| Type Confusion | |
| Type Confusion | |
| Type Confusion | |
| Type Confusion | |
| Type Confusion | |
| Type Confusion | |
| Type Confusion | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Read | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Protection Mechanism Failure | |
| Out-of-bounds Read | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Protection Mechanism Failure | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Race Condition | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Out-of-bounds Read | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | |
| Access Control Bypass | |
| Type Confusion | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Race Condition | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Out-of-Bounds | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Privilege Management | |
| Information Exposure | |
| Out-of-bounds Write | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Out-of-bounds Read | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Exposure of Sensitive System Information to an Unauthorized Control Sphere | |
| Improper Neutralization | |
| Insertion of Sensitive Information into Log File | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Read | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Off-by-one Error | |
| Public Key Re-Use for Signing both Debug and Production Code | |
| Heap-based Buffer Overflow | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Access Control Bypass | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Check for Unusual or Exceptional Conditions | |
| Out-of-bounds Read | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Heap-based Buffer Overflow | |
| Allocation of Resources Without Limits or Throttling (Brash) | |
| Heap-based Buffer Overflow | |
| Improper Protection of Physical Side Channels | |
| External Control of Assumed-Immutable Web Parameter | |
| External Control of Assumed-Immutable Web Parameter | |
| Use After Free | |
| Use After Free | |
| Origin Validation Error | |
| Use After Free | |
| Type Confusion | |
| Access Control Bypass | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Exposure of Sensitive System Information to an Unauthorized Control Sphere | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Exposure of Sensitive System Information to an Unauthorized Control Sphere | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Cross-site Scripting (XSS) | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Incorrect Calculation of Buffer Size | |
| Type Confusion | |
| Access Control Bypass | |
| Use After Free | |
| Improper Input Validation | |
| External Control of Assumed-Immutable Web Parameter | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Information Exposure | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Write | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Out-of-bounds Read | |
| Function Call with Incorrectly Specified Arguments | |
| Information Exposure | |
| Access Control Bypass | |
| Access Control Bypass | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Out-of-bounds Write | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Improper Privilege Management | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Improper Isolation or Compartmentalization | |
| Use After Free | |
| Out-of-bounds Read | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Out-of-bounds Read | |
| Exposure of Sensitive Information Through Metadata | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-bounds Read | |
| Use After Free | |
| Directory Traversal | |
| Out-of-bounds Read | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Insufficient Visual Distinction of Homoglyphs Presented to User | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Stack-based Buffer Overflow | |
| Race Condition | |
| Out-of-bounds Read | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Input Validation | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Privilege Management | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Information Exposure | |
| External Control of Assumed-Immutable Web Parameter | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| External Control of Assumed-Immutable Web Parameter | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Access Control | |
| Access Restriction Bypass | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Privilege Management | |
| Use After Free | |
| Access Control Check Implemented After Asset is Accessed | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Access Control | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Access Control Bypass | |
| Arbitrary Code Injection | |
| Use After Free | |
| Use After Free | |
| Access Control Bypass | |
| Use After Free | |
| Improper Input Validation | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Arbitrary Command Execution | |
| Type Confusion | |
| Type Confusion | |
| Improper Input Validation | |
| Use of Uninitialized Resource | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Heap-based Buffer Overflow | |
| Type Confusion | |
| External Control of Assumed-Immutable Web Parameter | |
| Use After Free | |
| Out-of-bounds Read | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Type Confusion | |
| Heap-based Buffer Overflow | |
| Cross-site Scripting (XSS) | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Heap-based Buffer Overflow | |
| Type Confusion | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds Write | |
| Use After Free | |
| Type Confusion | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Write | |
| Type Confusion | |
| Type Confusion | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Input Validation | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Cross-site Request Forgery (CSRF) | |
| Out-of-Bounds Write | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Type Confusion | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Out-of-Bounds | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use of Uninitialized Resource | |
| Out-of-Bounds Read | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Restriction of Operations within the Bounds of a Memory Buffer | |
| Improper Access Control | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Access Control | |
| Improper Input Validation | |
| Improper Access Control | |
| Out-of-Bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Type Confusion | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Improper Control of Generation of Code ('Code Injection') | |
| Use After Free | |
| Improper Control of Generation of Code ('Code Injection') | |
| Out-of-bounds Write | |
| Type Confusion | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Out-of-bounds Write | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Read | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Privilege Management | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Out-of-Bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Type Confusion | |
| Heap-based Buffer Overflow | |
| Type Confusion | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Out-of-Bounds Write | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Type Confusion | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Improper Access Control | |
| User Interface (UI) Misrepresentation of Critical Information | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Out-of-bounds Read | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Access Control | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Improper Access Control | |
| Out-of-bounds Write | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Improper Restriction of Operations within the Bounds of a Memory Buffer | |
| Use After Free | |
| Use After Free | |
| Type Confusion | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-bounds Read | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Origin Validation Error | |
| NULL Pointer Dereference | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Denial of Service (DoS) | |
| Type Confusion | |
| Type Confusion | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Access Control Bypass | |
| Out-of-Bounds Write | |
| Access Control Bypass | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Insufficient Policy Enforcement | |
| Integer Underflow | |
| Information Exposure | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Out-of-Bounds | |
| Improper Privilege Management | |
| Use After Free | |
| Access Control Bypass | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Type Confusion | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Type Confusion | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Authorization | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Type Confusion | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Authentication Bypass by Spoofing | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Authentication Bypass by Spoofing | |
| Use After Free | |
| Improper Access Control | |
| Information Exposure | |
| Inappropriate implementation | |
| Improper Access Control | |
| Improper Input Validation | |
| Improper Access Control | |
| Heap-based Buffer Overflow | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Access Control | |
| Use After Free | |
| Use After Free | |
| Improper Access Control | |
| Type Confusion | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Authentication Bypass | |
| Access Control Bypass | |
| Improper Input Validation | |
| Access Control Bypass | |
| Inappropriate Implementation in Custom Tabs | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Authentication Bypass | |
| Improper Input Validation | |
| Heap-based Buffer Overflow | |
| Improper Access Control | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Improper Data Handling | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Control Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Access Restriction Bypass | |
| Heap-based Buffer Overflow | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Out-of-Bounds | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Access Control | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Access Control | |
| Arbitrary File Read | |
| Improper Access Control | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Out-of-Bounds | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Access Control | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Input Validation | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Improper Access Control | |
| Improper Access Control | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Missing Encryption of Sensitive Data | |
| Improper Input Validation | |
| HTTP Header Injection | |
| Out-of-bounds Write | |
| Use After Free | |
| Sensitive Cookie with Improper SameSite Attribute | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Arbitrary Code Execution | |
| Cross-site Request Forgery (CSRF) | |
| Permissive Cross-domain Policy with Untrusted Domains | |
| Arbitrary Code Execution | |
| Use After Free | |
| Denial of Service (DoS) | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Heap-based Buffer Overflow | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Arbitrary File Read | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Arbitrary File Read | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-Bounds | |
| Access Control Bypass | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Access Control | |
| Authentication Bypass | |
| Use After Free | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Heap-based Buffer Overflow | |
| Out-of-Bounds | |
| Heap-based Buffer Overflow | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Access Control | |
| Use After Free | |
| Authentication Bypass | |
| Improper Input Validation | |
| DNS Rebinding | |
| Heap-based Buffer Overflow | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Use After Free | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Authentication Bypass | |
| Access Restriction Bypass | |
| Heap-based Buffer Overflow | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Heap-based Buffer Overflow | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Heap-based Buffer Overflow | |
| Authentication Bypass | |
| Authentication Bypass | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Stack-based Buffer Overflow | |
| Authentication Bypass | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Integer Overflow to Buffer Overflow | |
| Improper Access Control | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Heap-based Buffer Overflow | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Access Restriction Bypass | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access Restriction Bypass | |
| Heap-based Buffer Overflow | |
| Information Exposure | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Access Restriction Bypass | |
| Improperly Implemented Security Check for Standard | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Access Restriction Bypass | |
| Improperly Implemented Security Check for Standard | |
| Use After Free | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Control Bypass | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Authentication Bypass | |
| Use After Free | |
| Use After Free | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Use After Free | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Data Handling | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Access Control Bypass | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Type Confusion | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| Improper Input Validation | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Access Restriction Bypass | |
| Use After Free | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Heap-based Buffer Overflow | |
| Access Restriction Bypass | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Arbitrary Code Injection | |
| Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Improper Authentication | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Authentication Bypass | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Access Restriction Bypass | |
| Creation of Temporary File in Directory with Insecure Permissions | |
| Out-of-bounds Write | |
| User Interface Misrepresentation of Critical Information | |
| User Interface Misrepresentation of Critical Information | |
| Type Confusion | |
| Use After Free | |
| Out-of-Bounds | |
| Access Control Bypass | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Type Confusion | |
| Use After Free | |
| User Interface Misrepresentation of Critical Information | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| User Interface Misrepresentation of Critical Information | |
| Use After Free | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Information Exposure | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Access Control Bypass | |
| Buffer Overflow | |
| Improper Input Validation | |
| Information Exposure | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Double Free | |
| Heap-based Buffer Overflow | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Access Control Bypass | |
| Access Restriction Bypass | |
| Use After Free | |
| Improper Input Validation | |
| Information Exposure | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Type confusion | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| User Interface Security Issue | |
| Use After Free | |
| Improper Input Validation | |
| User Impersonation | |
| Type Confusion | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| User Interface Security Issue | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Type Confusion | |
| Heap-based Buffer Overflow | [,102.0.5005.148)[103.0.0.0,103.0.5060.114) |
| Use After Free | |
| Protection Mechanism Failure | |
| Arbitrary File Read | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Insufficient Policy Enforcement | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Access Control | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Heap-based Buffer Overflow | |
| Insecure Defaults | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Inappropriate implementation | |
| Improper Input Validation | |
| Use After Free | |
| Type Confusion | |
| Type Confusion | |
| Improper implementation | |
| Type Confusion | |
| Information Exposure | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Type Confusion | |
| Out-of-Bounds | |
| Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Out-of-bounds Write | |
| Arbitrary File Upload | |
| Improper Input Validation | [,59.0.3071.104)(59.0.3071.104,59.0.3071.117) |
| Out-of-bounds Write | |
| Code | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Privilege Escalation | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Access Control | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Type Confusion | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Use After Free | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Use After Free | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Improper Input Validation | |
| Insecure Default | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Improper Access Control | |
| Use After Free | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Incorrect Authorization | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Type Confusion | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2012-5111 | |
| Authentication Bypass | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Cryptographic Issues | |
| Information Exposure | |
| CVE-2018-6103 | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Type Confusion | |
| Access Restriction Bypass | |
| Authentication Bypass | |
| Use After Free | |
| Authentication Bypass | |
| CVE-2014-1681 | |
| Information Exposure | |
| Use After Free | |
| Out-of-bounds Write | |
| Improper Data Handling | |
| Use After Free | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| NULL Pointer Dereference | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| CVE-2013-2268 | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Improper Preservation of Permissions | |
| Use After Free | |
| Out-of-bounds Write | |
| Information Exposure | |
| Access Restriction Bypass | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Use After Free | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Insecure Default | |
| Out-of-Bounds | |
| Security Features | |
| Insecure Default | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Resource Management Errors | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| CVE-2018-17471 | |
| Improper Input Validation | |
| Improper Input Validation | |
| User Impersonation | |
| Use After Free | |
| Improper Input Validation | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
| Use After Free | |
| Improper Input Validation | |
| Improper Access Control | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Improper Preservation of Permissions | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Access Restriction Bypass | |
| User Impersonation | |
| Security Features | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Security Features | |
| Information Exposure | |
| Cross-site Request Forgery (CSRF) | |
| Race Condition | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Type Confusion | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | |
| Incorrect Authorization | |
| Incorrect Type Conversion or Cast | |
| Use After Free | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Insufficient Verification of Data Authenticity | |
| Out-of-Bounds | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Information Exposure | |
| Improper Access Control | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| CVE-2016-9652 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Information Exposure | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Input Validation | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2013-0886 | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Remote Code Execution (RCE) | |
| Security Features | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Type Confusion | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Access Restriction Bypass | |
| Improper Data Handling | |
| Cryptographic Issues | |
| Improper Input Validation | |
| Security Features | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Security Features | |
| Incorrect Type Conversion or Cast | |
| Information Exposure | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Incorrect Authorization | |
| Directory Traversal | |
| Denial of Service (DoS) | |
| Improper Input Validation | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
| Access Restriction Bypass | |
| Use After Free | |
| Authentication Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Use After Free | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Improper Input Validation | |
| Improper Input Validation | |
| Resource Management Errors | |
| Resource Management Errors | |
| Race Condition | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Information Exposure | |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-Bounds | |
| Insufficiently Protected Credentials | |
| Improper Certificate Validation | |
| Race Condition | |
| Insecure Default | |
| Out-of-bounds Write | |
| Use After Free | |
| Information Exposure | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Access Control | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| CVE-2020-15992 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Information Exposure | |
| Resource Management Errors | |
| Authentication Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-Bounds | |
| Use After Free | |
| Denial of Service (DoS) | |
| Type Confusion | |
| Resource Management Errors | |
| Use After Free | |
| Open Redirect | |
| Insecure Default | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Incorrect Authorization | |
| Use After Free | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Data Handling | |
| User Impersonation | |
| Access Restriction Bypass | |
| Use After Free | |
| Improper Access Control | |
| Use After Free | |
| Insufficiently Protected Credentials | |
| Use After Free | |
| Out-of-bounds Read | |
| Code | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Improper Access Control | |
| Information Exposure | |
| Authentication Bypass | |
| Access Restriction Bypass | |
| Security Features | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Privilege Escalation | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Incorrect Type Conversion or Cast | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Validation of Array Index | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Code | |
| Use of Uninitialized Resource | |
| Information Exposure | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| CVE-2013-6628 | |
| Authentication Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Incorrect Type Conversion or Cast | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Authentication Bypass | |
| Use After Free | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2016-5194 | |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-bounds Write | |
| Information Exposure | |
| Use After Free | |
| Directory Traversal | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Improper Input Validation | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Use of Uninitialized Resource | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Authentication Bypass | |
| Out-of-bounds Read | |
| Open Redirect | |
| Out-of-bounds Write | |
| Insecure Encryption | |
| Improper Access Control | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| CVE-2013-2872 | |
| Improper Input Validation | |
| Use After Free | |
| Information Exposure | |
| Denial of Service (DoS) | |
| CRLF Injection | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Use After Free | |
| Access Restriction Bypass | |
| Use After Free | |
| Incorrect Authorization | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Information Exposure | |
| CVE-2020-6420 | |
| Use After Free | |
| CVE-2011-3101 | |
| Out-of-Bounds | |
| Use After Free | |
| Resource Management Errors | |
| Information Exposure | |
| Out-of-bounds Write | |
| User Impersonation | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Use After Free | |
| CVE-2012-2875 | |
| Information Exposure | |
| Improper Data Handling | |
| Out-of-bounds Write | |
| Access Restriction Bypass | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Authentication Bypass | |
| Improper Input Validation | |
| Improper Data Handling | |
| Authentication Bypass | |
| Improper Input Validation | |
| Improper Initialization | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Authentication Bypass | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| User Impersonation | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Improper Authentication | |
| Use After Free | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Code | |
| Improper Input Validation | |
| Out-of-Bounds | |
| CVE-2013-0842 | |
| Improper Action Name Cleanup | |
| Resource Management Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Data Handling | |
| Out-of-bounds Write | |
| Information Exposure | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Race Condition | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use of Uninitialized Resource | |
| Denial of Service (DoS) | |
| Use After Free | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-Bounds | |
| Time and State | |
| Resource Management Errors | |
| Improper Input Validation | |
| Incorrect Authorization | |
| Race Condition | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-bounds Write | |
| Insecure Default | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Use After Free | |
| Out-of-bounds Write | |
| Information Exposure | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Check for Unusual or Exceptional Conditions | |
| Out-of-Bounds | |
| User Impersonation | |
| Incorrect Authorization | |
| Use of Uninitialized Resource | |
| CVE-2016-1674 | |
| Use After Free | |
| Improper Authentication | |
| Information Exposure | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Improper Data Handling | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Improper Access Control | |
| Security Features | |
| Security Features | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Authentication Bypass | |
| Access Restriction Bypass | |
| Use After Free | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| CVE-2012-5141 | |
| Code | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Improper Authorization | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Arbitrary Command Injection | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Authentication Bypass | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Information Exposure | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Unsafe Dependency Resolution | |
| Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
| Improper Input Validation | |
| Improper Initialization | |
| Improper Access Control | |
| User Impersonation | |
| Out-of-Bounds | |
| Improper Data Handling | |
| Improper Data Handling | |
| Out-of-Bounds | |
| CVE-2018-16075 | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | [,59.0.3071.104)(59.0.3071.104,59.0.3071.117) |
| Access Restriction Bypass | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| Use After Free | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Authorization | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Data Handling | |
| Denial of Service (DoS) | |
| Use After Free | |
| Race Condition | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Use After Free | |
| Improper Authentication | |
| Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| User Impersonation | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | [,36.0.1985.135)(36.0.1985.135,36.0.1985.143) |
| Use After Free | |
| Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| User Impersonation | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| Improper Input Validation | |
| Resource Management Errors | |
| Cryptographic Issues | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Denial of Service (DoS) | |
| Cryptographic Issues | |
| Improper Data Handling | |
| Use After Free | |
| Incorrect Authorization | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Use After Free | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2019-13755 | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Authentication Bypass | |
| Type Confusion | |
| Integer Overflow or Wraparound | |
| Improper Access Control | |
| Use After Free | |
| Resource Management Errors | |
| Privilege Escalation | |
| Information Exposure | |
| Out-of-Bounds | |
| CVE-2012-2764 | |
| Use After Free | |
| Improper Input Validation | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Input Validation | |
| User Enumeration | |
| Authentication Bypass | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Resource Management Errors | |
| Resource Management Errors | |
| Insecure Default | |
| Resource Management Errors | |
| Resource Management Errors | |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Missing Encryption of Sensitive Data | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Use After Free | |
| User Impersonation | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Improper Access Control | |
| Resource Management Errors | |
| Security Features | |
| CVE-2019-5833 | |
| Improper Access Control | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Resource Management Errors | |
| Security Features | |
| Authentication Bypass | |
| Out-of-Bounds | |
| Use After Free | |
| Resource Management Errors | |
| Improper Input Validation | |
| Incorrect Type Conversion or Cast | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
| Denial of Service (DoS) | |
| Use After Free | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Insecure Default | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Type Confusion | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Privilege Escalation | |
| Integer Overflow or Wraparound | |
| Improper Data Handling | |
| Improper Data Handling | |
| Out-of-Bounds | |
| Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
| Authentication Bypass | |
| Resource Management Errors | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Resource Management Errors | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Improper Access Control | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
| Information Exposure | |
| Resource Management Errors | |
| Use After Free | |
| Race Condition | |
| CVE-2012-5138 | |
| Out-of-Bounds | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Authentication Bypass | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| CVE-2021-21212 | |
| Information Exposure | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Use After Free | |
| Information Exposure | |
| Access Restriction Bypass | [,34.0.1847.130][34.0.1847.130,34.0.1847.137) |
| Insecure Default | |
| Improper Data Handling | |
| Improper Input Validation | |
| Improper Input Validation | |
| Cryptographic Issues | |
| CVE-2020-6574 | |
| Insecure Storage of Sensitive Information | |
| Use After Free | |
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| DEPRECATED: Use of Uninitialized Resource | |
| Cross-site Scripting (XSS) | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Write | |
| Incorrect Type Conversion or Cast | |
| Use After Free | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Remote Code Execution (RCE) | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| User Impersonation | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Use After Free | |
| Access Restriction Bypass | |
| Use of Uninitialized Resource | |
| Security Features | |
| Incorrect Authorization | |
| Out-of-Bounds | |
| Incorrect Authorization | |
| Improper Data Handling | |
| Information Exposure | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Access Restriction Bypass | |
| Race Condition | |
| Cross-site Scripting (XSS) | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-bounds Write | |
| Information Exposure | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Privilege Context Switching Error | |
| Out-of-bounds Write | |
| Code | |
| User Impersonation | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Access Control | |
| Arbitrary Code Execution | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-bounds Read | |
| Information Exposure | |
| Use After Free | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Information Exposure | |
| Out-of-Bounds | [,33.0.1750.151][33.0.1750.151,33.0.1750.154) |
| Use After Free | |
| Resource Management Errors | |
| Resource Management Errors | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Security Features | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Information Exposure | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Out-of-bounds Read | |
| Use After Free | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Information Exposure | |
| Insecure Default | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Type Confusion | |
| CVE-2020-15973 | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| Race Condition | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Improper Data Handling | |
| Improper Input Validation | |
| Incorrect Authorization | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Incorrect Type Conversion or Cast | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Use After Free | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Buffer Overflow | |
| User Impersonation | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Information Exposure | |
| Security Features | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-bounds Write | |
| Argument Injection | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Authentication | |
| Insecure Storage of Sensitive Information | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Insecure Default | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Improper Input Validation | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Information Exposure | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Information Exposure | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Type Confusion | |
| Use After Free | |
| User Impersonation | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Security Features | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Use After Free | |
| Resource Management Errors | |
| CVE-2018-20067 | |
| Improper Input Validation | |
| CVE-2013-6661 | |
| Information Exposure | |
| Improper Input Validation | |
| Authentication Bypass | |
| Improper Data Handling | |
| Improper Authentication | |
| Security Features | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Incorrect Type Conversion or Cast | |
| Access Restriction Bypass | |
| Improper Authentication | |
| Security Features | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-bounds Write | |
| Code | |
| CVE-2021-30618 | |
| Out-of-Bounds | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Insecure Default | |
| User Enumeration | |
| Code | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Access Control | |
| Improper Authentication | |
| Access Restriction Bypass | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Improper Input Validation | |
| Missing Cryptographic Step | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Information Exposure | |
| User Impersonation | |
| Type Confusion | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| CRLF Injection | |
| Security Features | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Write | |
| Information Exposure | |
| Directory Traversal | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Out-of-bounds Read | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
| Out-of-bounds Write | |
| User Impersonation | |
| Out-of-Bounds | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | [,58.0.3029.83)(58.0.3029.83,59.0.3071.86) |
| Use After Free | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Improper Access Control | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| User Impersonation | |
| Out-of-bounds Read | |
| Use After Free | |
| Type Confusion | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| CVE-2013-0884 | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Information Exposure | |
| CVE-2012-2821 | |
| CVE-2013-2867 | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Insecure Default | |
| Use After Free | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Use After Free | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Insecure Default | |
| Use After Free | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Improper Authentication | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Authentication Bypass | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Integer Overflow or Wraparound | |
| Cryptographic Issues | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Incorrect Type Conversion or Cast | |
| Improper Input Validation | |
| Race Condition | |
| Information Exposure | |
| Resource Management Errors | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Use After Free | |
| CVE-2014-1726 | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Security Features | |
| Denial of Service (DoS) | |
| Improper Authentication | |
| Information Exposure | |
| Access Restriction Bypass | |
| Insecure Default | |
| CVE-2020-6410 | |
| Authentication Bypass | |
| Information Exposure | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Information Exposure | |
| Access Restriction Bypass | |
| Use After Free | |
| Code | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Incorrect Authorization | |
| Insufficiently Protected Credentials | |
| Improper Input Validation | |
| Improper Data Handling | |
| Race Condition | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Use After Free | |
| Authentication Bypass | |
| Resource Management Errors | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Code | |
| Resource Management Errors | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Data Handling | |
| Use After Free | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| CVE-2021-30620 | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Security Features | |
| Improper Data Handling | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| Out-of-bounds Write | |
| Insecure Default | |
| Improper Access Control | |
| Authentication Bypass | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| User Impersonation | |
| Out-of-bounds Read | |
| Directory Traversal | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Access Control | |
| Integer Overflow or Wraparound | |
| CVE-2021-37958 | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Data Handling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| User Impersonation | |
| Access Restriction Bypass | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Use After Free | |
| Type Confusion | |
| Authentication Bypass | |
| Improper Data Handling | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Resource Management Errors | |
| Out-of-bounds Read | |
| Information Exposure | |
| Resource Management Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Improper Authorization | |
| Double Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Authentication | |
| Out-of-Bounds | |
| Race Condition | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Security Features | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Improper Authentication | |
| Improper Input Validation | |
| Source Code | |
| Remote Code Execution (RCE) | |
| Remote Code Execution (RCE) | |
| Out-of-bounds Read | |
| Security Features | |
| Resource Management Errors | |
| Improper Preservation of Permissions | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Improper Authentication | |
| Use After Free | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Improper Data Handling | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Improper Access Control | |
| Out-of-Bounds | |
| Information Exposure | |
| Observable Discrepancy | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Authentication Bypass | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Resource Management Errors | |
| Privilege Escalation | |
| Cross-site Request Forgery (CSRF) | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Access Control | |
| Use After Free | |
| Arbitrary Code Execution | |
| Use After Free | |
| Race Condition | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Security Features | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Type Confusion | |
| Incorrect Authorization | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Type Confusion | |
| Use After Free | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Improper Authentication | |
| Improper Input Validation | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Race Condition | |
| Improper Input Validation | |
| Race Condition | |
| Out-of-bounds Read | |
| Improper Access Control | |
| Resource Management Errors | |
| Information Exposure | |
| Information Exposure | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| Use After Free | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Type Confusion | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Improper Access Control | |
| Arbitrary Code Injection | |
| Improper Authorization | |
| Denial of Service (DoS) | [,34.0.1847.130][34.0.1847.130,34.0.1847.137) |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Information Exposure | |
| Improper Preservation of Permissions | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Privilege Escalation | |
| Privilege Escalation | |
| Information Exposure | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Improper Data Handling | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Authentication Bypass | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Handling of Exceptional Conditions | |
| Security Features | |
| Information Exposure | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Use After Free | |
| Improper Input Validation | |
| Privilege Escalation | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| CVE-2012-2892 | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Information Exposure | |
| CVE-2013-2859 | |
| Access Restriction Bypass | |
| Use After Free | |
| Improper Authorization | |
| Code | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Access Control | |
| Improper Access Control | |
| Privilege Escalation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| User Enumeration | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| CVE-2018-18346 | |
| Code | |
| Use After Free | |
| Improper Data Handling | |
| Resource Management Errors | |
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Input Validation | |
| Information Exposure | |
| User Impersonation | |
| Access Restriction Bypass | |
| CVE-2013-2868 | |
| Out-of-Bounds | |
| Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
| Cross-site Scripting (XSS) | |
| Improper Data Handling | |
| Improper Data Handling | |
| Information Exposure | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| Race Condition | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Race Condition | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Improper Access Control | |
| Code | |
| Race Condition | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Information Exposure | |
| Security Features | |
| Race Condition | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Improper Input Validation | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Out-of-Bounds | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Privilege Escalation | |
| Use After Free | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | [,34.0.1847.130][34.0.1847.130,34.0.1847.137) |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Insufficient Verification of Data Authenticity | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Race Condition | |
| Improper Access Control | |
| Use After Free | |
| Race Condition | |
| Insecure Default | |
| Denial of Service (DoS) | |
| Use After Free | |
| Information Exposure | |
| Denial of Service (DoS) | |
| CVE-2016-1673 | |
| Information Exposure | |
| Insecure Default | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Improper Access Control | |
| Improper Validation of Array Index | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Use After Free | |
| Insecure Default | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Remote Code Execution (RCE) | [,38.0.2125.7][38.0.2125.7,40.0.2214.109) |
| Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Authentication Bypass | |
| Improper Input Validation | |
| Use After Free | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Use After Free | |
| Directory Traversal | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| User Impersonation | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Information Exposure | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Use After Free | |
| Use After Free | |
| Improper Authorization | |
| Use After Free | |
| Improper Input Validation | |
| Type Confusion | |
| Use After Free | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Race Condition | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Authentication Bypass | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Improper Access Control | |
| Out-of-bounds Write | |
| Authentication Bypass | |
| Out-of-bounds Read | |
| Cryptographic Issues | |
| Improper Input Validation | |
| Security Features | |
| Improper Input Validation | |
| Insecure Default | |
| Use of Uninitialized Resource | |
| Improper Access Control | |
| Information Exposure | |
| Resource Management Errors | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Preservation of Permissions | |
| Security Features | |
| Out-of-bounds Write | |
| Authentication Bypass | |
| Improper Input Validation | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Improper Data Handling | |
| Use After Free | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Use After Free | |
| Resource Management Errors | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Improper Input Validation | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Security Features | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Resource Management Errors | |
| Authentication Bypass | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Authentication Bypass | |
| Out-of-Bounds | |
| Authentication Bypass | |
| Improper Access Control | |
| Use After Free | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Type Confusion | |
| Authentication Bypass | |
| Use After Free | |
| User Impersonation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Incorrect Type Conversion or Cast | |
| Insecure Default | |
| User Impersonation | |
| Use After Free | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Out-of-bounds Write | |
| Information Exposure | |
| Incorrect Type Conversion or Cast | |
| Out-of-bounds Write | |
| Information Exposure | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
| Out-of-Bounds | |
| Use After Free | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Security Features | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Resource Management Errors | |
| Out-of-bounds Read | |
| CVE-2012-2850 | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| Information Exposure | |
| Authentication Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Directory Traversal | [,33.0.1750.151][33.0.1750.151,33.0.1750.154) |
| Improper Restriction of Rendered UI Layers or Frames | |
| Insecure Default | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Use After Free | |
| Out-of-bounds Write | |
| Information Exposure | |
| Authentication Bypass | |
| Use After Free | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Authentication Bypass | |
| Use After Free | |
| User Impersonation | |
| Resource Management Errors | |
| Information Exposure | |
| Access Restriction Bypass | |
| Incorrect Type Conversion or Cast | |
| Authentication Bypass | |
| Authentication Bypass | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Use After Free | |
| Resource Management Errors | [,34.0.1847.130][34.0.1847.130,34.0.1847.137) |
| Resource Management Errors | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Type Confusion | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
| Information Exposure | |
| Use After Free | |
| Denial of Service (DoS) | |
| Type Confusion | |
| Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| Integer Overflow or Wraparound | |
| Improper Access Control | |
| Race Condition | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Access Control | |
| Out-of-Bounds | |
| Incorrect Authorization | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | [,33.0.1750.151][33.0.1750.151,33.0.1750.154) |
| Out-of-Bounds | |
| Improper Input Validation | |
| Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Incorrect Calculation | |
| Integer Overflow or Wraparound | |
| Authentication Bypass | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| CVE-2020-6413 | |
| Insecure Default | |
| Out-of-Bounds | |
| Use After Free | |
| Type Confusion | |
| CVE-2018-17476 | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Authentication Bypass | |
| Out-of-bounds Write | |
| Information Exposure | |
| Use After Free | |
| Authentication Bypass | |
| Denial of Service (DoS) | |
| Use After Free | |
| Security Features | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Use After Free | |
| Type Confusion | |
| Use After Free | |
| Information Exposure | |
| Incorrect Authorization | |
| Incorrect Type Conversion or Cast | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
| Out-of-bounds Write | |
| Out-of-bounds Read | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
| Out-of-bounds Write | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
| Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Improper Input Validation | |
| Incorrect Authorization | |
| Race Condition | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Use After Free | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Information Exposure | |
| Use After Free | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
| Use After Free | |
| Resource Management Errors | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Use After Free | |
| Resource Management Errors | |
| Use After Free | |
| Information Exposure | |
| Authentication Bypass | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Improper Data Handling | |
| CVE-2015-1211 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Data Handling | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| CVE-2020-16022 | |
| Race Condition | |
| Security Features | |
| User Impersonation | |
| Resource Management Errors | |
| Out-of-Bounds | |
| CVE-2013-2853 | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Improper Authentication | |
| Code | |
| Improper Input Validation | |
| Out-of-Bounds | |
| CVE-2013-0908 | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Improper Input Validation | [,34.0.1847.130][34.0.1847.130,34.0.1847.137) |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Out-of-bounds Write | |
| CVE-2021-37964 | |
| Denial of Service (DoS) | |
| Security Features | |
| Security Features | |
| Improper Input Validation | |
| Use After Free | |
| Code | |
| Access Restriction Bypass | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Use After Free | |
| Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
| Use After Free | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Code | |
| Information Exposure | |
| Information Exposure | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| Information Exposure | |
| Use After Free | |
| Security Features | |
| Authentication Bypass | |
| Information Exposure | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
| Information Exposure | |
| Use After Free | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Race Condition | |
| Buffer Overflow | [,25.0.1364.97)(25.0.1364.97,25.0.1364.99) |
| Cryptographic Issues | [,37.0.2062.103)[37.0.2062.103,40.0.2214.109) |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Security Features | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Integer Overflow or Wraparound | |
| Code | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | [,10.21.0)[80.0.0.122,80.0.3987.122) |
| Code | |
| Integer Overflow or Wraparound | |