| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Access of Memory Location After End of Buffer | |
| CVE-2023-42956 | |
| Use After Free | |
| Authentication Bypass | |
| Access of Memory Location After End of Buffer | |
| Out-of-bounds Write | |
| Use After Free | |
| Origin Validation Error | |
| Access of Memory Location After End of Buffer | |
| CVE-2024-40866 | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2024-23284 | |
| Arbitrary Code Injection | |
| CVE-2024-23263 | |
| CVE-2024-23254 | |
| Out-of-bounds Write | |
| Origin Validation Error | |
| Access of Memory Location After End of Buffer | |
| CVE-2024-40866 | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2024-23284 | |
| Arbitrary Code Injection | |
| CVE-2024-23263 | |
| CVE-2024-23254 | |
| Access of Memory Location After End of Buffer | |
| Access of Memory Location After End of Buffer | |
| CVE-2023-42956 | |
| Use After Free | |
| Authentication Bypass | |
| Use After Free | |
| CVE-2023-42956 | |
| Use After Free | |
| Authentication Bypass | |
| Out-of-bounds Write | |
| Use After Free | |
| Origin Validation Error | |
| Access of Memory Location After End of Buffer | |
| CVE-2024-40866 | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2024-23284 | |
| Arbitrary Code Injection | |
| CVE-2024-23263 | |
| CVE-2024-23254 | |
| Out-of-bounds Write | |
| Origin Validation Error | |
| Access of Memory Location After End of Buffer | |
| CVE-2024-40866 | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2024-23284 | |
| Arbitrary Code Injection | |
| CVE-2024-23263 | |
| CVE-2024-23254 | |
| Use After Free | |
| CVE-2023-42956 | |
| Use After Free | |
| Authentication Bypass | |
| Overly Permissive Cross-domain Whitelist | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| CVE-2023-32359 | |
| Resource Exhaustion | |
| Overly Permissive Cross-domain Whitelist | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| CVE-2023-32359 | |
| Resource Exhaustion | |
| Use After Free | |
| Overly Permissive Cross-domain Whitelist | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| CVE-2023-32359 | |
| Resource Exhaustion | |
| Overly Permissive Cross-domain Whitelist | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| CVE-2023-32359 | |
| Resource Exhaustion | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2023-42833 | |
| CVE-2023-40451 | |
| Static Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2023-32370 | |
| Information Exposure | |
| Overly Permissive Cross-domain Whitelist | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Restriction of Rendered UI Layers or Frames | |
| CVE-2023-42833 | |
| CVE-2023-40451 | |
| Static Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2023-32370 | |
| Information Exposure | |
| Overly Permissive Cross-domain Whitelist | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Restriction of Rendered UI Layers or Frames | |
| CVE-2023-42833 | |
| CVE-2023-40451 | |
| Static Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2023-32370 | |
| Information Exposure | |
| Overly Permissive Cross-domain Whitelist | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Restriction of Rendered UI Layers or Frames | |
| CVE-2023-42833 | |
| CVE-2023-40451 | |
| Static Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2023-32370 | |
| Information Exposure | |
| Overly Permissive Cross-domain Whitelist | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Restriction of Rendered UI Layers or Frames | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Use After Free | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Authorization | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2024-23252 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Input Validation | |
| Improper Check for Unusual or Exceptional Conditions | |
| CVE-2023-41074 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| CVE-2023-35074 | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Use After Free | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Use After Free | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Authorization | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2024-23252 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Input Validation | |
| Improper Check for Unusual or Exceptional Conditions | |
| CVE-2023-41074 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| CVE-2023-35074 | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2022-46692 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2022-42852 | |
| Use After Free | |
| CVE-2022-42824 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2022-46692 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2022-42852 | |
| Use After Free | |
| CVE-2022-42824 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2022-46692 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2022-42852 | |
| Use After Free | |
| CVE-2022-42824 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2022-46692 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2022-42852 | |
| Use After Free | |
| CVE-2022-42824 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-Bounds | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Buffer Overflow | |
| CVE-2022-32816 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Information Exposure | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Buffer Overflow | |
| CVE-2022-32816 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Information Exposure | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-Bounds | |
| Buffer Overflow | |
| CVE-2022-32816 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Information Exposure | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Buffer Overflow | |
| CVE-2022-32816 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Information Exposure | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Improper Neutralization of Equivalent Special Elements | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Exposure of Private Information ('Privacy Violation') | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Neutralization of Equivalent Special Elements | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Exposure of Private Information ('Privacy Violation') | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Neutralization of Equivalent Special Elements | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Exposure of Private Information ('Privacy Violation') | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Neutralization of Equivalent Special Elements | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Exposure of Private Information ('Privacy Violation') | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Neutralization of Equivalent Special Elements | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Exposure of Private Information ('Privacy Violation') | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Improper Validation of Array Index | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Improper Validation of Array Index | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Neutralization of Equivalent Special Elements | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Exposure of Private Information ('Privacy Violation') | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Neutralization of Equivalent Special Elements | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Exposure of Private Information ('Privacy Violation') | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | |
| Improper Neutralization of Equivalent Special Elements | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Exposure of Private Information ('Privacy Violation') | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Validation of Array Index | |
| Improper Neutralization of Equivalent Special Elements | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Exposure of Private Information ('Privacy Violation') | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Validation of Array Index | |
| Improper Neutralization of Equivalent Special Elements | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Exposure of Private Information ('Privacy Violation') | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Use After Free | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Authorization | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2024-23252 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Input Validation | |
| Improper Check for Unusual or Exceptional Conditions | |
| CVE-2023-41074 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| CVE-2023-35074 | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Use After Free | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Use After Free | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Authorization | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2024-23252 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Input Validation | |
| Improper Check for Unusual or Exceptional Conditions | |
| CVE-2023-41074 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| CVE-2023-35074 | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Use After Free | |
| Improper Input Validation | |
| Improper Validation of Array Index | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Improper Validation of Array Index | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Improper Validation of Array Index | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Neutralization of Equivalent Special Elements | |
| Out-of-bounds Read | |
| Improper Check or Handling of Exceptional Conditions | |
| Allocation of Resources Without Limits or Throttling | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Exposure of Private Information ('Privacy Violation') | |
| Improper Validation of Array Index | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2022-46692 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2022-42852 | |
| Use After Free | |
| CVE-2022-42824 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2022-46692 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2022-42852 | |
| Use After Free | |
| CVE-2022-42824 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2022-46692 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2022-42852 | |
| Use After Free | |
| CVE-2022-42824 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Buffer Overflow | |
| CVE-2022-32816 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Information Exposure | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Buffer Overflow | |
| CVE-2022-32816 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Information Exposure | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Buffer Overflow | |
| CVE-2022-32816 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Information Exposure | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| Arbitrary Code Injection | |
| Use After Free | |
| Use After Free | |
| Arbitrary Code Injection | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Arbitrary Code Injection | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| NULL Pointer Dereference | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improperly Implemented Security Check for Standard | |
| Access of Memory Location After End of Buffer | |
| Improperly Implemented Security Check for Standard | |
| Access of Memory Location After End of Buffer | |
| Information Exposure | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| CVE-2024-23284 | |
| Arbitrary Code Injection | |
| CVE-2024-23263 | |
| CVE-2024-23254 | |
| Arbitrary Code Injection | |
| CVE-2024-23284 | |
| Arbitrary Code Injection | |
| CVE-2024-23263 | |
| CVE-2024-23254 | |
| CVE-2024-23284 | |
| Arbitrary Code Injection | |
| CVE-2024-23263 | |
| CVE-2024-23254 | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| CVE-2024-23284 | |
| Arbitrary Code Injection | |
| CVE-2024-23263 | |
| CVE-2024-23254 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2023-42956 | |
| Use After Free | |
| Authentication Bypass | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| CVE-2023-32359 | |
| Resource Exhaustion | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Improper Authorization | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2024-23252 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Input Validation | |
| Improper Check for Unusual or Exceptional Conditions | |
| CVE-2023-41074 | |
| Arbitrary Code Injection | |
| CVE-2023-35074 | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| CVE-2023-42833 | |
| CVE-2023-40451 | |
| Static Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2023-32370 | |
| Use After Free | |
| Information Exposure | |
| Overly Permissive Cross-domain Whitelist | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| CVE-2023-32359 | |
| Resource Exhaustion | |
| Cross-site Scripting (XSS) | |
| CVE-2023-42833 | |
| CVE-2023-40451 | |
| Static Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2023-32370 | |
| Information Exposure | |
| Overly Permissive Cross-domain Whitelist | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Improper Authorization | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2024-23252 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Input Validation | |
| Improper Check for Unusual or Exceptional Conditions | |
| CVE-2023-41074 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| CVE-2023-35074 | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Use After Free | |
| Improper Input Validation | |
| Access of Memory Location After End of Buffer | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| CVE-2023-32359 | |
| Resource Exhaustion | |
| Out-of-bounds Write | |
| CVE-2023-42833 | |
| CVE-2023-40451 | |
| Static Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2023-32370 | |
| Information Exposure | |
| Overly Permissive Cross-domain Whitelist | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Cross-site Scripting (XSS) | |
| Improper Authorization | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2024-23252 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Input Validation | |
| Improper Check for Unusual or Exceptional Conditions | |
| CVE-2023-41074 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| CVE-2023-35074 | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Origin Validation Error | |
| Access of Memory Location After End of Buffer | |
| CVE-2024-40866 | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Out-of-bounds Write | |
| Use After Free | |
| Origin Validation Error | |
| Access of Memory Location After End of Buffer | |
| CVE-2024-40866 | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Out-of-bounds Write | |
| Use After Free | |
| Origin Validation Error | |
| Access of Memory Location After End of Buffer | |
| CVE-2024-40866 | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Arbitrary Code Injection | |
| Arbitrary Command Injection | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Missing Authorization | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-bounds Write | |
| Arbitrary Code Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Improper Resource Shutdown or Release | |
| Out-of-bounds Write | |
| Improper Resource Shutdown or Release | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Access of Memory Location After End of Buffer | |
| Cross-site Scripting (XSS) | |
| Improperly Implemented Security Check for Standard | |
| Access of Memory Location After End of Buffer | |
| Access of Memory Location After End of Buffer | |
| Access of Memory Location After End of Buffer | |
| Access of Memory Location After End of Buffer | |
| Access of Memory Location After End of Buffer | |
| Access of Memory Location After End of Buffer | |
| Access of Memory Location After End of Buffer | |
| Access of Memory Location After End of Buffer | |
| Access of Memory Location After End of Buffer | |
| Access of Memory Location After End of Buffer | |
| Improperly Implemented Security Check for Standard | |
| Access of Memory Location After End of Buffer | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Static Code Injection | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Static Code Injection | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Static Code Injection | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Static Code Injection | |
| Improper Input Validation | |
| Improper Authorization | |
| Out-of-Bounds | |
| CVE-2024-23252 | |
| Improper Input Validation | |
| CVE-2023-41074 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2023-35074 | |
| Use After Free | |
| Improper Input Validation | |
| Improper Authorization | |
| Out-of-Bounds | |
| CVE-2024-23252 | |
| Improper Input Validation | |
| CVE-2023-41074 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2023-35074 | |
| Use After Free | |
| Improper Input Validation | |
| Improper Authorization | |
| Out-of-Bounds | |
| CVE-2024-23252 | |
| Improper Input Validation | |
| CVE-2023-41074 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2023-35074 | |
| Use After Free | |
| Improper Input Validation | |
| Improper Authorization | |
| Out-of-Bounds | |
| CVE-2024-23252 | |
| Improper Input Validation | |
| CVE-2023-41074 | |
| CVE-2023-35074 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Origin Validation Error | |
| CVE-2024-40866 | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Origin Validation Error | |
| CVE-2024-40866 | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| CVE-2023-32359 | |
| Resource Exhaustion | |
| Out-of-bounds Write | |
| CVE-2023-42833 | |
| CVE-2023-40451 | |
| Static Code Injection | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2023-32370 | |
| Use After Free | |
| Information Exposure | |
| Overly Permissive Cross-domain Whitelist | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Check for Unusual or Exceptional Conditions | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Use After Free | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2022-46692 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2022-42852 | |
| Use After Free | |
| CVE-2022-42824 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-Bounds | |
| Buffer Overflow | |
| CVE-2022-32816 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Use After Free | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Information Exposure | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Authorization | |
| Authentication Bypass | |
| CVE-2023-42956 | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2023-32359 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Enforcement of Behavioral Workflow | |
| CVE-2024-23263 | |
| CVE-2024-23252 | |
| CVE-2024-23226 | |
| CVE-2024-23284 | |
| Arbitrary Code Injection | |
| CVE-2024-23254 | |
| CVE-2023-42833 | |
| Use After Free | |
| Resource Exhaustion | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| CVE-2023-40451 | |
| CVE-2023-41074 | |
| Use After Free | |
| CVE-2023-35074 | |
| Improper Check for Unusual or Exceptional Conditions | |
| Improper Check for Unusual or Exceptional Conditions | |
| Improper Check for Unusual or Exceptional Conditions | |
| Improper Check for Unusual or Exceptional Conditions | |
| Static Code Injection | |
| CVE-2023-32370 | |
| Use After Free | |
| CVE-2022-32816 | |
| CVE-2022-32816 | |
| CVE-2022-32816 | |
| CVE-2022-32816 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Overly Permissive Cross-domain Whitelist | |
| Information Exposure | |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Overly Permissive Cross-domain Whitelist | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2022-46692 | |
| CVE-2022-46692 | |
| CVE-2022-46692 | |
| CVE-2022-46692 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2022-42852 | |
| CVE-2022-42852 | |
| CVE-2022-42852 | |
| CVE-2022-42852 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2022-42824 | |
| CVE-2022-42824 | |
| CVE-2022-42824 | |
| CVE-2022-42824 | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |