| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Incorrect Calculation of Buffer Size | |
| Improper Validation of Integrity Check Value | |
| Heap-based Buffer Overflow | |
| Information Exposure | |
| Function Call with Incorrectly Specified Arguments | |
| Improper Isolation or Compartmentalization | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| External Control of Assumed-Immutable Web Parameter | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Type Confusion | |
| Out-of-bounds Read | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | |
| Heap-based Buffer Overflow | |
| Out-of-Bounds | |
| Heap-based Buffer Overflow | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
| Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
| Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
| Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
| Denial of Service (DoS) | |
| Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
| Use After Free | |
| Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
| Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
| Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
| Access Restriction Bypass | [20.0.0,20.3.9)[21.0.0,21.3.4) |
| Access Restriction Bypass | [20.0.0,20.3.9)[21.0.0,21.3.4) |
| Heap-based Buffer Overflow | [19.0.0,19.1.8)[20.0.0,20.3.8) |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Type Confusion | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | [18.0.0,18.3.14)[19.0.0,19.1.1) |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Improper Authentication | |
| Use After Free | |
| Access Control Bypass | [,18.3.9)[19.0.0,19.0.12) |
| Buffer Overflow | [,18.3.8)[19.0.0,19.0.13) |
| Improper Input Validation | [,18.3.8)[19.0.0,19.0.13) |
| Information Exposure | [,18.3.9)[19.0.0,19.0.12) |
| Denial of Service (DoS) | [,17.4.11)[18.0.0,18.3.7) |
| Type Confusion | |
| Heap-based Buffer Overflow | |
| Use After Free | [,16.2.6)[17.0.0,17.4.3)[18.0.0,18.2.2) |
| Protection Mechanism Failure | [,17.4.9)[18.0.0,18.3.6)[19.0.0,19.0.7) |
| Arbitrary File Read | [17.0.0,17.4.8)[18.0.0,18.3.5) |
| Use After Free | |
| Exposure of Resource to Wrong Sphere | [,15.5.6)[16.0.0,16.2.6)[17.0.0,17.2.0)[18.0.0-beta.1,18.0.0) |
| Improper Input Validation | |
| Improper Input Validation | |
| Heap-based Buffer Overflow | [,15.5.6)[16.0.0-alpha.1,16.2.7)[17.0.0-alpha.1,17.4.5) |
| Insecure Defaults | |
| Use After Free | [,15.5.6)[16.0.0-alpha.1,16.2.7)[17.0.0-alpha.1,17.4.5) |
| Use After Free | [,16.2.4)[17.0.0-alpha.1,17.4.2) |
| Use After Free | [,15.5.6)[16.0.0-alpha.1,16.2.6)[17.0.0-alpha.1,17.4.4) |
| Inappropriate implementation | [,15.5.5)[16.0.0,16.2.6)[17.0.0,17.4.4)[18.0.0,18.2.2) |
| Improper Input Validation | [,15.5.4)[16.0.0,16.2.6)[17.0.0,17.4.3)[18.0.0,18.2.2) |
| Use After Free | [,15.5.4)[16.0.0,16.2.6)[17.0.0,17.4.3) |
| Type Confusion | |
| Type Confusion | |
| Improper implementation | |
| Heap-based Buffer Overflow | |
| Inappropriate implementation | |
| Use After Free | [,15.5.4)[16.0.0,16.2.5)[17.0.0,17.4.3) |
| Inappropriate implementation | [,15.5.4)[16.0.0,16.2.3)[17.0.0,17.4.1) |
| Heap-based Buffer Overflow | [13.0.0,14.2.4)[15.0.0,15.3.5) |
| Type Confusion | |
| Information Exposure | [,14.2.8)[15.0.0,15.4.2)[16.0.0,16.2.0) |
| Heap-based Buffer Overflow | [14.0.0,14.2.9)[15.0.0,15.4.2)[16.0.0,16.2.0) |
| Use After Free | [14.0.0,14.2.8)[15.0.0,15.4.2)[16.0.0,16.2.0) |
| Type Confusion | |
| Use After Free | |
| Improper Access Control | |
| Use After Free | |
| Improper Check or Handling of Exceptional Conditions | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Use After Free | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Improper Control of a Resource Through its Lifetime | |
| Interger Underflow | |
| Use After Free | |
| Use After Free | |
| Type Confusion | |
| Type Confusion | [,13.6.8)[14.0.0,14.2.5)[15.0.0,15.3.6) |
| Use After Free | [,13.6.6)[14.0.0,14.2.4)[15.0.0,15.3.5) |
| Improper Input Validation | |
| Heap-based Buffer Overflow | |
| Type Confusion | |
| Type Confusion | |
| Inappropriate Implementation | |
| Inappropriate Implementation | |
| Use After Free | |
| Domain Spoofing | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Type Confusion | |
| Heap-based Buffer Overflow | |
| Information Exposure | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Exposure of Resource to Wrong Sphere | |
| Improper Access Control | |
| Sandbox Bypass | [,12.2.2)[13.0.0,13.5.2)[14.0.0,14.2.0) |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Buffer Overflow | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Type Confusion | |
| Out-of-Bounds | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Type Confusion | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Race Condition | |
| Use After Free | |
| Type Confusion | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Out Of Bounds Read | [,10.4.4)[11.0.0,11.4.4)[12.0.0,12.0.6) |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Integer Overflow | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds | [11.0.0,11.4.4)[12.0.0,12.0.6)[,10.4.4) |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Insecure Defaults | |
| Use After Free | |
| Information Exposure | |
| Heap Buffer Overflow | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Insufficient Validation | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Information Exposure | |
| Use After Free | |
| Insufficient Validation | |
| Improper Validation | |
| Use After Free | |
| Improper Access Control | |
| Improper Input Validation | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Access Control | |
| Use After Free | |
| Type Confusion | |
| Use After Free | |
| Privilege Escalation | |
| Arbitrary File Read | |
| Privilege Escalation | |
| Privilege Escalation | [,6.1.11)[7.0.0,7.2.4)[8.0.0,8.2.4) |
| Type Confusion | |
| Use After Free | |
| Buffer Overflow | |
| Use After Free | |
| Improper Validation | |
| Use After Free | |
| Type Confusion | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Buffer Underflow | [,6.1.10)[7.0.0,7.2.2)[8.0.0-beta.1,8.2.0) |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Site Isolation Bypass | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Access Control | |
| Heap Overflow | |
| Use After Free | |
| Out-of-bounds Read | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Privilege Escalation | |
| Use After Free | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| URL Spoofing | |
| Directory Traversal | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Arbitrary Code Injection | |
| Denial of Service (DoS) | [1.3.0,1.3.13)[1.4.0,1.4.11) |
| Uninitialized Memory Exposure | |
| Arbitrary Code Execution | |