| Authentication Bypass | |
| CVE-2022-34472 | |
| CVE-2022-34468 | |
| CVE-2022-34479 | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improper Certificate Validation | |
| CVE-2022-31742 | |
| Cross-site Scripting (XSS) | |
| CVE-2022-31736 | |
| Out-of-bounds Write | |
| Use of Uninitialized Resource | |
| Authentication Bypass | |
| Out-of-bounds Read | |
| CVE-2022-31740 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| CVE-2022-29913 | |
| CVE-2022-1520 | |
| Incorrect Default Permissions | |
| Out-of-bounds Write | |
| Open Redirect | |
| CVE-2022-29914 | |
| CVE-2022-29916 | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Certificate Validation | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Inefficient Regular Expression Complexity | |
| CVE-2022-26386 | |
| Time-of-check Time-of-use (TOCTOU) | |
| CVE-2022-26384 | |
| CVE-2022-26383 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2022-22763 | |
| CVE-2022-22759 | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2022-22761 | |
| Incorrect Authorization | |
| CVE-2022-22756 | |
| Out-of-bounds Write | |
| CVE-2022-22743 | |
| Out-of-bounds Read | |
| Improper Certificate Validation | |
| CVE-2022-22741 | |
| Use After Free | |
| XML Injection | |
| CVE-2022-22739 | |
| Out-of-bounds Write | |
| CVE-2022-22745 | |
| CVE-2022-22748 | |
| Race Condition | |
| CVE-2021-4126 | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Privilege Management | |
| Use After Free | |
| Information Exposure | |
| Race Condition | |
| CVE-2021-43541 | |
| Excessive Iteration | |
| Cross-site Scripting (XSS) | |
| Incorrect Type Conversion or Cast | |
| Information Exposure | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Use After Free | |
| Origin Validation Error | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Incorrect Authorization | |
| CVE-2021-38502 | |
| CVE-2021-38500 | |
| Use After Free | |
| Out-of-bounds Write | |
| Race Condition | |
| Missing Initialization of Resource | |
| Interpretation Conflict | |
| Out-of-Bounds | |
| Use After Free | |
| CVE-2021-29984 | |
| Files or Directories Accessible to External Parties | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| CVE-2021-29957 | |
| Cleartext Storage of Sensitive Information | |
| Uncontrolled Search Path Element | |
| Cleartext Storage of Sensitive Information | |
| Race Condition | |
| Missing Initialization of Resource | |
| Operation on a Resource after Expiration or Release | |
| Arbitrary Argument Injection | |
| Incorrect Calculation | |
| Integer Overflow or Wraparound | |
| Improper Privilege Management | |
| Insufficient Verification of Data Authenticity | |
| CVE-2021-23991 | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Improper Verification of Cryptographic Signature | |
| Authentication Bypass | |
| Out-of-Bounds | |
| Inadequate Encryption Strength | |
| Out-of-Bounds | |
| CVE-2021-23978 | |
| Information Exposure | |
| Information Exposure | |
| CVE-2021-23969 | |
| Arbitrary Command Injection | |
| Out-of-Bounds | |
| CVE-2021-23960 | |
| CVE-2021-23961 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2021-23953 | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2020-26973 | |
| CVE-2020-35111 | |
| Out-of-bounds Write | |
| CVE-2020-26976 | |
| CVE-2020-26978 | |
| Information Exposure | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2020-26961 | |
| Use After Free | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Cross-site Scripting (XSS) | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| CVE-2020-16012 | |
| Use After Free | |
| CVE-2020-15683 | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Open Redirect | |
| Release of Invalid Pointer or Reference | |
| Use After Free | |
| Incorrect Authorization | |
| Origin Validation Error | |
| Out-of-bounds Write | |
| Insufficiently Protected Credentials | |
| CVE-2020-6514 | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Certificate Validation | |
| Use After Free | |
| Missing Encryption of Sensitive Data | |
| Out-of-Bounds | |
| Insufficient Verification of Data Authenticity | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Origin Validation Error | |
| Race Condition | |
| Buffer Overflow | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Use After Free | |
| Double Free | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Arbitrary Code Injection | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| Missing Initialization of Resource | |
| Out-of-Bounds | |
| Insufficiently Protected Credentials | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Buffer Overflow | |
| Buffer Overflow | |
| Origin Validation Error | |
| Race Condition | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Buffer Overflow | |
| Improper Verification of Cryptographic Signature | |
| Cleartext Transmission of Sensitive Information | |
| Out-of-bounds Read | |
| Information Exposure | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Use After Free | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| CVE-2019-11730 | |
| Improper Encoding or Escaping of Output | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| CVE-2019-11711 | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Origin Validation Error | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Reachable Assertion | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Origin Validation Error | |
| Out-of-bounds Read | |
| Origin Validation Error | |
| Improper Verification of Cryptographic Signature | |
| Information Exposure | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Authentication | |
| Use After Free | |
| CVE-2018-18506 | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Origin Validation Error | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| CVE-2018-12392 | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Insufficiently Protected Credentials | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Cross-site Request Forgery (CSRF) | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Information Exposure | |
| Out-of-Bounds | |
| Information Exposure | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| CVE-2018-5168 | |
| Cross-site Scripting (XSS) | |
| CVE-2018-5117 | |
| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Missing Encryption of Sensitive Data | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Arbitrary Code Injection | |
| Missing Encryption of Sensitive Data | |
| Use After Free | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Inadequate Encryption Strength | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| CVE-2017-7830 | |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| CVE-2006-4569 | |
| CVE-2006-4570 | |
| CVE-2006-4571 | |
| Improper Input Validation | |
| CVE-2006-4566 | |
| CVE-2006-4567 | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| CVE-2006-3812 | |
| CVE-2006-3113 | |
| CVE-2006-3802 | |
| CVE-2006-3805 | |
| CVE-2006-3809 | |
| CVE-2006-3808 | |
| CVE-2006-3801 | |
| CVE-2006-3811 | |
| CVE-2006-3810 | |
| Numeric Errors | |
| CVE-2006-3807 | |
| CVE-2006-3804 | |
| CVE-2006-3803 | |
| CVE-2006-2786 | |
| CVE-2006-2787 | |
| Arbitrary Code Injection | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| CVE-2006-2776 | |
| Access Restriction Bypass | |
| CVE-2006-2778 | |
| Resource Management Errors | |
| CVE-2006-1738 | |
| Numeric Errors | |
| CVE-2006-1728 | |
| CVE-2006-1740 | |
| CVE-2006-1727 | |
| Access Restriction Bypass | |
| CVE-2006-1724 | |
| CVE-2006-1531 | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| CVE-2006-1742 | |
| Cross-site Scripting (XSS) | |
| CVE-2006-1530 | |
| CVE-2006-1732 | |
| CVE-2006-1734 | |
| CVE-2006-1529 | |
| Resource Management Errors | |
| CVE-2006-1723 | |
| Numeric Errors | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| CVE-2006-1045 | |
| Improper Input Validation | |
| CVE-2006-0299 | |
| Improper Input Validation | |
| CVE-2006-0297 | |
| CVE-2006-0294 | |
| CVE-2006-0292 | |
| CVE-2006-0296 | |
| CVE-2006-0295 | |
| CVE-2005-2353 | |