Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Type Confusion | |
Out-of-bounds Read | |
Heap-based Buffer Overflow | |
Use After Free | |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | |
Heap-based Buffer Overflow | |
Out-of-Bounds | |
Heap-based Buffer Overflow | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
Denial of Service (DoS) | |
Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
Use After Free | |
Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
Use After Free | [20.0.0,20.3.9)[21.0.0,21.3.4) |
Access Restriction Bypass | [20.0.0,20.3.9)[21.0.0,21.3.4) |
Access Restriction Bypass | [20.0.0,20.3.9)[21.0.0,21.3.4) |
Heap-based Buffer Overflow | [19.0.0,19.1.8)[20.0.0,20.3.8) |
Use After Free | |
Heap-based Buffer Overflow | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Information Exposure | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Improper Input Validation | |
Type Confusion | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | [18.0.0,18.3.14)[19.0.0,19.1.1) |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Improper Authentication | |
Use After Free | |
Access Control Bypass | [,18.3.9)[19.0.0,19.0.12) |
Buffer Overflow | [,18.3.8)[19.0.0,19.0.13) |
Improper Input Validation | [,18.3.8)[19.0.0,19.0.13) |
Information Exposure | [,18.3.9)[19.0.0,19.0.12) |
Denial of Service (DoS) | [,17.4.11)[18.0.0,18.3.7) |
Type Confusion | |
Heap-based Buffer Overflow | |
Use After Free | [,16.2.6)[17.0.0,17.4.3)[18.0.0,18.2.2) |
Protection Mechanism Failure | [,17.4.9)[18.0.0,18.3.6)[19.0.0,19.0.7) |
Arbitrary File Read | [17.0.0,17.4.8)[18.0.0,18.3.5) |
Use After Free | |
Exposure of Resource to Wrong Sphere | [,15.5.6)[16.0.0,16.2.6)[17.0.0,17.2.0)[18.0.0-beta.1,18.0.0) |
Improper Input Validation | |
Improper Input Validation | |
Heap-based Buffer Overflow | [,15.5.6)[16.0.0-alpha.1,16.2.7)[17.0.0-alpha.1,17.4.5) |
Insecure Defaults | |
Use After Free | [,15.5.6)[16.0.0-alpha.1,16.2.7)[17.0.0-alpha.1,17.4.5) |
Use After Free | [,16.2.4)[17.0.0-alpha.1,17.4.2) |
Use After Free | [,15.5.6)[16.0.0-alpha.1,16.2.6)[17.0.0-alpha.1,17.4.4) |
Inappropriate implementation | [,15.5.5)[16.0.0,16.2.6)[17.0.0,17.4.4)[18.0.0,18.2.2) |
Improper Input Validation | [,15.5.4)[16.0.0,16.2.6)[17.0.0,17.4.3)[18.0.0,18.2.2) |
Use After Free | [,15.5.4)[16.0.0,16.2.6)[17.0.0,17.4.3) |
Type Confusion | |
Type Confusion | |
Improper implementation | |
Heap-based Buffer Overflow | |
Inappropriate implementation | |
Use After Free | [,15.5.4)[16.0.0,16.2.5)[17.0.0,17.4.3) |
Inappropriate implementation | [,15.5.4)[16.0.0,16.2.3)[17.0.0,17.4.1) |
Heap-based Buffer Overflow | [13.0.0,14.2.4)[15.0.0,15.3.5) |
Type Confusion | |
Information Exposure | [,14.2.8)[15.0.0,15.4.2)[16.0.0,16.2.0) |
Heap-based Buffer Overflow | [14.0.0,14.2.9)[15.0.0,15.4.2)[16.0.0,16.2.0) |
Use After Free | [14.0.0,14.2.8)[15.0.0,15.4.2)[16.0.0,16.2.0) |
Type Confusion | |
Use After Free | |
Improper Access Control | |
Use After Free | |
Improper Check or Handling of Exceptional Conditions | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Incorrect Authorization | |
Incorrect Authorization | |
Improper Input Validation | |
Improper Control of a Resource Through its Lifetime | |
Interger Underflow | |
Use After Free | |
Use After Free | |
Type Confusion | |
Type Confusion | [,13.6.8)[14.0.0,14.2.5)[15.0.0,15.3.6) |
Use After Free | [,13.6.6)[14.0.0,14.2.4)[15.0.0,15.3.5) |
Improper Input Validation | |
Heap-based Buffer Overflow | |
Type Confusion | |
Type Confusion | |
Inappropriate Implementation | |
Inappropriate Implementation | |
Use After Free | |
Domain Spoofing | |
Use After Free | |
Use After Free | |
Use After Free | |
Type Confusion | |
Heap-based Buffer Overflow | |
Information Exposure | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Exposure of Resource to Wrong Sphere | |
Improper Access Control | |
Sandbox Bypass | [,12.2.2)[13.0.0,13.5.2)[14.0.0,14.2.0) |
Information Exposure | |
Improper Input Validation | |
Use After Free | |
Buffer Overflow | |
Out-of-Bounds | |
Access Restriction Bypass | |
Type Confusion | |
Out-of-Bounds | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Type Confusion | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Race Condition | |
Use After Free | |
Type Confusion | |
Use After Free | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Out Of Bounds Read | [,10.4.4)[11.0.0,11.4.4)[12.0.0,12.0.6) |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Use After Free | |
Integer Overflow | |
Heap-based Buffer Overflow | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Out-of-bounds | [11.0.0,11.4.4)[12.0.0,12.0.6)[,10.4.4) |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Write | |
Insecure Defaults | |
Use After Free | |
Heap Buffer Overflow | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Insufficient Validation | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Information Exposure | |
Use After Free | |
Insufficient Validation | |
Improper Validation | |
Use After Free | |
Improper Access Control | |
Improper Input Validation | |
Heap-based Buffer Overflow | |
Use After Free | |
Heap-based Buffer Overflow | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Access Control | |
Use After Free | |
Type Confusion | |
Use After Free | |
Arbitrary File Read | |
Privilege Escalation | |
Privilege Escalation | [,6.1.11)[7.0.0,7.2.4)[8.0.0,8.2.4) |
Privilege Escalation | |
Type Confusion | |
Use After Free | |
Buffer Overflow | |
Use After Free | |
Improper Validation | |
Use After Free | |
Type Confusion | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Buffer Underflow | [,6.1.10)[7.0.0,7.2.2)[8.0.0-beta.1,8.2.0) |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Site Isolation Bypass | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Access Control | |
Heap Overflow | |
Use After Free | |
Out-of-bounds Read | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Privilege Escalation | |
Use After Free | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
URL Spoofing | |
Directory Traversal | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Arbitrary Code Injection | |
Denial of Service (DoS) | [1.3.0,1.3.13)[1.4.0,1.4.11) |
Uninitialized Memory Exposure | |
Arbitrary Code Execution | |