CVE-2024-11706 | |
CVE-2024-11692 | |
CVE-2024-11701 | |
CVE-2024-11695 | |
CVE-2024-11696 | |
CVE-2024-11705 | |
CVE-2024-11702 | |
CVE-2024-11697 | |
CVE-2024-11699 | |
CVE-2024-11700 | |
CVE-2024-11708 | |
CVE-2024-11704 | |
CVE-2024-11694 | |
CVE-2024-11703 | |
CVE-2024-10941 | |
Race Condition | |
Authentication Bypass | |
CVE-2024-10466 | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Authentication Bypass | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Use After Free | |
CVE-2024-10460 | |
CVE-2024-10458 | |
CVE-2024-9936 | |
Use After Free | |
CVE-2024-9400 | |
CVE-2024-9399 | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2024-9398 | |
CVE-2024-9401 | |
CVE-2024-9392 | |
CVE-2024-9402 | |
CVE-2024-9403 | |
CVE-2024-9396 | |
CVE-2024-9394 | |
CVE-2024-9393 | |
CVE-2024-8900 | |
CVE-2024-7652 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Open Redirect | |
CVE-2024-8382 | |
CVE-2024-8383 | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
CVE-2024-7531 | |
Out-of-bounds Write | |
CVE-2024-7518 | |
Improper Handling of Exceptional Conditions | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2024-7529 | |
Use After Free | |
Cross-site Scripting (XSS) | |
Incorrect Default Permissions | |
Out-of-bounds Read | |
Use After Free | |
Use of Uninitialized Resource | |
CVE-2024-6607 | |
CVE-2024-6612 | |
CVE-2024-6606 | |
CVE-2024-6611 | |
CVE-2024-6601 | |
CVE-2024-6614 | |
CVE-2024-6610 | |
CVE-2024-6604 | |
CVE-2024-6613 | |
CVE-2024-6615 | |
CVE-2024-6602 | |
CVE-2024-6609 | |
CVE-2024-6603 | |
CVE-2024-6608 | |
CVE-2024-5691 | |
CVE-2024-5697 | |
CVE-2024-5696 | |
CVE-2024-5699 | |
CVE-2024-5689 | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2024-5688 | |
Information Exposure | |
CVE-2024-5700 | |
Out-of-bounds Write | |
CVE-2024-5701 | |
Use After Free | |
CVE-2024-5693 | |
CVE-2024-4769 | |
CVE-2024-4776 | |
CVE-2024-4775 | |
CVE-2024-4770 | |
CVE-2024-4772 | |
CVE-2024-4764 | |
CVE-2024-4771 | |
CVE-2024-4767 | |
CVE-2024-4768 | |
CVE-2024-4367 | |
CVE-2024-4773 | |
CVE-2024-4774 | |
CVE-2024-4777 | |
CVE-2024-4778 | |
CVE-2024-3854 | |
CVE-2024-3853 | |
CVE-2024-3856 | |
CVE-2024-3852 | |
CVE-2024-3855 | |
CVE-2024-3302 | |
CVE-2024-3862 | |
CVE-2024-3861 | |
CVE-2024-3864 | |
CVE-2024-3857 | |
CVE-2024-3858 | |
CVE-2024-3859 | |
CVE-2024-3865 | |
CVE-2024-3860 | |
CVE-2024-29944 | |
CVE-2024-29943 | |
CVE-2024-2612 | |
CVE-2024-2611 | |
CVE-2024-2610 | |
CVE-2024-2609 | |
CVE-2024-2614 | |
CVE-2024-2606 | |
CVE-2024-2608 | |
CVE-2024-2613 | |
CVE-2024-2607 | |
CVE-2024-2615 | |
CVE-2023-5388 | |
CVE-2024-1556 | |
CVE-2024-1555 | |
CVE-2024-1549 | |
CVE-2024-1551 | |
Incorrect Conversion between Numeric Types | |
CVE-2024-1546 | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2024-1554 | |
CVE-2024-1548 | |
CVE-2024-1547 | |
CVE-2024-1553 | |
CVE-2024-1557 | |
Use After Free | |
Unchecked Return Value | |
Out-of-Bounds | |
Improper Privilege Management | |
Out-of-bounds Write | |
CVE-2024-0755 | |
CVE-2024-0742 | |
CVE-2024-0754 | |
CVE-2024-0746 | |
CVE-2024-0753 | |
Out-of-bounds Write | |
Origin Validation Error | |
CVE-2024-0750 | |
CVE-2024-0747 | |
CVE-2024-0748 | |
CVE-2023-6865 | |
Out-of-bounds Write | |
Race Condition | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Information Exposure | |
CVE-2023-6869 | |
CVE-2023-6871 | |
Out-of-bounds Write | |
CVE-2023-6872 | |
CVE-2023-6860 | |
CVE-2023-6863 | |
Use After Free | |
Out-of-bounds Write | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Handling of Exceptional Conditions | |
Use After Free | |
Out-of-bounds Read | |
CVE-2023-6208 | |
Directory Traversal | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2023-6210 | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-bounds Write | |
CVE-2023-5725 | |
CVE-2023-5728 | |
Information Exposure | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2023-5724 | |
CVE-2023-5729 | |
Out-of-bounds Write | |
CVE-2023-5723 | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Memory Leak | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Missing Encryption of Sensitive Data | |
CVE-2023-4579 | |
CVE-2023-4581 | |
Use After Free | |
Use After Free | |
CVE-2023-4577 | |
Out-of-bounds Write | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Write | |
Use After Free | |
CVE-2023-4583 | |
Use After Free | |
Link Following | |
Origin Validation Error | |
CVE-2023-4047 | |
Race Condition | |
Out-of-bounds Read | |
Out-of-bounds Write | |
CVE-2023-4046 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2023-4051 | |
CVE-2023-4055 | |
Out-of-bounds Write | |
Use After Free | |
CVE-2019-25136 | |
CVE-2023-37204 | |
Link Following | |
CVE-2023-37203 | |
CVE-2023-37210 | |
Use After Free | |
CVE-2023-37205 | |
Use After Free | |
Use After Free | |
CVE-2023-37208 | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Missing Authorization | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Open Redirect | |
Out-of-bounds Write | |
Improper Certificate Validation | |
Out-of-bounds Write | |
CVE-2023-32208 | |
Authentication Bypass | |
Out-of-bounds Read | |
Out-of-bounds Write | |
CVE-2023-32211 | |
CVE-2023-32210 | |
CVE-2023-32205 | |
Use of Uninitialized Resource | |
CVE-2023-32212 | |
Out-of-bounds Write | |
Double Free | |
Out-of-bounds Write | |
Inadequate Encryption Strength | |
Use After Free | |
Improper Encoding or Escaping of Output | |
CVE-2023-29547 | |
CVE-2023-29550 | |
Resource Exhaustion | |
Exposure of Resource to Wrong Sphere | |
CVE-2023-29548 | |
Use After Free | |
Race Condition | |
CVE-2023-29535 | |
Open Redirect | |
NULL Pointer Dereference | |
CVE-2023-29533 | |
CVE-2023-25751 | |
CVE-2023-25752 | |
CVE-2023-28164 | |
CVE-2023-28160 | |
Incorrect Type Conversion or Cast | |
Exposure of Resource to Wrong Sphere | |
Improper Preservation of Permissions | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Unchecked Return Value | |
CVE-2023-25742 | |
Out-of-bounds Write | |
CVE-2023-25741 | |
CVE-2023-25736 | |
Use After Free | |
CVE-2023-25737 | |
Out-of-bounds Write | |
CVE-2023-25728 | |
CVE-2023-25729 | |
Out-of-bounds Write | |
CVE-2023-25730 | |
CVE-2023-0767 | |
CVE-2023-25731 | |
Use After Free | |
Origin Validation Error | |
Inadequate Encryption Strength | |
CVE-2023-23603 | |
Improper Check for Unusual or Exceptional Conditions | |
Out-of-bounds Write | |
CVE-2023-23598 | |
CVE-2023-23604 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Write | |
CVE-2022-46871 | |
CVE-2022-46874 | |
Out-of-bounds Write | |
Arbitrary Code Injection | |
CVE-2022-46872 | |
Out-of-bounds Write | |
CVE-2022-46877 | |
CVE-2022-45408 | |
Improper Certificate Validation | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2022-45410 | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Link Following | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-bounds Write | |
CVE-2022-45404 | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
CVE-2022-45415 | |
Origin Validation Error | |
NULL Pointer Dereference | |
Cleartext Storage of Sensitive Information | |
Out-of-bounds Write | |
Race Condition | |
CVE-2022-42929 | |
Arbitrary Code Injection | |
CVE-2022-40957 | |
Cross-site Scripting (XSS) | |
Use After Free | |
Insecure Storage of Sensitive Information | |
Out-of-bounds Write | |
Incorrect Authorization | |
Improper Preservation of Permissions | |
Origin Validation Error | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2022-36319 | |
CVE-2022-2205 | |
Race Condition | |
Open Redirect | |
Out-of-bounds Write | |
CVE-2022-36315 | |
Out-of-bounds Write | |
Open Redirect | |
Cross-site Scripting (XSS) | |
CVE-2022-34472 | |
CVE-2022-34471 | |
CVE-2022-34468 | |
Access of Uninitialized Pointer | |
CVE-2022-34479 | |
Cross-site Scripting (XSS) | |
CVE-2022-34476 | |
Use After Free | |
Integer Overflow or Wraparound | |
CVE-2022-34482 | |
CVE-2022-34477 | |
Use After Free | |
CVE-2022-34483 | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Cross-site Scripting (XSS) | |
CVE-2022-31742 | |
Improper Validation of Array Index | |
Cross-site Scripting (XSS) | |
CVE-2022-31736 | |
Out-of-bounds Write | |
Use of Uninitialized Resource | |
CVE-2022-31748 | |
Authentication Bypass | |
Out-of-bounds Read | |
CVE-2022-31740 | |
Use After Free | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Out-of-bounds Write | |
Incorrect Default Permissions | |
Out-of-bounds Write | |
Open Redirect | |
CVE-2022-29914 | |
CVE-2022-29916 | |
CVE-2022-29915 | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-bounds Read | |
CVE-2022-28283 | |
Use After Free | |
CVE-2022-28284 | |
Use After Free | |
CVE-2022-28287 | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Inefficient Regular Expression Complexity | |
Time-of-check Time-of-use (TOCTOU) | |
Out-of-bounds Write | |
Use After Free | |
CVE-2022-26384 | |
CVE-2022-26383 | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
CVE-2022-22759 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Information Exposure | |
CVE-2022-22761 | |
Origin Validation Error | |
Operation on a Resource after Expiration or Release | |
Incorrect Authorization | |
CVE-2022-22756 | |
Out-of-bounds Write | |
CVE-2022-22743 | |
Out-of-bounds Read | |
Improper Certificate Validation | |
CVE-2022-22741 | |
Use After Free | |
XML Injection | |
CVE-2022-22739 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2022-22745 | |
CVE-2022-22748 | |
Race Condition | |
Use After Free | |
CVE-2021-43533 | |
Open Redirect | |
Out-of-bounds Write | |
Origin Validation Error | |
Cross-site Scripting (XSS) | |
Use After Free | |
Information Exposure | |
Race Condition | |
CVE-2021-43541 | |
Excessive Iteration | |
Cross-site Scripting (XSS) | |
CVE-2021-43540 | |
Incorrect Type Conversion or Cast | |
Information Exposure | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Restriction of Rendered UI Layers or Frames | |
Use After Free | |
Origin Validation Error | |
Improper Restriction of Rendered UI Layers or Frames | |
Incorrect Authorization | |
CVE-2021-38501 | |
CVE-2021-38500 | |
Out-of-bounds Write | |
Use After Free | |
Origin Validation Error | |
Use After Free | |
Out-of-bounds Write | |
CVE-2021-38491 | |
Out-of-bounds Write | |
Race Condition | |
HTTP Request Smuggling | |
Missing Release of Resource after Effective Lifetime | |
Out-of-Bounds | |
Race Condition | |
Missing Initialization of Resource | |
CVE-2021-29981 | |
Improper Restriction of Excessive Authentication Attempts | |
Interpretation Conflict | |
Out-of-Bounds | |
Use After Free | |
CVE-2021-29984 | |
Use After Free | |
Use After Free | |
CVE-2021-29975 | |
CVE-2021-29974 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Arbitrary Code Injection | |
Out-of-bounds Write | |
Incorrect Authorization | |
Out-of-Bounds | |
Missing Authorization | |
Out-of-Bounds | |
Incorrect Resource Transfer Between Spheres | |
Race Condition | |
Exposure of Resource to Wrong Sphere | |
Missing Initialization of Resource | |
Operation on a Resource after Expiration or Release | |
CVE-2021-24000 | |
Arbitrary Argument Injection | |
Incorrect Calculation | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
CVE-2021-23996 | |
Incorrect Conversion between Numeric Types | |
Improper Privilege Management | |
Insufficient Verification of Data Authenticity | |
Authentication Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
Origin Validation Error | |
Exposure of Resource to Wrong Sphere | |
Out-of-Bounds | |
Inadequate Encryption Strength | |
Out-of-Bounds | |
CVE-2021-23978 | |
CVE-2021-23974 | |
Missing Authorization | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Reachable Assertion | |
CVE-2021-23969 | |
CVE-2021-23972 | |
CVE-2021-23971 | |
Out-of-Bounds | |
Improper Preservation of Permissions | |
Out-of-Bounds | |
Exposure of Resource to Wrong Sphere | |
CVE-2021-23960 | |
CVE-2021-23962 | |
CVE-2021-23956 | |
CVE-2021-23961 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Restriction of Rendered UI Layers or Frames | |
CVE-2021-23953 | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2020-26973 | |
CVE-2020-35111 | |
Use After Free | |
Out-of-bounds Write | |
Open Redirect | |
CVE-2020-26976 | |
CVE-2020-26978 | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
CVE-2020-26963 | |
CVE-2020-26967 | |
CVE-2020-26961 | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Cross-boundary Removal of Sensitive Data | |
Cross-site Scripting (XSS) | |
Improper Restriction of Rendered UI Layers or Frames | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2020-16012 | |
Out-of-bounds Write | |
Use After Free | |
Origin Validation Error | |
CVE-2020-15681 | |
CVE-2020-15684 | |
CVE-2020-15683 | |
CVE-2020-15680 | |
Out-of-Bounds | |
Use After Free | |
Cross-site Scripting (XSS) | |
Buffer Overflow | |
Use After Free | |
Open Redirect | |
Release of Invalid Pointer or Reference | |
Release of Invalid Pointer or Reference | |
Unrestricted Upload of File with Dangerous Type | |
Information Exposure | |
Release of Invalid Pointer or Reference | |
Improper Locking | |
CVE-2020-15665 | |
Incorrect Authorization | |
Improper Restriction of Rendered UI Layers or Frames | |
Information Exposure | |
CVE-2020-6829 | |
Use of a Broken or Risky Cryptographic Algorithm | |
CVE-2020-15653 | |
Origin Validation Error | |
Out-of-bounds Write | |
Improper Check for Unusual or Exceptional Conditions | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Information Exposure | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
CVE-2020-6514 | |
CVE-2020-12412 | |
Use After Free | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-Bounds | |
Use After Free | |
Improper Certificate Validation | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
CVE-2020-12409 | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Insufficient Verification of Data Authenticity | |
Use After Free | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Out-of-Bounds | |
Deserialization of Untrusted Data | |
Race Condition | |
Buffer Overflow | |
Information Exposure | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Privilege Management | |
Session Fixation | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | |
Double Free | |
Out-of-Bounds | |
CVE-2020-6813 | |
Authentication Bypass | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |
Arbitrary Code Injection | |
Out-of-bounds Read | |
Authentication Bypass | |
Out-of-Bounds | |
Out-of-bounds Read | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Input Validation | |
Buffer Overflow | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Inclusion of Functionality from Untrusted Control Sphere | |
Buffer Overflow | |
Use After Free | |
Buffer Overflow | |
Buffer Overflow | |
Incorrect Default Permissions | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Origin Validation Error | |
Race Condition | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Buffer Overflow | |
CVE-2019-11754 | |
Out-of-bounds Read | |
Buffer Overflow | |
Improper Initialization | |
Insufficient Verification of Data Authenticity | |
Buffer Overflow | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Out-of-Bounds | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Incorrect Default Permissions | |
Improper Input Validation | |
Improper Preservation of Permissions | |
Inclusion of Functionality from Untrusted Control Sphere | |
CVE-2019-11749 | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Out-of-bounds Read | |
Incorrect Authorization | |
Arbitrary Code Injection | |
CVE-2019-11725 | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
CVE-2019-11721 | |
Arbitrary Code Injection | |
Improper Certificate Validation | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2019-11730 | |
Origin Validation Error | |
Exposure of Resource to Wrong Sphere | |
Improper Encoding or Escaping of Output | |
Improper Input Validation | |
Out-of-bounds Read | |
Out-of-Bounds | |
CVE-2019-11711 | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Origin Validation Error | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
CVE-2019-11699 | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
CVE-2019-11695 | |
Improper Input Validation | |
CVE-2018-18510 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-Bounds | |
Resource Management Errors | |
Use of Uninitialized Resource | |
Origin Validation Error | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Improper Input Validation | |
Reachable Assertion | |
Information Exposure | |
Out-of-Bounds | |
Origin Validation Error | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Origin Validation Error | |
Origin Validation Error | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Improper Authentication | |
Use After Free | |
Out-of-Bounds | |
CVE-2018-18506 | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2018-18497 | |
Out-of-Bounds | |
Use After Free | |
Incorrect Permission Assignment for Critical Resource | |
Out-of-bounds Write | |
Out-of-Bounds | |
Origin Validation Error | |
Out-of-Bounds | |
Out-of-bounds Write | |
Improper Authentication | |
Improper Input Validation | |
Out-of-Bounds | |
CVE-2018-12398 | |
Origin Validation Error | |
Incorrect Permission Assignment for Critical Resource | |
CVE-2018-12395 | |
Information Exposure | |
CVE-2018-12403 | |
Out-of-Bounds | |
Out-of-bounds Write | |
CVE-2018-12392 | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Insufficiently Protected Credentials | |
Out-of-Bounds | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Use After Free | |
Out-of-bounds Write | |
Cross-site Request Forgery (CSRF) | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Information Exposure | |
Out-of-Bounds | |
Cross-site Request Forgery (CSRF) | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Improper Input Validation | |
Incorrect Authorization | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Read | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Input Validation | |
Information Exposure | |
Information Exposure | |
Out-of-Bounds | |
File and Directory Information Exposure | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Directory Traversal | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Incorrect Permission Assignment for Critical Resource | |
Improper Initialization | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
CVE-2017-7820 | |
CVE-2017-7835 | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Open Redirect | |
Out-of-Bounds | |
Origin Validation Error | |
Improper Input Validation | |
Link Following | |
Missing Authorization | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Missing Authorization | |
Improper Input Validation | |
Out-of-bounds Read | |
CVE-2017-7822 | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
CVE-2017-7830 | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
CVE-2017-7781 | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Improper Preservation of Permissions | |
Out-of-Bounds | |
CVE-2017-5455 | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
CVE-2018-5117 | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Race Condition | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Files or Directories Accessible to External Parties | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Information Exposure | |
Use After Free | |
Use After Free | |
Information Exposure | |
Use After Free | |
CVE-2018-5105 | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
CVE-2018-5142 | |
Out-of-bounds Write | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Incorrect Calculation | |
Use After Free | |
Out-of-bounds Write | |
Open Redirect | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
DEPRECATED: Use of Uninitialized Resource | |
Information Exposure | |
Out-of-bounds Read | |
Out-of-Bounds | |
Use After Free | |
Cross-site Scripting (XSS) | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Out-of-bounds Read | |
Use After Free | |
CVE-2017-5390 | |
CVE-2018-5165 | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Use After Free | |
Information Exposure | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
CVE-2018-5168 | |
Use After Free | |
Origin Validation Error | |
Security Features | |
Improper Input Validation | |
Arbitrary Code Injection | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Security Features | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Use After Free | |
Information Exposure | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Improper Certificate Validation | |
Information Exposure | |
Use of a Broken or Risky Cryptographic Algorithm | |
Out-of-Bounds | |
CVE-2017-5386 | |
Improper Privilege Management | |
Information Exposure | |
Improper Input Validation | |
Use After Free | |
CVE-2017-5391 | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Incorrect Default Permissions | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Origin Validation Error | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Use After Free | |
Cross-site Scripting (XSS) | |
Improper Validation of Array Index | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Privilege Management | |
Information Exposure | |
CVE-2017-7789 | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Use After Free | |
Information Exposure | |
CVE-2017-5419 | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Allocation of Resources Without Limits or Throttling | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Incorrect Permission Assignment for Critical Resource | |
Uncontrolled Search Path Element | |
Information Exposure | |
Use After Free | |
Race Condition | |
Information Exposure | |
Out-of-bounds Read | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Out-of-Bounds | |
Out-of-bounds Write | |
Information Exposure | |
Use After Free | |
Out-of-bounds Read | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Incorrect Permission Assignment for Critical Resource | |
Use After Free | |
Out-of-Bounds | |
Security Features | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Error Handling | |
Out-of-Bounds | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Origin Validation Error | |
Improper Input Validation | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Access Control | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Improper Access Control | |
Use After Free | |
Information Exposure | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Information Exposure | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Security Features | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Use After Free | |
CVE-2016-2835 | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Incorrect Type Conversion or Cast | |
Integer Overflow or Wraparound | |
Information Exposure | |
Out-of-Bounds | |
CVE-2016-2834 | |
CVE-2016-2821 | |
CVE-2016-2828 | |
Out-of-Bounds | |
Improper Access Control | |
Out-of-Bounds | |
Security Features | |
Improper Access Control | |
Information Exposure | |
Out-of-Bounds | |
Improper Access Control | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Race Condition | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2016-2811 | |
Improper Access Control | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Access Control | |
Access Restriction Bypass | |
CVE-2016-1962 | |
Out-of-Bounds | |
CVE-2016-1960 | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2016-1973 | |
Out-of-Bounds | |
Improper Data Handling | |
Out-of-Bounds | |
Security Features | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Access Restriction Bypass | |
CVE-2016-1966 | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Data Handling | |
Numeric Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2016-1964 | |
Out-of-Bounds | |
CVE-2016-1961 | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
CVE-2016-1979 | |
Out-of-Bounds | |
Security Features | |
Out-of-Bounds | |
Access Restriction Bypass | |
CVE-2007-0801 | |
Access Restriction Bypass | |
CVE-2006-6502 | |
CVE-2006-6499 | |
Security Features | |
CVE-2006-6497 | |
CVE-2006-6498 | |
Arbitrary Code Injection | |
CVE-2006-6585 | |
CVE-2006-5463 | |
CVE-2006-5748 | |
CVE-2006-5464 | |
CVE-2006-5747 | |
CVE-2006-5462 | |
CVE-2006-5633 | |
CVE-2006-4571 | |
CVE-2006-4569 | |
Cross-site Scripting (XSS) | |
CVE-2006-4567 | |
CVE-2006-4566 | |
Out-of-Bounds | |
Improper Input Validation | |
CVE-2006-4561 | |
Improper Input Validation | |
Access Restriction Bypass | |
CVE-2006-3812 | |
CVE-2006-3113 | |
CVE-2006-3808 | |
CVE-2006-3811 | |
CVE-2006-3809 | |
CVE-2006-3802 | |
CVE-2006-3805 | |
CVE-2006-3801 | |
CVE-2006-3810 | |
CVE-2006-3807 | |
Numeric Errors | |
CVE-2006-3803 | |
Configuration | |
CVE-2006-3731 | |
Out-of-Bounds | |
CVE-2006-2786 | |
CVE-2006-2787 | |
Access Restriction Bypass | |
Arbitrary Code Injection | |
Improper Input Validation | |
CVE-2006-2785 | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
CVE-2006-2777 | |
CVE-2006-2778 | |
CVE-2006-2776 | |
CVE-2006-2723 | |
CVE-2006-2332 | |
Resource Management Errors | |
CVE-2006-1942 | |
Resource Management Errors | |
CVE-2006-1738 | |
Numeric Errors | |
CVE-2006-1529 | |
CVE-2006-1740 | |
Access Restriction Bypass | |
CVE-2006-1736 | |
CVE-2006-1727 | |
CVE-2006-1723 | |
CVE-2006-1742 | |
Improper Input Validation | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
CVE-2006-1728 | |
CVE-2006-1724 | |
Access Restriction Bypass | |
CVE-2006-1734 | |
CVE-2006-1732 | |
Resource Management Errors | |
Access Restriction Bypass | |
Numeric Errors | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2006-1530 | |
CVE-2006-1531 | |
CVE-2006-1045 | |
Improper Input Validation | |
CVE-2006-0299 | |
Improper Input Validation | |
CVE-2006-0297 | |
CVE-2006-0292 | |
CVE-2006-0295 | |
CVE-2006-0296 | |
CVE-2006-0294 | |
CVE-2006-0293 | |
CVE-2005-4685 | |
CVE-2005-4720 | |
CVE-2005-4134 | |
CVE-2005-3896 | |
CVE-2005-2353 | |
CVE-2005-2414 | |
CVE-2005-2395 | |
CVE-2004-1639 | |