|
Improper Authorization
| |
|
Use After Free
| |
|
CVE-2023-42843
| |
|
CVE-2023-42956
| |
|
Out-of-Bounds
| |
|
CVE-2023-32359
| |
|
Improper Enforcement of Behavioral Workflow
| |
|
Out-of-Bounds
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Restriction of Rendered UI Layers or Frames
| |
|
CVE-2024-23280
| |
|
CVE-2024-23263
| |
|
CVE-2024-23254
| |
|
CVE-2024-23252
| |
|
CVE-2024-23284
| |
|
CVE-2023-42833
| |
|
CVE-2024-23213
| |
|
CVE-2024-23226
| |
|
Use After Free
| |
|
Resource Exhaustion
| |
|
CVE-2024-23206
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-bounds Write
| |
|
Improper Input Validation
| |
|
CVE-2023-40451
| |
|
CVE-2023-41074
| |
|
Use After Free
| |
|
Use After Free
| |
|
CVE-2023-35074
| |
|
Improper Check for Unusual or Exceptional Conditions
| |
|
Static Code Injection
| |
|
CVE-2023-32370
| |
|
Use After Free
| |
|
CVE-2022-32816
| |
|
Out-of-bounds Write
| |
|
Overly Permissive Cross-domain Whitelist
| |
|
Information Exposure
| |
|
Improper Input Validation
| |
|
Information Exposure
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Overly Permissive Cross-domain Whitelist
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Information Exposure
| |
|
Out-of-Bounds
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Use After Free
| |
|
Improper Input Validation
| |
|
Use After Free
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Use After Free
| |
|
Information Exposure
| |
|
Out-of-bounds Write
| |
|
CVE-2022-46692
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
CVE-2022-42852
| |
|
Use After Free
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
CVE-2022-42824
| |
|
Improper Restriction of Rendered UI Layers or Frames
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
Out-of-Bounds
| |
|
Out-of-bounds Write
| |
|
Buffer Overflow
| |
|
Out-of-bounds Read
| |
|
Out-of-Bounds
| |
|
Improper Input Validation
| |
|
Use After Free
| |
|
Information Exposure
| |
|
Use After Free
| |
|
Use After Free
| |
|
Improper Use of Validation Framework
| |
|
Improper Use of Validation Framework
| |
|
Improper Use of Validation Framework
| |
|
Use After Free
| |
|
CVE-2022-22637
| |
|
Use After Free
| |
|
Buffer Overflow
| |
|
Improper Restriction of Rendered UI Layers or Frames
| |
|
Use After Free
| |
|
Improper Use of Validation Framework
| |
|
Origin Validation Error
| |
|
Use After Free
| |
|
Race Condition
| |
|
Use After Free
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
Out-of-bounds Read
| |
|
Integer Overflow or Wraparound
| |
|
Buffer Overflow
| |
|
Memory Leak
| |
|
Use After Free
| |
|
Use After Free
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Open Redirect
| |
|
CVE-2021-30887
| |
|
Out-of-bounds Read
| |
|
CVE-2021-30823
| |
|
Cross-site Scripting (XSS)
| |
|
Buffer Overflow
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
Use After Free
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Use After Free
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Information Exposure
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Cross-site Scripting (XSS)
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Integer Overflow or Wraparound
| |
|
Improper Input Validation
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Use After Free
| |
|
Use After Free
| |
|
Use After Free
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Directory Traversal
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Stack-based Buffer Overflow
| |
|
Stack-based Buffer Overflow
| |
|
Stack-based Buffer Overflow
| |
|
Stack-based Buffer Overflow
| |
|
Stack-based Buffer Overflow
| |
|
Stack-based Buffer Overflow
| |
|
Stack-based Buffer Overflow
| |
|
Stack-based Buffer Overflow
| |
|
Stack-based Buffer Overflow
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
NULL Pointer Dereference
| |
|
NULL Pointer Dereference
| |
|
NULL Pointer Dereference
| |
|
NULL Pointer Dereference
| |
|
NULL Pointer Dereference
| |
|
NULL Pointer Dereference
| |
|
NULL Pointer Dereference
| |
|
NULL Pointer Dereference
| |
|
NULL Pointer Dereference
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Cross-site Scripting (XSS)
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Cross-site Scripting (XSS)
| |
|
Race Condition
| |
|
Always-Incorrect Control Flow Implementation
| |
|
Resource Exhaustion
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
Origin Validation Error
| |
|
Use After Free
| |
|
Improper Enforcement of Behavioral Workflow
| |
|
Resource Exhaustion
| |
|
Out-of-bounds Write
| |
|
Arbitrary Command Injection
| |
|
Improper Input Validation
| |
|
Out-of-Bounds
| |
|
Improper Enforcement of Behavioral Workflow
| |
|
Use After Free
| |
|
Improper Enforcement of Behavioral Workflow
| |
|
Use After Free
| |
|
Improper Access Control
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Improper Enforcement of Behavioral Workflow
| |
|
Improper Input Validation
| |
|
Out-of-bounds Write
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Use After Free
| |
|
Cross-site Scripting (XSS)
| |
|
Out-of-Bounds
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Improper Restriction of Rendered UI Layers or Frames
| |
|
Information Exposure
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Cross-site Scripting (XSS)
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Cross-site Scripting (XSS)
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Improper Input Validation
| |
|
Use After Free
| |
|
Out-of-bounds Write
| |
|
Use After Free
| |
|
Information Exposure
| |
|
Out-of-Bounds
| |
|
Use After Free
| |
|
Integer Overflow or Wraparound
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
Arbitrary Code Injection
| |
|
Out-of-bounds Write
| |
|
Improper Validation of Array Index
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Arbitrary Code Injection
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Read
| |
|
Arbitrary Code Injection
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Read
| |
|
Arbitrary Code Injection
| |
|
Out-of-bounds Write
| |
|
Arbitrary Code Injection
| |
|
Use After Free
| |
|
Out-of-bounds Write
| |
|
Use After Free
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Use After Free
| |
|
Out-of-bounds Write
| |
|
Cross-site Scripting (XSS)
| |
|
Improper Input Validation
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Use After Free
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Arbitrary Code Injection
| |
|
Out-of-bounds Write
| |
|
Arbitrary Code Injection
| |
|
Out-of-bounds Write
| |
|
Cross-site Scripting (XSS)
| |
|
Use After Free
| |
|
Arbitrary Code Injection
| |
|
Out-of-Bounds
| |
|
Information Exposure
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Out-of-bounds Read
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Improper Certificate Validation
| |
|
Out-of-Bounds
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Buffer Overflow
| |
|
Out-of-Bounds
| |
|
Uncontrolled Recursion
| |
|
Uncontrolled Recursion
| |
|
Uncontrolled Recursion
| |
|
Uncontrolled Recursion
| |
|
Uncontrolled Recursion
| |
|
Uncontrolled Recursion
| |
|
Uncontrolled Recursion
| |
|
Uncontrolled Recursion
| |
|
Uncontrolled Recursion
| |
|
Cross-site Scripting (XSS)
| |
|
Use After Free
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Cross-site Scripting (XSS)
| |
|
Out-of-Bounds
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Cross-site Scripting (XSS)
| |
|
Use After Free
| |
|
Out-of-bounds Write
| |
|
Out-of-Bounds
| |
|
Out-of-bounds Write
| |
|
Out-of-bounds Write
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Cross-site Scripting (XSS)
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Out-of-Bounds
| |
|
Improper Input Validation
| |
|
Use After Free
| |
|
Out-of-Bounds
| |
|
Improper Input Validation
| |
|
Incorrect Authorization
| |
|
Incorrect Authorization
| |
|
Information Exposure
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
Use After Free
| |
|
Incomplete Cleanup
| |
|
Use After Free
| |
|
Use After Free
| |