  • M
Improper Access Control

<51.0.2704.63-1
  • M
Out-of-Bounds

<51.0.2704.79-1
  • H
CVE-2016-1700

<51.0.2704.79-1
  • M
Improper Access Control

<51.0.2704.79-1
  • M
Out-of-Bounds

<51.0.2704.63-1
  • H
Out-of-Bounds

<51.0.2704.63-1
  • H
CVE-2016-1703

<51.0.2704.79-1
  • H
Security Features

<51.0.2704.63-1
  • M
Out-of-Bounds

<51.0.2704.63-1
  • M
Out-of-Bounds

<51.0.2704.63-1
  • H
Out-of-Bounds

<51.0.2704.63-1
  • H
CVE-2016-1695

<51.0.2704.63-1
  • M
Out-of-Bounds

<51.0.2704.63-1
  • M
Improper Access Control

<51.0.2704.63-1
  • M
Information Exposure

<51.0.2704.63-1
  • H
Out-of-Bounds

<51.0.2704.63-1
  • H
CVE-2016-1701

<51.0.2704.79-1
  • H
CVE-2016-1673

<51.0.2704.63-1
  • M
Information Exposure

<51.0.2704.79-1
  • H
Security Features

<51.0.2704.79-1
  • H
Improper Access Control

<51.0.2704.63-1
  • H
Improper Access Control

<51.0.2704.63-1
  • M
Security Features

<51.0.2704.63-1
  • H
Improper Input Validation

<50.0.2661.94-1
  • H
CVE-2016-1663

<50.0.2661.94-1
  • H
Improper Access Control

<51.0.2704.63-1
  • C
CVE-2016-1662

<50.0.2661.94-1
  • C
CVE-2016-1666

<50.0.2661.94-1
  • H
Out-of-Bounds

<51.0.2704.63-1
  • H
Improper Access Control

<51.0.2704.63-1
  • M
Race Condition

<51.0.2704.63-1
  • M
Improper Input Validation

<50.0.2661.94-1
  • M
Security Features

<50.0.2661.94-1
  • H
Improper Input Validation

<50.0.2661.94-1
  • M
Improper Input Validation

<50.0.2661.75-1
  • H
Out-of-Bounds

<50.0.2661.75-1
  • M
Information Exposure

<50.0.2661.75-1
  • M
Cross-site Scripting (XSS)

<50.0.2661.75-1
  • C
CVE-2016-1659

<50.0.2661.75-1
  • H
CVE-2016-1655

<50.0.2661.75-1
  • H
Information Exposure

<50.0.2661.75-1
  • M
Security Features

<50.0.2661.75-1
  • H
Out-of-Bounds

<49.0.2623.108-1
  • H
CVE-2016-1648

<49.0.2623.108-1
  • H
CVE-2016-1647

<49.0.2623.108-1
  • H
CVE-2016-1650

<49.0.2623.108-1
  • H
Out-of-Bounds

<49.0.2623.108-1
  • H
Out-of-Bounds

<49.0.2623.87-1
  • H
CVE-2016-1644

<49.0.2623.87-1
  • H
Time and State

<49.0.2623.87-1
  • C
CVE-2016-1633

<49.0.2623.75-1
  • H
Improper Input Validation

<49.0.2623.75-1
  • H
Access Restriction Bypass

<49.0.2623.75-1
  • M
Improper Access Control

<49.0.2623.75-1
  • M
Information Exposure

<49.0.2623.75-1
  • M
Code

<49.0.2623.75-1
  • C
CVE-2016-1642

<49.0.2623.75-1
  • H
CVE-2016-1641

<49.0.2623.75-1
  • C
Access Restriction Bypass

<49.0.2623.75-1
  • H
Access Restriction Bypass

<49.0.2623.75-1
  • C
CVE-2016-1639

<49.0.2623.75-1
  • C
CVE-2016-1635

<49.0.2623.75-1
  • C
CVE-2016-2843

<49.0.2623.75-1
  • M
Information Exposure

<49.0.2623.75-1
  • H
CVE-2016-1634

<49.0.2623.75-1
  • H
Access Restriction Bypass

<49.0.2623.75-1
  • C
Access Restriction Bypass

<48.0.2564.116-1
  • M
Out-of-Bounds

<48.0.2564.116-1
  • M
Out-of-Bounds

<48.0.2564.116-1
  • M
Access Restriction Bypass

<48.0.2564.116-1
  • H
Out-of-Bounds

<48.0.2564.116-1
  • H
Access Restriction Bypass

<48.0.2564.116-1
  • H
Access Restriction Bypass

<48.0.2564.116-1
  • H
Access Restriction Bypass

<48.0.2564.116-1
  • H
Out-of-Bounds

<48.0.2564.82-1
  • H
CVE-2016-2052

<48.0.2564.82-1
  • M
Security Features

<48.0.2564.82-1
  • H
Improper Input Validation

<48.0.2564.82-1
  • H
CVE-2016-1620

<48.0.2564.82-1
  • M
Security Features

<48.0.2564.82-1
  • H
CVE-2016-1613

<48.0.2564.82-1
  • M
Information Exposure

<48.0.2564.82-1
  • M
Cryptographic Issues

<48.0.2564.82-1
  • M
Information Exposure

<48.0.2564.82-1
  • C
CVE-2015-6792

<47.0.2526.111-1
  • H
Numeric Errors

<47.0.2526.111-1
  • H
Race Condition

<47.0.2526.80-1
  • C
CVE-2015-6791

<47.0.2526.80-1
  • C
CVE-2015-6788

<47.0.2526.80-1
  • C
CVE-2015-8548

<47.0.2526.80-1
  • M
Improper Input Validation

<47.0.2526.80-1
  • H
CVE-2015-6775

<47.0.2526.73-1
  • M
Access Restriction Bypass

<47.0.2526.73-1
  • H
Access Restriction Bypass

<47.0.2526.73-1
  • H
Out-of-Bounds

<47.0.2526.73-1
  • M
Access Restriction Bypass

<47.0.2526.73-1
  • H
Access Restriction Bypass

<47.0.2526.73-1
  • C
CVE-2015-6765

<47.0.2526.73-1
  • C
CVE-2015-6787

<47.0.2526.73-1
  • C
Out-of-Bounds

<47.0.2526.73-1
  • M
Improper Input Validation

<47.0.2526.73-1
  • M
CVE-2015-6780

<47.0.2526.73-1
  • H
CVE-2015-6774

<47.0.2526.73-1
  • H
Numeric Errors

<47.0.2526.73-1
  • H
Out-of-Bounds

<47.0.2526.73-1
  • H
Access Restriction Bypass

<47.0.2526.73-1
  • M
Access Restriction Bypass

<47.0.2526.73-1
  • H
CVE-2015-8478

<47.0.2526-73-1
  • H
Access Restriction Bypass

<47.0.2526.73-1
  • H
Out-of-Bounds

<47.0.2526.73-1
  • H
CVE-2015-6766

<47.0.2526.73-1
  • H
CVE-2015-6777

<47.0.2526.73-1
  • H
Out-of-Bounds

<47.0.2526.73-1
  • H
CVE-2015-6767

<47.0.2526.73-1
  • M
Improper Input Validation

<47.0.2526.73-1
  • M
Out-of-Bounds

<47.0.2526.73-1
  • C
Out-of-Bounds

<47.0.2526.73-1
  • H
Buffer Overflow

<49.0.2623.75-1
  • H
Improper Input Validation

<47.0.2526.73-1
  • H
CVE-2015-6757

<46.0.2490.71-1
  • M
CVE-2015-6756

<46.0.2490.71-1
  • M
Code

<46.0.2490.71-1
  • H
CVE-2015-6763

<46.0.2490.71-1
  • M
Race Condition

<44.0.2403.157-1
  • H
Security Features

<46.0.2490.71-1
  • H
Code

<46.0.2490.71-1
  • H
CVE-2015-7834

<46.0.2490.71-1
  • M
Information Exposure

<46.0.2490.71-1
  • H
Access Restriction Bypass

<46.0.2490.71-1
  • H
Improper Access Control

<45.0.2454.101-1
  • H
Improper Input Validation

<45.0.2454.101-1
  • L
CVE-2015-1294

<45.0.2454.85-1
  • L
CVE-2015-1295

<45.0.2454.85-1
  • L
Access Restriction Bypass

<45.0.2454.85-1
  • M
Security Features

<45.0.2454.85-1
  • L
Access Restriction Bypass

<45.0.2454.85-1
  • L
Security Features

<45.0.2454.85-1
  • L
Security Features

<45.0.2454.85-1
  • H
CVE-2015-6581

<45.0.2454.85-1
  • M
Security Features

<45.0.2454.85-1
  • L
Access Restriction Bypass

<45.0.2454.85-1
  • L
CVE-2015-1301

<45.0.2454.85-1
  • H
CVE-2015-6580

<45.0.2454.85-1
  • L
Security Features

<45.0.2454.85-1
  • L
CVE-2015-1299

<45.0.2454.85-1
  • L
Security Features

<45.0.2454.85-1
  • M
Improper Data Handling

<44.0.2403.89-1
  • H
Out-of-Bounds

<44.0.2403.89-1
  • M
CVE-2015-1282

<44.0.2403.89-1
  • H
CVE-2015-1277

<44.0.2403.89-1
  • M
Out-of-Bounds

<44.0.2403.89-1
  • M
Security Features

<44.0.2403.89-1
  • H
CVE-2015-1289

<44.0.2403.89-1
  • M
Code

<44.0.2403.89-1
  • M
Security Features

<44.0.2403.89-1
  • M
Numeric Errors

<44.0.2403.89-1
  • H
Improper Input Validation

<44.0.2403.89-1
  • M
Security Features

<44.0.2403.89-1
  • M
Cross-site Scripting (XSS)

<44.0.2403.89-1
  • M
Out-of-Bounds

<44.0.2403.89-1
  • M
Code

<44.0.2403.89-1
  • M
Information Exposure

<44.0.2403.89-1
  • H
CVE-2015-1272

<44.0.2403.89-1
  • C
CVE-2015-1276

<44.0.2403.89-1
  • H
Numeric Errors

<44.0.2403.89-1
  • M
Security Features

<43.0.2357.130-1
  • M
Security Features

<43.0.2357.130-1
  • M
Security Features

<43.0.2357.130-1
  • M
Security Features

<43.0.2357.130-1
  • H
Out-of-Bounds

<42.0.2311.135-1
  • H
Numeric Errors

<42.0.2311.135-1
  • H
Out-of-Bounds

<43.0.2357.65-1
  • H
Code

<43.0.2357.65-1
  • H
CVE-2015-1260

<43.0.2357.65-1
  • H
Out-of-Bounds

<43.0.2357.65-1
  • H
Code

<43.0.2357.65-1
  • M
Improper Input Validation

<43.0.2357.65-1
  • H
CVE-2015-1256

<43.0.2357.65-1
  • H
CVE-2015-1265

<43.0.2357.65-1
  • H
Numeric Errors

<43.0.2357.65-1
  • M
Code

<43.0.2357.65-1
  • M
Cross-site Scripting (XSS)

<43.0.2357.65-1
  • M
Access Restriction Bypass

<43.0.2357.65-1
  • M
CVE-2015-1251

<43.0.2357.65-1
  • H
CVE-2015-3910

<43.0.2357.65-1
  • M
CVE-2015-1255

<43.0.2357.65-1
  • H
Improper Access Control

<43.0.2357.65-1
  • H
CVE-2015-1243

<42.0.2311.135-1
  • H
CVE-2015-1250

<42.0.2311.135-1
  • M
Information Exposure

<42.0.2311.90-1
  • M
Improper Input Validation

<42.0.2311.90-1
  • H
CVE-2015-1237

<42.0.2311.90-1
  • M
Access Restriction Bypass

<42.0.2311.90-1
  • M
Out-of-Bounds

<42.0.2311.90-1
  • M
Code

<42.0.2311.90-1
  • H
CVE-2015-1249

<42.0.2311.90-1
  • M
Out-of-Bounds

<42.0.2311.90-1
  • H
CVE-2015-3333

<42.0.2311.90-1
  • H
CVE-2015-1242

<42.0.2311.90-1
  • M
Access Restriction Bypass

<42.0.2311.90-1
  • H
Out-of-Bounds

<42.0.2311.90-1
  • M
Access Restriction Bypass

<42.0.2311.90-1
  • M
Information Exposure

<42.0.2311.90-1
  • M
CVE-2015-1245

<42.0.2311.90-1
  • M
Access Restriction Bypass

<42.0.2311.90-1
  • M
Race Condition

<41.0.2272.118-1
  • H
Code

<41.0.2272.118-1
  • H
CVE-2015-2238

<41.0.2272.76-1
  • M
Out-of-Bounds

<41.0.2272.76-1
  • M
Code

<41.0.2272.76-1
  • M
Access Restriction Bypass

<41.0.2272.76-1
  • M
Improper Data Handling

<41.0.2272.76-1
  • H
Resource Management Errors

<41.0.2272.76-1
  • H
CVE-2015-1216

<41.0.2272.76-1
  • H
CVE-2015-1230

<41.0.2272.76-1
  • H
Integer Overflow or Wraparound

<41.0.2272.76-1
  • H
CVE-2015-1218

<41.0.2272.76-1
  • M
CVE-2015-1220

<41.0.2272.76-1
  • H
Out-of-Bounds

<41.0.2272.76-1
  • H
CVE-2015-1231

<41.0.2272.76-1
  • H
Out-of-Bounds

<41.0.2272.76-1
  • M
Access Restriction Bypass

<41.0.2272.76-1
  • H
Out-of-Bounds

<41.0.2272.76-1
  • H
CVE-2015-1221

<41.0.2272.76-1
  • H
Numeric Errors

<41.0.2272.76-1
  • M
Improper Data Handling

<41.0.2272.76-1
  • H
Code

<41.0.2272.76-1
  • H
CVE-2015-1222

<41.0.2272.76-1
  • H
CVE-2015-1223

<41.0.2272.76-1
  • M
Access Restriction Bypass

<41.0.2272.76-1
  • H
Resource Management Errors

<41.0.2272.76-1
  • H
CVE-2015-1211

<40.0.2214.111-1
  • H
CVE-2015-1212

<40.0.2214.111-1
  • H
Use After Free

<40.0.2214.111-1
  • M
CVE-2015-1210

<40.0.2214.111-1
  • M
Code

<40.0.2214.91-1
  • M
Numeric Errors

<40.0.2214.91-1
  • H
Out-of-Bounds

<40.0.2214.91-1
  • M
CVE-2014-9647

<40.0.2214.91-1
  • H
CVE-2014-7933

<40.0.2214.91-1
  • H
Code

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
CVE-2014-7932

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
CVE-2015-1205

<40.0.2214.91-1
  • H
Out-of-Bounds

<40.0.2214.91-1
  • H
Code

<40.0.2214.91-1
  • H
Numeric Errors

<40.0.2214.91-1
  • H
CVE-2014-7925

<40.0.2214.91-1
  • H
CVE-2014-7934

<40.0.2214.91-1
  • M
Cryptographic Issues

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
CVE-2014-7930

<40.0.2214.91-1
  • H
Improper Data Handling

<40.0.2214.91-1
  • M
CVE-2014-7924

<40.0.2214.91-1
  • H
CVE-2015-1346

<40.0.2214.91-1
  • H
CVE-2014-7935

<40.0.2214.91-1
  • M
CVE-2014-7936

<40.0.2214.91-1
  • H
Code

<40.0.2214.91-1
  • H
Resource Management Errors

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
Resource Management Errors

<40.0.2214.91-1
  • H
Out-of-Bounds

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
Code

<40.0.2214.91-1
  • M
Access Restriction Bypass

<40.0.2214.91-1
  • H
Numeric Errors

<11.0.696.65~r84435-1
  • H
CVE-2011-1796

<11.0.696.65~r84435-1
  • H
Numeric Errors

<11.0.696.65~r84435-1
  • H
Improper Input Validation

<11.0.696.65~r84435-1
  • H
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<39.0.2171.71-1
  • H
Numeric Errors

<39.0.2171.71-1
  • H
Numeric Errors

<39.0.2171.71-1
  • H
Code

<39.0.2171.71-1
  • H
Out-of-Bounds

<39.0.2171.71-1
  • M
Improper Access Control

<39.0.2171.71-1
  • H
Resource Management Errors

<39.0.2171.71-1
  • H
Resource Management Errors

<39.0.2171.71-1
  • M
Numeric Errors

<39.0.2171.71-1
  • H
Out-of-Bounds

<39.0.2171.71-1
  • H
Resource Management Errors

<39.0.2171.71-1
  • H
CVE-2014-7910

<39.0.2171.71-1
  • L
Cryptographic Issues

<39.0.2171.71-1
  • M
Out-of-Bounds

<39.0.2171.71-1
  • M
Resource Management Errors

<38.0.2125.101-1
  • M
Out-of-Bounds

<38.0.2125.101-1
  • M
Resource Management Errors

<38.0.2125.101-1
  • H
CVE-2014-7967

<38.0.2125.101-1
  • H
Use After Free

<38.0.2125.101-1
  • C
Arbitrary Code Injection

<38.0.2125.101-1
  • H
Use After Free

<38.0.2125.101-1
  • H
Use After Free

<38.0.2125.101-1
  • H
CVE-2014-3200

<38.0.2125.101-1
  • H
Use After Free

<38.0.2125.101-1
  • M
Access Restriction Bypass

<38.0.2125.101-1
  • H
Access Restriction Bypass

<38.0.2125.101-1
  • H
Use After Free

<38.0.2125.101-1
  • H
CVE-2014-3179

<37.0.2062.120-1
  • H
CVE-2014-3178

<37.0.2062.120-1
  • M
Access Restriction Bypass

<37.0.2062.120-1
  • C
Arbitrary Code Injection

<37.0.2062.120-1
  • H
CVE-2014-3168

<37.0.2062.120-1
  • C
Arbitrary Code Injection

<37.0.2062.120-1
  • H
CVE-2014-3171

<37.0.2062.120-1
  • M
Out-of-Bounds

<37.0.2062.120-1
  • C
CVE-2014-3175

<37.0.2062.120-1
  • M
Access Restriction Bypass

<37.0.2062.120-1
  • M
Out-of-Bounds

<37.0.2062.120-1
  • H
CVE-2014-3169

<37.0.2062.120-1
  • H
CVE-2014-3167

<37.0.2062.120-1
  • H
CVE-2014-3165

<37.0.2062.120-1
  • M
Information Exposure

<37.0.2062.120-1
  • M
Access Restriction Bypass

<37.0.2062.120-1
  • M
CVE-2014-3162

<37.0.2062.120-1
  • H
Out-of-Bounds

<35.0.1916.153-1
  • M
CVE-2014-3155

<35.0.1916.153-1
  • H
CVE-2014-3154

<35.0.1916.153-1
  • H
Out-of-Bounds

<35.0.1916.153-1
  • H
CVE-2014-1749

<35.0.1916.114-1
  • H
Resource Management Errors

<35.0.1916.114-1
  • H
Numeric Errors

<35.0.1916.114-1
  • M
CVE-2014-1748

<35.0.1916.114-1
  • H
Resource Management Errors

<35.0.1916.114-1
  • M
Out-of-Bounds

<35.0.1916.114-1
  • H
Numeric Errors

<35.0.1916.114-1
  • M
Information Exposure

<35.0.1916.114-1
  • M
Cross-site Scripting (XSS)

<35.0.1916.114-1
  • H
Resource Management Errors

<34.0.1847.137-1
  • H
Resource Management Errors

<34.0.1847.137-1
  • H
Numeric Errors

<34.0.1847.137-1
  • H
Numeric Errors

<34.0.1847.132-1
  • H
Improper Input Validation

<34.0.1847.132-1
  • H
Access Restriction Bypass

<34.0.1847.132-1
  • H
Improper Input Validation

<34.0.1847.132-1
  • H
CVE-2014-1734

<34.0.1847.132-1
  • H
Resource Management Errors

<34.0.1847.132-1
  • H
CVE-2014-1735

<34.0.1847.132-1
  • H
CVE-2014-1728

<34.0.1847.116-1
  • H
Resource Management Errors

<34.0.1847.116-1
  • H
Resource Management Errors

<34.0.1847.116-1
  • H
Resource Management Errors

<34.0.1847.116-1
  • H
Numeric Errors

<34.0.1847.116-1
  • H
Improper Input Validation

<34.0.1847.116-1
  • H
Resource Management Errors

<34.0.1847.116-1
  • H
Resource Management Errors

<34.0.1847.116-1
  • H
Numeric Errors

<34.0.1847.116-1
  • H
Numeric Errors

<34.0.1847.116-1
  • H
CVE-2014-1729

<34.0.1847.116-1
  • M
Improper Input Validation

<34.0.1847.116-1
  • M
CVE-2014-1726

<34.0.1847.116-1
  • H
Arbitrary Code Injection

<34.0.1847.116-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • C
CVE-2014-1704

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • H
Out-of-Bounds

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • M
Cross-site Scripting (XSS)

<33.0.1750.152-1
  • H
Directory Traversal

<33.0.1750.152-1
  • H
CVE-2013-6667

<33.0.1750.152-1
  • M
Access Restriction Bypass

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • H
Out-of-Bounds

<33.0.1750.152-1
  • H
CVE-2013-6668

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • M
Information Exposure

<33.0.1750.152-1
  • M
Access Restriction Bypass

<33.0.1750.152-1
  • M
Cryptographic Issues

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • H
CVE-2013-6661

<33.0.1750.152-1
  • H
Improper Input Validation

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • H
Resource Management Errors

<33.0.1750.152-1
  • M
Access Restriction Bypass

<33.0.1750.152-1
  • L
Cross-site Request Forgery (CSRF)

<31.0.1650.57-1
  • C
CVE-2014-1681

<31.0.1650.63-1
  • H
Resource Management Errors

<32.0.1700.123-1
  • H
Improper Input Validation

<32.0.1700.123-1
  • H
Use After Free

<32.0.1700.123-1
  • H
Use After Free

<32.0.1700.123-1
  • M
Use After Free

<32.0.1700.123-1
  • H
Use After Free

<32.0.1700.123-1
  • H
Improper Authentication

<32.0.1700.123-1
  • H
CVE-2013-6637

<31.0.1650.63-1
  • H
Out-of-Bounds

<31.0.1650.63-1
  • M
Improper Input Validation

<31.0.1650.63-1
  • M
Resource Management Errors

<31.0.1650.63-1
  • H
Out-of-Bounds

<31.0.1650.63-1
  • H
Out-of-Bounds

<31.0.1650.63-1
  • M
Improper Authentication

<31.0.1650.63-1
  • M
Numeric Errors

<31.0.1650.57-1
  • H
CVE-2013-6631

<31.0.1650.57-1
  • M
Information Exposure

<31.0.1650.57-1
  • M
Access Restriction Bypass

<31.0.1650.57-1
  • H
Numeric Errors

<31.0.1650.57-1
  • M
Out-of-Bounds

<31.0.1650.57-1
  • H
Resource Management Errors

<31.0.1650.57-1
  • M
Out-of-Bounds

<31.0.1650.57-1
  • M
CVE-2013-6626

<31.0.1650.57-1
  • H
Resource Management Errors

<31.0.1650.57-1
  • M
CVE-2013-6628

<31.0.1650.57-1
  • M
Resource Management Errors

<31.0.1650.57-1
  • C
CVE-2013-2931

<31.0.1650.57-1
  • M
Resource Management Errors

<31.0.1650.57-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • H
CVE-2013-2928

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • M
Race Condition

<30.0.1599.101-1
  • H
CVE-2013-2923

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • H
Out-of-Bounds

<30.0.1599.101-1
  • H
Resource Management Errors

<30.0.1599.101-1
  • H
Resource Management Errors

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • M
Resource Management Errors

<30.0.1599.101-1
  • M
Out-of-Bounds

<30.0.1599.101-1
  • M
CVE-2013-2908

<30.0.1599.101-1
  • M
CVE-2013-2916

<30.0.1599.101-1
  • H
Resource Management Errors

<30.0.1599.101-1
  • M
Out-of-Bounds

<30.0.1599.101-1
  • H
Resource Management Errors

<30.0.1599.101-1
  • H
Resource Management Errors

<30.0.1599.101-1
  • M
Out-of-Bounds

<30.0.1599.101-1
  • M
CVE-2013-2915

<30.0.1599.101-1
  • H
Numeric Errors

<29.0.1547.57-1
  • M
Access Restriction Bypass

<29.0.1547.57-1
  • H
Directory Traversal

<29.0.1547.57-1
  • H
Resource Management Errors

<29.0.1547.57-1
  • H
CVE-2013-2887

<29.0.1547.57-1
  • H
Resource Management Errors

<29.0.1547.57-1
  • H
Resource Management Errors

<29.0.1547.57-1
  • H
CVE-2013-2882

<28.0.1500.95-1
  • H
Resource Management Errors

<28.0.1500.95-1
  • H
Resource Management Errors

<28.0.1500.95-1
  • H
Resource Management Errors

<28.0.1500.95-1
  • H
CVE-2013-2886

<28.0.1500.95-1
  • M
Access Restriction Bypass

<28.0.1500.95-1
  • M
CVE-2013-2868

<28.0.1500.71-1
  • M
Information Exposure

<28.0.1500.71-1
  • M
Out-of-Bounds

<28.0.1500.71-1
  • M
Out-of-Bounds

<28.0.1500.71-1
  • H
Improper Input Validation

<28.0.1500.71-1
  • M
Access Restriction Bypass

<28.0.1500.71-1
  • M
Out-of-Bounds

<28.0.1500.71-1
  • H
Resource Management Errors

<28.0.1500.71-1
  • M
Out-of-Bounds

<28.0.1500.71-1
  • H
CVE-2013-2880

<28.0.1500.71-1
  • M
CVE-2013-2853

<28.0.1500.71-1
  • H
Resource Management Errors

<28.0.1500.71-1
  • H
CVE-2013-2867

<28.0.1500.71-1
  • H
Resource Management Errors

<27.0.1453.110-1
  • H
Use After Free

<27.0.1453.110-1
  • H
CVE-2013-2865

<27.0.1453.110-1
  • H
CVE-2013-2859

<27.0.1453.110-1
  • H
Use After Free

<27.0.1453.110-1
  • M
Out-of-Bounds

<27.0.1453.110-1
  • H
Use After Free

<27.0.1453.110-1
  • H
Out-of-Bounds

<27.0.1453.110-1
  • H
Use After Free

<27.0.1453.110-1
  • C
Out-of-Bounds

<27.0.1453.110-1
  • M
Information Exposure

<27.0.1453.93-1
  • H
Out-of-Bounds

<27.0.1453.93-1
  • M
Race Condition

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • M
Cross-site Scripting (XSS)

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • H
Resource Management Errors

<27.0.1453.93-1
  • M
Out-of-Bounds

<27.0.1453.93-1
  • H
CVE-2013-2836

<27.0.1453.93-1
  • M
Out-of-Bounds

<26.0.1410.43-1
  • H
Access Restriction Bypass

<26.0.1410.43-1
  • H
Access Restriction Bypass

<26.0.1410.43-1
  • M
Improper Input Validation

<26.0.1410.43-1
  • H
Resource Management Errors

<26.0.1410.43-1
  • H
Access Restriction Bypass

<26.0.1410.43-1
  • M
Out-of-Bounds

<26.0.1410.43-1
  • H
Resource Management Errors

<26.0.1410.43-1
  • M
Access Restriction Bypass

<26.0.1410.43-1
  • M
Access Restriction Bypass

<26.0.1410.43-1
  • H
Resource Management Errors

<26.0.1410.43-1
  • H
Arbitrary Code Injection

<25.0.1364.160-1
  • H
Race Condition

<25.0.1364.152-1
  • H
Resource Management Errors

<25.0.1364.152-1
  • M
Information Exposure

<25.0.1364.152-1
  • H
CVE-2013-0908

<25.0.1364.152-1
  • H
Out-of-Bounds

<25.0.1364.152-1
  • H
Resource Management Errors

<25.0.1364.152-1
  • H
Directory Traversal

<25.0.1364.152-1
  • H
Improper Authentication

<25.0.1364.152-1
  • H
Out-of-Bounds

<25.0.1364.152-1
  • H
Resource Management Errors

<25.0.1364.152-1
  • H
Out-of-Bounds

<25.0.1364.97-1
  • H
Access Restriction Bypass

<25.0.1364.97-1
  • H
Out-of-Bounds

<25.0.1364.97-1
  • H
CVE-2013-2268

<25.0.1364.97-1
  • H
Out-of-Bounds

<25.0.1364.97-1
  • H
Numeric Errors

<25.0.1364.97-1
  • M
Race Condition

<25.0.1364.97-1
  • H
Resource Management Errors

<25.0.1364.97-1
  • H
Directory Traversal

<25.0.1364.97-1
  • M
Race Condition

<25.0.1364.97-1
  • M
Access Restriction Bypass

<25.0.1364.97-1
  • H
Out-of-Bounds

<25.0.1364.97-1
  • M
Improper Input Validation

<25.0.1364.97-1
  • M
Improper Input Validation

<25.0.1364.97-1
  • M
Out-of-Bounds

<25.0.1364.97-1
  • M
CVE-2013-0884

<25.0.1364.97-1
  • H
Buffer Overflow

<25.0.1364.97-1
  • M
Numeric Errors

<25.0.1364.97-1
  • H
Access Restriction Bypass

<25.0.1364.97-1
  • H
Resource Management Errors

<25.0.1364.97-1
  • H
CVE-2013-0892

<25.0.1364.97-1
  • C
CVE-2013-0842

<24.0.1312.68-1
  • H
Improper Input Validation

<24.0.1312.68-1
  • C
CVE-2013-0840

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • M
Access Restriction Bypass

<24.0.1312.68-1
  • H
Access Restriction Bypass

<24.0.1312.68-1
  • M
Out-of-Bounds

<24.0.1312.68-1
  • M
Access Restriction Bypass

<24.0.1312.68-1
  • H
Out-of-Bounds

<24.0.1312.68-1
  • M
CVE-2013-0835

<24.0.1312.68-1
  • M
Out-of-Bounds

<24.0.1312.68-1
  • H
Improper Input Validation

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • H
Numeric Errors

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • H
Improper Input Validation

<24.0.1312.68-1
  • M
Out-of-Bounds

<24.0.1312.68-1
  • M
Resource Management Errors

<24.0.1312.68-1
  • H
Directory Traversal

<24.0.1312.68-1
  • C
Use After Free

<24.0.1312.68-1
  • C
Integer Overflow or Wraparound

<24.0.1312.68-1
  • C
CVE-2012-5141

<24.0.1312.68-1
  • C
Arbitrary Code Injection

<24.0.1312.68-1
  • C
Use After Free

<24.0.1312.68-1
  • C
Out-of-Bounds

<24.0.1312.68-1
  • C
Use After Free

<24.0.1312.68-1
  • C
CVE-2012-5138

<24.0.1312.68-1
  • M
Out-of-bounds Read

<24.0.1312.68-1
  • M
Improper Input Validation

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • M
CVE-2012-5132

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • L
Cross-site Scripting (XSS)

*
  • M
Out-of-Bounds

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • M
Race Condition

<24.0.1312.68-1
  • H
Access Restriction Bypass

<24.0.1312.68-1
  • H
Resource Management Errors

<24.0.1312.68-1
  • H
Out-of-Bounds

<24.0.1312.68-1
  • H
Numeric Errors

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • H
Use After Free

<24.0.1312.68-1
  • C
Resource Management Errors

<22.0.1229.94~r161065-1
  • C
Improper Privilege Management

<22.0.1229.94~r161065-1
  • H
Race Condition

<22.0.1229.94~r161065-1
  • H
CVE-2012-5111

<22.0.1229.94~r161065-1
  • M
Out-of-bounds Read

<22.0.1229.94~r161065-1
  • H
CVE-2012-2900

<22.0.1229.94~r161065-1
  • M
Out-of-bounds Read

<22.0.1229.94~r161065-1
  • H
Out-of-Bounds

<22.0.1229.94~r161065-1
  • M
Information Exposure

<22.0.1229.94~r161065-1
  • M
Improper Input Validation

<22.0.1229.94~r161065-1
  • H
Out-of-Bounds

<22.0.1229.94~r161065-1
  • H
Resource Management Errors

<22.0.1229.94~r161065-1
  • M
Out-of-Bounds

<22.0.1229.94~r161065-1
  • M
Cross-site Scripting (XSS)

<22.0.1229.94~r161065-1
  • M
Resource Management Errors

<22.0.1229.94~r161065-1
  • H
Resource Management Errors

<22.0.1229.94~r161065-1
  • M
CVE-2012-2892

<22.0.1229.94~r161065-1
  • H
Out-of-Bounds

<22.0.1229.94~r161065-1
  • H
Resource Management Errors

<22.0.1229.94~r161065-1
  • H
Resource Management Errors

<22.0.1229.94~r161065-1
  • M
Out-of-Bounds

<22.0.1229.94~r161065-1
  • M
Cross-site Scripting (XSS)

<22.0.1229.94~r161065-1
  • H
Race Condition

<22.0.1229.94~r161065-1
  • H
Out-of-Bounds

<22.0.1229.94~r161065-1
  • M
Improper Input Validation

<22.0.1229.94~r161065-1
  • M
Resource Management Errors

<22.0.1229.94~r161065-1
  • L
Cryptographic Issues

<21.0.1180.57~r148591-1
  • L
Cryptographic Issues

<22.0.1229.94~r161065-1
  • M
Cross-site Scripting (XSS)

<21.0.1180.89~r154005-1
  • M
Out-of-Bounds

<21.0.1180.89~r154005-1
  • M
Race Condition

<21.0.1180.89~r154005-1
  • H
CVE-2012-2866

<21.0.1180.89~r154005-1
  • M
CVE-2012-2871

<21.0.1180.89~r154005-1
  • M
Resource Management Errors

<21.0.1180.89~r154005-1
  • H
Out-of-Bounds

<21.0.1180.89~r154005-1
  • M
CVE-2012-2867

<21.0.1180.89~r154005-1
  • M
Access Restriction Bypass

<21.0.1180.57~r148591
  • M
CVE-2012-2846

<21.0.1180.57~r148591
  • M
CVE-2012-2853

<21.0.1180.57~r148591
  • M
Resource Management Errors

<21.0.1180.57~r148591
  • M
Resource Management Errors

<21.0.1180.57~r148591
  • M
CVE-2012-2860

<21.0.1180.57~r148591
  • M
Information Exposure

<21.0.1180.57~r148591
  • H
Out-of-Bounds

<21.0.1180.57~r148591
  • M
Out-of-Bounds

<21.0.1180.57~r148591
  • M
Numeric Errors

<21.0.1180.57~r148591
  • H
Resource Management Errors

<20.0.1132.57~r145807-1
  • H
Resource Management Errors

<20.0.1132.57~r145807-1
  • M
Improper Input Validation

<20.0.1132.43~r143823-1
  • H
CVE-2012-2821

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • M
CVE-2012-2826

<20.0.1132.43~r143823-1
  • M
Information Exposure

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • H
CVE-2012-2830

<20.0.1132.43~r143823-1
  • M
Improper Input Validation

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • H
Numeric Errors

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • H
Resource Management Errors

<20.0.1132.43~r143823-1
  • C
Resource Management Errors

<20.0.1132.21~r139451-1
  • H
Resource Management Errors

<20.0.1132.21~r139451-1
  • M
Out-of-Bounds

<20.0.1132.21~r139451-1
  • H
CVE-2011-3109

<20.0.1132.21~r139451-1
  • C
Out-of-Bounds

<20.0.1132.21~r139451-1
  • H
CVE-2011-3107

<20.0.1132.21~r139451-1
  • M
Out-of-Bounds

<20.0.1132.21~r139451-1
  • M
Improper Input Validation

<20.0.1132.21~r139451-1
  • M
Out-of-Bounds

<20.0.1132.21~r139451-1
  • C
CVE-2011-3101

<20.0.1132.21~r139451-1
  • C
Resource Management Errors

<20.0.1132.21~r139451-1
  • M
CVE-2011-3100

<20.0.1132.21~r139451-1
  • H
Resource Management Errors

<20.0.1132.21~r139451-1
  • H
Race Condition

<20.0.1132.21~r139451-1
  • C
CVE-2011-3087

<20.0.1132.21~r139451-1
  • C
Improper Input Validation

<20.0.1132.21~r139451-1
  • H
Access Restriction Bypass

<20.0.1132.21~r139451-1
  • C
Resource Management Errors

<20.0.1132.21~r139451-1
  • M
Improper Input Validation

<20.0.1132.21~r139451-1
  • M
Out-of-Bounds

<20.0.1132.21~r139451-1
  • C
Resource Management Errors

<20.0.1132.21~r139451-1
  • H
Use After Free

<18.0.1025.168~r134367-1
  • M
Use After Free

<18.0.1025.168~r134367-1
  • H
Race Condition

<18.0.1025.168~r134367-1
  • M
Use After Free

<18.0.1025.168~r134367-1
  • C
Resource Management Errors

<18.0.1025.168~r134367-1
  • M
Origin Validation Error

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Origin Validation Error

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Out-of-bounds Read

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Use After Free

<18.0.1025.151~r130497-1
  • M
Cross-site Scripting (XSS)

<18.0.1025.142~r129054-1
  • M
Out-of-bounds Read

<18.0.1025.142~r129054-1
  • H
Use After Free

<18.0.1025.142~r129054-1
  • M
Out-of-bounds Read

<18.0.1025.142~r129054-1
  • M
Incorrect Calculation

<18.0.1025.142~r129054-1
  • M
Improper Input Validation

<18.0.1025.142~r129054-1
  • M
Improper Certificate Validation

<18.0.1025.142~r129054-1
  • M
Integer Overflow or Wraparound

<18.0.1025.142~r129054-1
  • M
CVE-2011-3049

<17.0.963.83~r127885-1
  • M
Use After Free

<17.0.963.83~r127885-1
  • H
Use After Free

<20.0.1132.21~r139451-1
  • M
Origin Validation Error

<17.0.963.83~r127885-1
  • M
Use After Free

<17.0.963.83~r127885-1
  • M
Use After Free

<17.0.963.83~r127885-1
  • C
Exposure of Resource to Wrong Sphere

<20.0.1132.21~r139451-1
  • M
Out-of-Bounds

<17.0.963.83~r127885-1
  • M
Improper Privilege Management

<17.0.963.83~r127885-1
  • M
Missing Authentication for Critical Function

<17.0.963.83~r127885-1
  • H
Out-of-Bounds

<17.0.963.83~r127885-1
  • C
Cross-site Scripting (XSS)

<17.0.963.78~r125577-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Out-of-bounds Read

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Incorrect Type Conversion or Cast

<17.0.963.66~r124982-1
  • M
Incorrect Type Conversion or Cast

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • H
Buffer Overflow

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.66~r124982-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • M
Out-of-bounds Write

<17.0.963.56~r121963-1
  • M
Incorrect Type Conversion or Cast

<17.0.963.56~r121963-1
  • H
Use After Free

<17.0.963.56~r121963-1
  • M
Improper Certificate Validation

<17.0.963.56~r121963-1
  • M
CVE-2011-3020

<17.0.963.56~r121963-1
  • M
Cleartext Transmission of Sensitive Information

<17.0.963.56~r121963-1
  • H
Out-of-bounds Write

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • M
Out-of-bounds Read

<17.0.963.56~r121963-1
  • M
Resource Exhaustion

<17.0.963.56~r121963-1
  • M
Improper Verification of Cryptographic Signature

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • H
CVE-2011-3955

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • M
Use After Free

<17.0.963.56~r121963-1
  • H
Use After Free

<17.0.963.56~r121963-1
  • H
Race Condition

<17.0.963.56~r121963-1
  • H
Buffer Overflow

<17.0.963.56~r121963-1
  • M
Out-of-bounds Read

<17.0.963.56~r121963-1
  • M
CVE-2011-3967

<17.0.963.56~r121963-1
  • H
CVE-2011-3953

<17.0.963.56~r121963-1
  • M
Improper Input Validation

<17.0.963.56~r121963-1
  • M
Out-of-bounds Write

<17.0.963.56~r121963-1
  • H
Use After Free

<17.0.963.56~r121963-1
  • M
Origin Validation Error

<17.0.963.56~r121963-1
  • M
Out-of-bounds Read

<17.0.963.56~r121963-1
  • H
Use After Free

<16.0.912.77~r118311-1
  • H
Use After Free

<16.0.912.77~r118311-1
  • H
Out-of-bounds Write

<16.0.912.77~r118311-1
  • H
Improper Initialization

<16.0.912.77~r118311-1
  • H
Use After Free

<16.0.912.77~r118311-1
  • H
Out-of-bounds Write

<16.0.912.75~r116452-1
  • H
Use After Free

<16.0.912.75~r116452-1
  • H
Out-of-bounds Write

<16.0.912.75~r116452-1
  • M
Improper Input Validation

<16.0.912.63~r113337-1
  • M
Insufficient Comparison

<16.0.912.63~r113337-1
  • H
Out-of-bounds Write

<16.0.912.63~r113337-1
  • M
Out-of-bounds Read

<16.0.912.63~r113337-1
  • H
Use After Free

<16.0.912.63~r113337-1
  • H
Use After Free

<16.0.912.63~r113337-1
  • H
Out-of-bounds Write

<16.0.912.63~r113337-1
  • H
Use After Free

<16.0.912.63~r113337-1
  • M
Out-of-bounds Read

<16.0.912.63~r113337-1
  • M
Out-of-Bounds

<16.0.912.63~r113337-1
  • L
Access Restriction Bypass

<17.0.963.56~r121963-1
  • H
Out-of-bounds Write

<15.0.874.121~r109964-1
  • H
Out-of-Bounds

<15.0.874.121~r109964-1
  • H
Buffer Overflow

<15.0.874.121~r109964-1
  • M
Use After Free

<15.0.874.121~r109964-1
  • H
Out-of-bounds Write

<15.0.874.121~r109964-1
  • L
Improper Privilege Management

<15.0.874.121~r109964-1
  • H
Double Free

<15.0.874.121~r109964-1
  • M
Out-of-bounds Read

<15.0.874.121~r109964-1
  • L
Untrusted Search Path

*
  • M
Cross-site Scripting (XSS)

<15.0.874.106~r107270-1
  • M
CVE-2011-3876

<15.0.874.106~r107270-1
  • L
CVE-2011-3879

<15.0.874.106~r107270-1
  • L
Improper Input Validation

<15.0.874.106~r107270-1
  • H
Use After Free

<15.0.874.106~r107270-1
  • H
Out-of-bounds Write

<15.0.874.106~r107270-1
  • H
Use After Free

<15.0.874.106~r107270-1
  • L
Improper Input Validation

<15.0.874.106~r107270-1
  • M
Cross-site Scripting (XSS)

<15.0.874.106~r107270-1
  • M
Improper Input Validation

<15.0.874.106~r107270-1
  • M
Reliance on Cookies without Validation and Integrity Checking

<15.0.874.106~r107270-1
  • M
Improper Input Validation

<15.0.874.106~r107270-1
  • M
Use After Free

<15.0.874.106~r107270-1
  • H
Use After Free

<15.0.874.106~r107270-1
  • H
Use After Free

<15.0.874.106~r107270-1
  • M
Improper Input Validation

<15.0.874.106~r107270-1
  • M
Race Condition

<15.0.874.106~r107270-1
  • H
CVE-2011-3891

<15.0.874.106~r107270-1
  • M
Use After Free

<14.0.835.202~r103287-1
  • M
CVE-2011-2877

<14.0.835.202~r103287-1
  • M
Use After Free

<14.0.835.202~r103287-1
  • M
CVE-2011-2879

<14.0.835.202~r103287-1
  • H
CVE-2011-2878

<14.0.835.202~r103287-1
  • M
Out-of-Bounds

<14.0.835.202~r103287-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • M
Race Condition

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • M
Use After Free

<14.0.835.163~r101024-1
  • M
Improper Input Validation

<14.0.835.163~r101024-1
  • M
Arbitrary Code Injection

<14.0.835.163~r101024-1
  • H
Use After Free

<14.0.835.163~r101024-1
  • M
NULL Pointer Dereference

<14.0.835.163~r101024-1
  • H
Improper Input Validation

<14.0.835.163~r101024-1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<14.0.835.163~r101024-1
  • H
Origin Validation Error

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • M
Use After Free

<14.0.835.163~r101024-1
  • M
Use After Free

<14.0.835.163~r101024-1
  • H
Use After Free

<14.0.835.163~r101024-1
  • M
Use After Free

<14.0.835.163~r101024-1
  • M
Improper Input Validation

<14.0.835.163~r101024-1
  • M
Improper Certificate Validation

<14.0.835.163~r101024-1
  • M
Incorrect Default Permissions

<14.0.835.163~r101024-1
  • H
CVE-2011-2837

<14.0.835.163~r101024-1
  • M
Off-by-one Error

<14.0.835.163~r101024-1
  • H
Access Restriction Bypass

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • L
CVE-2011-2836

<14.0.835.163~r101024-1
  • M
Out-of-bounds Read

<14.0.835.163~r101024-1
  • L
CVE-2011-3420

<14.0.835.163~r101024-1
  • L
CVE-2011-3421

<14.0.835.163~r101024-1
  • M
Improper Input Validation

<15.0.874.106~r107270-1
  • H
Use After Free

<13.0.782.215~r97094-1
  • H
CVE-2011-2826

<13.0.782.215~r97094-1
  • H
Use After Free

<13.0.782.215~r97094-1
  • H
Integer Overflow or Wraparound

<13.0.782.215~r97094-1
  • H
Use After Free

<13.0.782.215~r97094-1
  • H
Use After Free

<13.0.782.215~r97094-1
  • H
Double Free

<13.0.782.215~r97094-1
  • H
Out-of-bounds Write

<13.0.782.215~r97094-1
  • M
Access Restriction Bypass

<4.0.211.0
  • L
CVE-2011-2360

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Arbitrary Code Injection

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
CVE-2011-2795

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Incorrect Default Permissions

<13.0.782.107~r94237-1
  • M
Buffer Overflow

<13.0.782.107~r94237-1
  • M
CVE-2011-2819

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Information Exposure

<13.0.782.107~r94237-1
  • L
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Information Exposure

<13.0.782.107~r94237-1
  • M
CVE-2011-2798

<13.0.782.107~r94237-1
  • M
Out-of-bounds Read

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • L
Out-of-bounds Write

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Out-of-bounds Read

<13.0.782.107~r94237-1
  • L
Improper Authentication

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Improper Input Validation

<13.0.782.107~r94237-1
  • M
Use After Free

<13.0.782.107~r94237-1
  • H
Out-of-Bounds

<12.0.742.91~r87961-1
  • M
Resource Management Errors

<14.0.835.157~r99685-1
  • L
Information Exposure

*
  • M
CVE-2011-2350

<12.0.742.112~r90304-1
  • M
Use After Free

<12.0.742.112~r90304-1
  • M
Use After Free

<12.0.742.112~r90304-1
  • M
Out-of-Bounds

<12.0.742.112~r90304-1
  • M
Use After Free

<12.0.742.112~r90304-1
  • L
CVE-2011-1812

<12.0.742.91~r87961-1
  • M
Use After Free

<12.0.742.91~r87961-1
  • M
Use After Free

<12.0.742.91~r87961-1
  • M
Out-of-Bounds

<12.0.742.91~r87961-1
  • M
Information Exposure

<12.0.742.91~r87961-1
  • M
Use After Free

<12.0.742.91~r87961-1
  • M
Improper Input Validation

<12.0.742.91~r87961-1
  • M
Cross-site Scripting (XSS)

<12.0.742.91~r87961-1
  • M
Use After Free

<12.0.742.91~r87961-1
  • L
Cross-site Scripting (XSS)

<12.0.742.91~r87961-1
  • L
Cross-site Scripting (XSS)

<12.0.742.91~r87961-1
  • H
Improper Input Validation

<12.0.742.91~r87961-1
  • M
Improper Input Validation

<12.0.742.91~r87961-1
  • H
Improper Input Validation

<11.0.696.71~r86024-1
  • C
Out-of-bounds Write

<11.0.696.71~r86024-1
  • C
Out-of-Bounds

<11.0.696.71~r86024-1
  • L
CVE-2011-1801

<11.0.696.71~r86024-1
  • H
Integer Overflow or Wraparound

<11.0.696.68~r84545-1
  • M
Incorrect Type Conversion or Cast

<11.0.696.68~r84545-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • M
CVE-2011-1439

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Use After Free

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Incorrect Type Conversion or Cast

<11.0.696.65~r84435-1
  • M
Integer Overflow or Wraparound

<11.0.696.65~r84435-1
  • M
Out-of-bounds Read

<11.0.696.65~r84435-1
  • M
Use After Free

<11.0.696.65~r84435-1
  • H
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Incorrect Default Permissions

<11.0.696.65~r84435-1
  • M
CVE-2011-1446

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Race Condition

<11.0.696.65~r84435-1
  • L
CVE-2011-1304

<11.0.696.65~r84435-1
  • M
Race Condition

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • L
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<11.0.696.65~r84435-1
  • H
Improper Input Validation

<11.0.696.65~r84435-1
  • M
Use After Free

<11.0.696.65~r84435-1
  • H
Improper Input Validation

<11.0.696.65~r84435-1
  • H
Use After Free

<10.0.648.205~r81283-1
  • H
Out-of-bounds Write

<10.0.648.205~r81283-1
  • M
NULL Pointer Dereference

<12.0.742.91~r87961-1
  • H
Improper Input Validation

<10.0.648.204~r79063-1
  • H
Improper Input Validation

<10.0.648.204~r79063-1
  • H
Use After Free

<10.0.648.204~r79063-1
  • H
Improper Input Validation

<10.0.648.204~r79063-1
  • H
Buffer Overflow

<10.0.648.204~r79063-1
  • H
Use After Free

<10.0.648.204~r79063-1
  • C
Numeric Errors

<10.0.648.133~r77742-1
  • L
CVE-2011-1194

<10.0.648.127~r76697-1
  • M
Information Exposure

<10.0.648.127~r76697-1
  • H
CVE-2011-1188

<10.0.648.127~r76697-1
  • H
CVE-2011-1189

<10.0.648.127~r76697-1
  • H
Out-of-Bounds

<10.0.648.127~r76697-1
  • H
CVE-2011-1201

<10.0.648.127~r76697-1
  • H
Improper Input Validation

<10.0.648.127~r76697-1
  • M
Improper Input Validation

<10.0.648.127~r76697-1
  • H
Use After Free

<10.0.648.127~r76697-1
  • M
Incorrect Type Conversion or Cast

<10.0.648.127~r76697-1
  • H
Use After Free

<10.0.648.127~r76697-1
  • M
CVE-2011-1413

<10.0.648.127~r76697-1
  • H
CVE-2011-1185

<10.0.648.127~r76697-1
  • H
CVE-2011-1203

<10.0.648.127~r76697-1
  • H
CVE-2011-1196

<10.0.648.127~r76697-1
  • M
Improper Input Validation

<10.0.648.127~r76697-1
  • H
CVE-2011-1199

<10.0.648.127~r76697-1
  • M
Out-of-bounds Read

<10.0.648.127~r76697-1
  • M
Out-of-bounds Read

<9.0.597.107~r75357-1
  • M
Out-of-bounds Read

<9.0.597.107~r75357-1
  • M
CVE-2011-1107

<9.0.597.107~r75357-1
  • H
CVE-2011-1114

<9.0.597.107~r75357-1
  • H
CVE-2011-1119

<9.0.597.107~r75357-1
  • H
CVE-2011-1117

<9.0.597.107~r75357-1
  • M
Improper Input Validation

<9.0.597.107~r75357-1
  • H
CVE-2011-1125

<9.0.597.107~r75357-1
  • H
CVE-2011-1112

<9.0.597.107~r75357-1
  • H
CVE-2011-1116

<9.0.597.107~r75357-1
  • H
Integer Overflow or Wraparound

<9.0.597.107~r75357-1
  • H
CVE-2011-1115

<9.0.597.107~r75357-1
  • H
Improper Input Validation

<9.0.597.107~r75357-1
  • H
Improper Input Validation

<9.0.597.107~r75357-1
  • M
CVE-2011-1108

<9.0.597.107~r75357-1
  • H
Improper Input Validation

<9.0.597.107~r75357-1
  • M
Out-of-bounds Read

<9.0.597.107~r75357-1
  • H
Use After Free

<9.0.597.107~r75357-1
  • H
Incorrect Authorization

<9.0.597.107~r75357-1
  • H
Resource Exhaustion

<9.0.597.98~r74359-1
  • M
Out-of-bounds Read

<9.0.597.98~r74359-1
  • C
Use After Free

<9.0.597.98~r74359-1
  • H
Improper Input Validation

<9.0.597.98~r74359-1
  • H
Improper Input Validation

<9.0.597.98~r74359-1
  • M
Race Condition

<9.0.597.84~r72991-1
  • H
Access Restriction Bypass

<9.0.597.84~r72991-1
  • H
Use After Free

<9.0.597.84~r72991-1
  • M
Improper Input Validation

<9.0.597.84~r72991-1
  • M
CVE-2011-0783

<9.0.597.84~r72991-1
  • L
Improper Input Validation

<9.0.597.84~r72991-1
  • M
Incorrect Type Conversion or Cast

<6.0.472.63~r59945-5
  • C
Improper Input Validation

<9.0.597.45~r70550-1
  • C
Improper Input Validation

<6.0.472.63~r59945-5
  • C
Out-of-Bounds

<6.0.472.63~r59945-5
  • M
Incorrect Type Conversion or Cast

<6.0.472.63~r59945-5
  • H
Improper Input Validation

<6.0.472.63~r59945-5
  • C
CVE-2011-0473

<6.0.472.63~r59945-5
  • C
Improper Input Validation

<6.0.472.63~r59945-5
  • M
CVE-2011-0470

<9.0.597.45~r70550-1
  • C
CVE-2011-0474

<6.0.472.63~r59945-5
  • H
Access of Uninitialized Pointer

<9.0.597.45~r70550-1
  • L
Improper Input Validation

<6.0.472.63~r59945-4
  • L
NULL Pointer Dereference

<6.0.472.63~r59945-4
  • H
Out-of-bounds Read

<6.0.472.63~r59945-4
  • H
CVE-2010-4578

<6.0.472.63~r59945-4
  • L
Deserialization of Untrusted Data

<6.0.472.63~r59945-4
  • H
Double Free

<5.0.375.29~r46008-1
  • L
CVE-2010-4482

*
  • H
Resource Management Errors

<6.0.472.63~r59945-3
  • H
CVE-2010-4490

<6.0.472.63~r59945-3
  • M
Access Restriction Bypass

<6.0.472.63~r59945-3
  • L
CVE-2010-4484

<9.0.597.83~r72435-1
  • L
Access Restriction Bypass

<9.0.597.83~r72435-1
  • H
Use After Free

<6.0.472.63~r59945-3
  • L
Improper Authentication

<9.0.597.83~r72435-1
  • H
CVE-2010-4487

<6.0.472.63~r59945-3
  • M
Use After Free

<6.0.472.63~r59945-3
  • M
Access Restriction Bypass

<9.0.597.45~r70550-1
  • M
Access Restriction Bypass

<29.0.1547.57-1
  • H
Numeric Errors

<29.0.1547.57-1
  • C
Use After Free

<6.0.472.63~r59945-2
  • C
CVE-2010-4205

<6.0.472.63~r59945-2
  • H
Improper Input Validation

<6.0.472.63~r59945-2
  • C
CVE-2010-4204

<6.0.472.63~r59945-2
  • H
Improper Input Validation

<6.0.472.63~r59945-2
  • C
Use After Free

<6.0.472.63~r59945-2
  • C
Integer Overflow or Wraparound

<6.0.472.63~r59945-2
  • H
Out-of-bounds Write

<6.0.472.63~r59945-2
  • L
CVE-2010-4037

*
  • M
Improper Input Validation

<6.0.472.63~r59945-1
  • C
Improper Input Validation

<6.0.472.63~r59945-1
  • C
CVE-2010-4041

<6.0.472.63~r59945-1
  • H
Improper Input Validation

<6.0.472.63~r59945-1
  • H
Improper Input Validation

<6.0.472.63~r59945-1
  • H
Improper Input Validation

<6.0.472.63~r59945-1
  • M
CVE-2010-4033

<6.0.472.63~r59945-1
  • H
Improper Resource Shutdown or Release

<9.0.570
  • H
CVE-2010-3730

<6.0.472.62~r59676-1
  • C
Integer Overflow or Wraparound

<6.0.472.62~r59676-1
  • H
Incorrect Type Conversion or Cast

<6.0.472.62~r59676-1
  • H
Use After Free

<6.0.472.59~r59126-1
  • H
Use After Free

<6.0.472.59~r59126-1
  • H
Use After Free

<5.0.375.55~r47796-1
  • H
Off-by-one Error

<5.0.375.55~r47796-1
  • M
Cross-site Request Forgery (CSRF)

<5.0.375.29~r46008-1
  • H
Use After Free

<6.0.472.59~r59126-1
  • M
CVE-2010-3413

<6.0.472.59~r59126-1
  • C
Out-of-Bounds

<6.0.472.59~r59126-1
  • C
Out-of-Bounds

<6.0.472.59~r59126-1
  • M
Information Exposure

<6.0.472.59~r59126-1
  • M
Reachable Assertion

<6.0.472.59~r59126-1
  • H
Resource Management Errors

<5.0.375.127~r55887-1
  • H
Use After Free

<6.0.472.53~r57914-1
  • M
CVE-2010-3256

<6.0.472.53~r57914-1
  • C
Use After Free

<6.0.472.53~r57914-1
  • M
CVE-2010-3246

<6.0.472.53~r57914-1
  • M
CVE-2010-3248

<6.0.472.53~r57914-1
  • M
NULL Pointer Dereference

<6.0.472.53~r57914-1
  • C
Integer Overflow or Wraparound

<6.0.472.53~r57914-1
  • C
Out-of-Bounds

<6.0.472.53~r57914-1
  • M
Information Exposure

<6.0.472.53~r57914-1
  • H
Out-of-Bounds

<6.0.472.53~r57914-1
  • M
Improper Input Validation

<6.0.472.53~r57914-1
  • H
CVE-2010-3249

<6.0.472.53~r57914-1
  • H
Deserialization of Untrusted Data

<6.0.472.53~r57914-1
  • M
CVE-2010-3250

<6.0.472.53~r57914-1
  • C
Out-of-Bounds

<5.0.375.127~r55887-1
  • C
Out-of-Bounds

<5.0.375.127~r55887-1
  • C
Use After Free

<5.0.375.127~r55887-1
  • C
Out-of-Bounds

<5.0.375.127~r55887-1
  • C
CVE-2010-3111

<5.0.375.127~r55887-1
  • C
CVE-2010-3114

<5.0.375.127~r55887-1
  • M
CVE-2010-3115

<5.0.375.127~r55887-1
  • C
CVE-2010-3117

<5.0.375.127~r55887-1
  • M
Information Exposure

<5.0.375.127~r55887-1
  • C
Out-of-Bounds

<5.0.375.127~r55887-1
  • C
Access Restriction Bypass

<5.0.342.9~r43360-1
  • C
Credentials Management

<5.0.375.99~r51029-2
  • H
Resource Management Errors

<5.0.375.99~r51029-1
  • H
Out-of-Bounds

<5.0.375.127~r55887-1
  • H
Resource Management Errors

<5.0.375.125~r53311-1
  • H
Out-of-Bounds

<5.0.375.125~r53311-1
  • H
Out-of-Bounds

<5.0.375.127~r55887-1
  • H
Out-of-Bounds

<5.0.375.99~r51029-1
  • H
Out-of-Bounds

<5.0.375.127~r55887-1
  • H
Resource Management Errors

<5.0.375.125~r53311-1
  • H
Out-of-Bounds

<5.0.375.127~r55887-1
  • C
CVE-2010-2897

<5.0.375.125~r53311-1
  • C
Out-of-Bounds

<5.0.375.125~r53311-1
  • C
Out-of-Bounds

<5.0.375.125~r53311-1
  • C
CVE-2010-2900

<5.0.375.125~r53311-1
  • H
CVE-2010-2903

<5.0.375.125~r53311-1
  • M
CVE-2010-2899

<5.0.375.125~r53311-1
  • C
CVE-2010-2898

<5.0.375.125~r53311-1
  • H
Numeric Errors

<5.0.375.55~r47796-1
  • H
CVE-2010-2650

<5.0.375.99~r51029-1
  • H
Out-of-Bounds

<5.0.375.99~r51029-1
  • M
CVE-2010-2649

<5.0.375.99~r51029-1
  • H
Out-of-Bounds

<5.0.375.99~r51029-1
  • M
CVE-2010-2645

<5.0.375.99~r51029-1
  • M
CVE-2010-2652

<5.0.375.99~r51029-1
  • H
CVE-2010-2646

<5.0.375.99~r51029-1
  • H
Out-of-Bounds

<5.0.375.99~r51029-1
  • M
Access Restriction Bypass

<5.0.375.55~r47796-1
  • M
Information Exposure

<5.0.342.9~r43360-1
  • C
CVE-2010-1769

<5.0.375.55~r47796-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • C
CVE-2010-1763

<5.0.375.55~r47796-1
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<5.0.375.70~r48679-1
  • C
Use After Free

<5.0.375.70~r48679-1
  • H
Access Restriction Bypass

<5.0.375.70~r48679-1
  • C
Use After Free

<5.0.375.70~r48679-1
  • H
Arbitrary Code Injection

<5.0.375.55~r47796-1
  • C
Improper Input Validation

<5.0.375.70~r48679-1
  • M
Cross-site Scripting (XSS)

<5.0.375.70~r48679-1
  • M
Improper Input Validation

<5.0.375.55~r47796-1
  • M
Cross-site Scripting (XSS)

<5.0.375.29~r46008-1
  • M
CVE-2010-1421

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<5.0.375.55~r47796-1
  • M
Cross-site Scripting (XSS)

<5.0.375.55~r47796-1
  • M
CVE-2010-1764

<5.0.375.55~r47796-1
  • H
Resource Management Errors

<5.0.375.55~r47796-1
  • H
Resource Management Errors

<5.0.375.29~r46008-1
  • H
Arbitrary Code Injection

<5.0.375.70~r48679-1
  • M
Information Exposure

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<5.0.375.55~r47796-1
  • H
Out-of-Bounds

<5.0.375.55~r47796-1
  • H
Resource Management Errors

<5.0.375.55~r47796-1
  • H
Arbitrary Code Injection

<5.0.375.70~r48679-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.375.70~r48679-1
  • M
Cryptographic Issues

<5.0.375.70~r48679-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • M
CVE-2010-1422

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • M
Directory Traversal

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • H
Out-of-Bounds

<5.0.342.9~r43360-1
  • M
Access Restriction Bypass

<5.0.342.9~r43360-1
  • M
Information Exposure

<5.0.342.9~r43360-1
  • M
CVE-2010-1409

<5.0.342.9~r43360-1
  • M
Information Exposure

<5.0.342.9~r43360-1
  • H
Out-of-Bounds

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<5.0.375.70~r48679-1
  • L
Information Exposure

*
  • H
Out-of-Bounds

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • M
Cross-site Scripting (XSS)

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • M
Cross-site Scripting (XSS)

<5.0.342.9~r43360-1
  • H
Resource Management Errors

<5.0.342.9~r43360-1
  • H
Out-of-Bounds

<5.0.342.9~r43360-1
  • M
Access Restriction Bypass

<5.0.375.70~r48679-1
  • M
Cross-site Scripting (XSS)

<5.0.342.9~r43360-1
  • M
Cross-site Scripting (XSS)

<5.0.342.9~r43360-1
  • H
Out-of-Bounds

<5.0.342.9~r43360-1
  • H
CVE-2010-2110

<5.0.375.55~r47796-1
  • C
CVE-2010-2105

<5.0.375.55~r47796-1
  • M
CVE-2010-2106

<5.0.375.55~r47796-1
  • C
CVE-2010-2107

<5.0.375.55~r47796-1
  • H
CVE-2010-2108

<5.0.375.55~r47796-1
  • H
CVE-2010-2109

<5.0.375.55~r47796-1
  • L
Resource Management Errors

*
  • M
Resource Management Errors

<5.0.375.55~r47796-1
  • H
Out-of-Bounds

<5.0.375.29~r46008-1
  • C
Access Restriction Bypass

<5.0.375.29~r46008-1
  • M
Out-of-Bounds

<5.0.375.29~r46008-1
  • M
Cross-site Scripting (XSS)

<5.0.375.29~r46008-1
  • H
CVE-2010-1502

<5.0.375.29~r46008-1
  • C
Access Restriction Bypass

<5.0.375.29~r46008-1
  • M
Cross-site Scripting (XSS)

<5.0.375.29~r46008-1
  • H
CVE-2010-1506

<5.0.375.29~r46008-1
  • H
CVE-2010-1500

<5.0.375.29~r46008-1
  • C
Numeric Errors

<5.0.375.29~r46008-1
  • C
Information Exposure

<5.0.375.29~r46008-1
  • M
Improper Input Validation

<5.0.375.29~r46008-1
  • C
Race Condition

<5.0.375.29~r46008-1
  • H
Improper Input Validation

<5.0.375.29~r46008-1
  • C
Resource Management Errors

<5.0.375.29~r46008-1
  • M
Cross-site Scripting (XSS)

<5.0.375.29~r46008-1
  • H
CVE-2010-1231

<5.0.375.29~r46008-1
  • H
CVE-2010-1234

<5.0.375.29~r46008-1
  • M
Resource Management Errors

<5.0.375.29~r46008-1
  • M
Resource Management Errors

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Resource Management Errors

<6.0.466.0~r52279-1
  • H
Arbitrary Code Injection

<6.0.466.0~r52279-1
  • M
Resource Management Errors

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • M
Numeric Errors

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • H
Arbitrary Code Injection

<5.0.375.29~r46008-1
  • C
Numeric Errors

<5.0.375.29~r46008-1
  • M
Access Restriction Bypass

<5.0.375.29~r46008-1
  • M
Information Exposure

<5.0.375.29~r46008-1
  • H
Resource Management Errors

<5.0.375.29~r46008-1
  • H
Numeric Errors

<5.0.375.29~r46008-1
  • H
Numeric Errors

<5.0.375.29~r46008-1
  • H
Numeric Errors

<5.0.375.29~r46008-1
  • H
CVE-2010-0657

<5.0.375.29~r46008-1
  • L
Access Restriction Bypass

<5.0.375.29~r46008-1
  • M
Credentials Management

<5.0.375.29~r46008-1
  • M
CVE-2010-0315

<5.0.375.29~r46008-1
  • M
CVE-2010-0314

<5.0.375.29~r46008-1
  • L
Resource Management Errors

*
  • M
Cross-site Scripting (XSS)

<5.0.375.70~r48679-2
  • M
Improper Authentication

<5.0.342.9~r43360-1
  • L
Access Restriction Bypass

*
  • L
Resource Management Errors

<5.0.375.38~r46659-1
  • L
CVE-2009-0374

*
  • H
Numeric Errors

<5.0.375.29~r46008-1
  • C
Resource Management Errors

<5.0.375.29~r46008-1
  • M
Resource Management Errors

<5.0.375.29~r46008-1