Access of Memory Location After End of Buffer | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Improper Authorization | |
CVE-2023-42956 | |
Use After Free | |
CVE-2023-42843 | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2023-32359 | |
Improper Input Validation | |
Improper Input Validation | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Enforcement of Behavioral Workflow | |
CVE-2024-23226 | |
CVE-2024-23252 | |
CVE-2024-23263 | |
CVE-2024-23254 | |
CVE-2024-23284 | |
CVE-2024-23280 | |
CVE-2024-23213 | |
Use After Free | |
CVE-2023-42833 | |
Resource Exhaustion | |
CVE-2024-23206 | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Write | |
Improper Input Validation | |
CVE-2023-40451 | |
CVE-2023-41074 | |
Use After Free | |
Use After Free | |
CVE-2023-35074 | |
Improper Check for Unusual or Exceptional Conditions | |
Static Code Injection | |
CVE-2023-32370 | |
Use After Free | |
CVE-2022-32816 | |
Out-of-bounds Write | |
Overly Permissive Cross-domain Whitelist | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Overly Permissive Cross-domain Whitelist | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Protection Mechanism Failure | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
CVE-2022-46692 | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
CVE-2022-42852 | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
CVE-2022-42824 | |
Improper Restriction of Rendered UI Layers or Frames | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-Bounds | |
Out-of-bounds Write | |
Buffer Overflow | |
Out-of-bounds Read | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Use After Free | |
CVE-2022-22637 | |
Use After Free | |
Buffer Overflow | |
Improper Restriction of Rendered UI Layers or Frames | |
Use After Free | |
Improper Use of Validation Framework | |
Origin Validation Error | |
Use After Free | |
Race Condition | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Buffer Overflow | |
Memory Leak | |
Use After Free | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Open Redirect | |
CVE-2021-30887 | |
Out-of-bounds Read | |
CVE-2021-30823 | |
Cross-site Scripting (XSS) | |
Buffer Overflow | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
CVE-2010-3114 | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2010-3115 | |
Use After Free | |
Integer Overflow or Wraparound | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Write | |
CVE-2010-1790 | |
Out-of-Bounds | |
Resource Management Errors | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-bounds Read | |
Use After Free | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-Bounds | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Race Condition | |
Always-Incorrect Control Flow Implementation | |
Resource Exhaustion | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Origin Validation Error | |
Use After Free | |
Improper Enforcement of Behavioral Workflow | |
Resource Exhaustion | |
Out-of-bounds Write | |
Arbitrary Command Injection | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Enforcement of Behavioral Workflow | |
Use After Free | |
Improper Enforcement of Behavioral Workflow | |
Use After Free | |
Improper Access Control | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Enforcement of Behavioral Workflow | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Restriction of Rendered UI Layers or Frames | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Arbitrary Code Injection | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Information Exposure | |
Out-of-Bounds | |
Use After Free | |
Integer Overflow or Wraparound | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Arbitrary Code Injection | |
Out-of-bounds Write | |
Improper Validation of Array Index | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Arbitrary Code Injection | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Arbitrary Code Injection | |
Out-of-bounds Write | |
Arbitrary Code Injection | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Arbitrary Code Injection | |
Out-of-bounds Write | |
Arbitrary Code Injection | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Use After Free | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Improper Certificate Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Improper Input Validation | |
Incorrect Authorization | |
Incorrect Authorization | |
Information Exposure | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Incomplete Cleanup | |
Use After Free | |
Use After Free | |
CVE-2015-1212 | |
Use After Free | |
Use After Free | |
Use After Free | |
Access Restriction Bypass | |
Incorrect Type Conversion or Cast | |
CVE-2010-4205 | |
CVE-2010-4578 | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
CVE-2010-4037 | |
Use After Free | |
Integer Overflow or Wraparound | |
CVE-2014-7910 | |
Use After Free | |
Out-of-Bounds | |
CVE-2014-3200 | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Out-of-Bounds | |
Off-by-one Error | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2014-1300 | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Heap-based Buffer Overflow | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Resource Management Errors | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |