Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Type Confusion
| |
Out-of-bounds Read
| |
Heap-based Buffer Overflow
| |
Use After Free
| |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
| |
Heap-based Buffer Overflow
| |
Out-of-Bounds
| |
Heap-based Buffer Overflow
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Denial of Service (DoS)
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Use After Free
|
[20.0.0,20.3.9)
[21.0.0,21.3.4)
|
Use After Free
|
[20.0.0,20.3.9)
[21.0.0,21.3.4)
|
Use After Free
|
[20.0.0,20.3.9)
[21.0.0,21.3.4)
|
Use After Free
|
[20.0.0,20.3.9)
[21.0.0,21.3.4)
|
Denial of Service (DoS)
| |
Use After Free
|
[20.0.0,20.3.9)
[21.0.0,21.3.4)
|
Use After Free
| |
Use After Free
|
[20.0.0,20.3.9)
[21.0.0,21.3.4)
|
Use After Free
|
[20.0.0,20.3.9)
[21.0.0,21.3.4)
|
Use After Free
|
[20.0.0,20.3.9)
[21.0.0,21.3.4)
|
Access Restriction Bypass
|
[20.0.0,20.3.9)
[21.0.0,21.3.4)
|
Access Restriction Bypass
|
[20.0.0,20.3.9)
[21.0.0,21.3.4)
|
Heap-based Buffer Overflow
|
[19.0.0,19.1.8)
[20.0.0,20.3.8)
|
Use After Free
| |
Heap-based Buffer Overflow
| |
Denial of Service (DoS)
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Improper Input Validation
| |
Type Confusion
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
|
[18.0.0,18.3.14)
[19.0.0,19.1.1)
|
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Denial of Service (DoS)
| |
Use After Free
| |
Use After Free
| |
Improper Authentication
| |
Use After Free
| |
Access Control Bypass
|
[,18.3.9)
[19.0.0,19.0.12)
|
Buffer Overflow
|
[,18.3.8)
[19.0.0,19.0.13)
|
Improper Input Validation
|
[,18.3.8)
[19.0.0,19.0.13)
|
Information Exposure
|
[,18.3.9)
[19.0.0,19.0.12)
|
Denial of Service (DoS)
|
[,17.4.11)
[18.0.0,18.3.7)
|
Type Confusion
| |
Heap-based Buffer Overflow
| |
Use After Free
|
[,16.2.6)
[17.0.0,17.4.3)
[18.0.0,18.2.2)
|
Protection Mechanism Failure
|
[,17.4.9)
[18.0.0,18.3.6)
[19.0.0,19.0.7)
|
Arbitrary File Read
|
[17.0.0,17.4.8)
[18.0.0,18.3.5)
|
Use After Free
| |
Exposure of Resource to Wrong Sphere
|
[,15.5.6)
[16.0.0,16.2.6)
[17.0.0,17.2.0)
[18.0.0-beta.1,18.0.0)
|
Improper Input Validation
| |
Improper Input Validation
| |
Heap-based Buffer Overflow
|
[,15.5.6)
[16.0.0-alpha.1,16.2.7)
[17.0.0-alpha.1,17.4.5)
|
Insecure Defaults
| |
Use After Free
|
[,15.5.6)
[16.0.0-alpha.1,16.2.7)
[17.0.0-alpha.1,17.4.5)
|
Use After Free
|
[,16.2.4)
[17.0.0-alpha.1,17.4.2)
|
Use After Free
|
[,15.5.6)
[16.0.0-alpha.1,16.2.6)
[17.0.0-alpha.1,17.4.4)
|
Inappropriate implementation
|
[,15.5.5)
[16.0.0,16.2.6)
[17.0.0,17.4.4)
[18.0.0,18.2.2)
|
Improper Input Validation
|
[,15.5.4)
[16.0.0,16.2.6)
[17.0.0,17.4.3)
[18.0.0,18.2.2)
|
Use After Free
|
[,15.5.4)
[16.0.0,16.2.6)
[17.0.0,17.4.3)
|
Type Confusion
| |
Type Confusion
| |
Improper implementation
| |
Heap-based Buffer Overflow
|
[,16.2.5)
[17.0.0,17.4.3)
|
Inappropriate implementation
|
[,16.2.5)
[17.0.0,17.4.3)
|
Use After Free
|
[,15.5.4)
[16.0.0,16.2.5)
[17.0.0,17.4.3)
|
Inappropriate implementation
|
[,15.5.4)
[16.0.0,16.2.3)
[17.0.0,17.4.1)
|
Heap-based Buffer Overflow
|
[13.0.0,14.2.4)
[15.0.0,15.3.5)
|
Type Confusion
| |
Information Exposure
|
[,14.2.8)
[15.0.0,15.4.2)
[16.0.0,16.2.0)
|
Heap-based Buffer Overflow
|
[14.0.0,14.2.9)
[15.0.0,15.4.2)
[16.0.0,16.2.0)
|
Use After Free
|
[14.0.0,14.2.8)
[15.0.0,15.4.2)
[16.0.0,16.2.0)
|
Type Confusion
| |
Use After Free
| |
Improper Access Control
| |
Use After Free
| |
Improper Check or Handling of Exceptional Conditions
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Use After Free
| |
Incorrect Authorization
| |
Incorrect Authorization
| |
Improper Input Validation
| |
Improper Control of a Resource Through its Lifetime
| |
Interger Underflow
| |
Use After Free
| |
Use After Free
| |
Type Confusion
| |
Type Confusion
|
[,13.6.8)
[14.0.0,14.2.5)
[15.0.0,15.3.6)
|
Use After Free
|
[,13.6.6)
[14.0.0,14.2.4)
[15.0.0,15.3.5)
|
Improper Input Validation
| |
Heap-based Buffer Overflow
| |
Type Confusion
| |
Type Confusion
| |
Inappropriate Implementation
| |
Inappropriate Implementation
| |
Use After Free
| |
Domain Spoofing
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Type Confusion
| |
Heap-based Buffer Overflow
| |
Information Exposure
| |
Heap-based Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Exposure of Resource to Wrong Sphere
| |
Improper Access Control
| |
Sandbox Bypass
|
[,12.2.2)
[13.0.0,13.5.2)
[14.0.0,14.2.0)
|
Information Exposure
| |
Improper Input Validation
|
[13.0.0,13.5.1)
[,12.2.1)
|
Use After Free
|
[13.0.0,13.5.0)
[,12.2.0)
|
Buffer Overflow
|
[13.0.0,13.5.0)
[,12.2.0)
|
Out-of-Bounds
|
[13.0.0,13.5.0)
[,12.2.0)
|
Access Restriction Bypass
|
[13.0.0,13.5.0)
[,12.2.0)
|
Type Confusion
| |
Out-of-Bounds
| |
Heap-based Buffer Overflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Type Confusion
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Race Condition
| |
Use After Free
| |
Type Confusion
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Heap-based Buffer Overflow
| |
Out Of Bounds Read
|
[,10.4.4)
[11.0.0,11.4.4)
[12.0.0,12.0.6)
|
Improper Input Validation
|
[,11.4.4)
[12.0.0,12.0.6)
|
Integer Overflow or Wraparound
|
[,10.4.4)
[12.0.0,12.0.6)
|
Use After Free
|
[,11.4.4)
[12.0.0,12.0.6)
|
Integer Overflow
| |
Heap-based Buffer Overflow
| |
Out-of-bounds Read
|
[11.0.0,11.4.4)
[,10.4.4)
|
Use After Free
|
[11.0.0,11.4.4)
[,10.4.4)
|
Use After Free
|
[11.0.0,11.4.4)
[,10.4.4)
|
Out-of-bounds
|
[11.0.0,11.4.4)
[12.0.0,12.0.6)
[,10.4.4)
|
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Insecure Defaults
| |
Use After Free
| |
Heap Buffer Overflow
| |
Information Exposure
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Insufficient Validation
| |
Use After Free
| |
Information Exposure
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Information Exposure
| |
Use After Free
| |
Insufficient Validation
| |
Improper Validation
| |
Use After Free
| |
Improper Access Control
| |
Improper Input Validation
| |
Heap-based Buffer Overflow
| |
Use After Free
| |
Heap-based Buffer Overflow
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Access Control
| |
Use After Free
| |
Use After Free
| |
Type Confusion
| |
Arbitrary File Read
| |
Privilege Escalation
| |
Privilege Escalation
| |
Privilege Escalation
|
[,6.1.11)
[7.0.0,7.2.4)
[8.0.0,8.2.4)
|
Type Confusion
| |
Use After Free
| |
Buffer Overflow
| |
Use After Free
| |
Improper Validation
| |
Use After Free
| |
Type Confusion
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Buffer Underflow
|
[,6.1.10)
[7.0.0,7.2.2)
[8.0.0-beta.1,8.2.0)
|
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Site Isolation Bypass
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Access Control
| |
Use After Free
| |
Heap Overflow
| |
Use After Free
| |
Out-of-bounds Read
| |
Arbitrary Code Execution
| |
Arbitrary Code Execution
| |
Privilege Escalation
| |
Use After Free
| |
Arbitrary Code Execution
| |
Arbitrary Code Execution
| |
Arbitrary Code Execution
| |
URL Spoofing
| |
Directory Traversal
| |
Denial of Service (DoS)
| |
Denial of Service (DoS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Denial of Service (DoS)
| |
Arbitrary Code Injection
| |
Denial of Service (DoS)
|
[1.3.0,1.3.13)
[1.4.0,1.4.11)
|
Uninitialized Memory Exposure
| |
Arbitrary Code Execution
| |