Stack-based Buffer Overflow | |
Race Condition | |
Out-of-bounds Read | |
User Interface (UI) Misrepresentation of Critical Information | |
Improper Input Validation | |
User Interface (UI) Misrepresentation of Critical Information | |
Improper Privilege Management | |
User Interface (UI) Misrepresentation of Critical Information | |
Information Exposure | |
External Control of Assumed-Immutable Web Parameter | |
User Interface (UI) Misrepresentation of Critical Information | |
User Interface (UI) Misrepresentation of Critical Information | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
External Control of Assumed-Immutable Web Parameter | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Access Control | |
Access Restriction Bypass | |
User Interface (UI) Misrepresentation of Critical Information | |
Improper Privilege Management | |
Use After Free | |
Access Control Check Implemented After Asset is Accessed | |
Use After Free | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Access Control | |
Use After Free | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Access Control Bypass | |
Arbitrary Code Injection | |
Use After Free | |
Use After Free | |
Access Control Bypass | |
Use After Free | |
Improper Input Validation | |
User Interface (UI) Misrepresentation of Critical Information | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Arbitrary Command Execution | |
Type Confusion | |
Type Confusion | |
Improper Input Validation | |
Use of Uninitialized Resource | |
User Interface (UI) Misrepresentation of Critical Information | |
User Interface (UI) Misrepresentation of Critical Information | |
User Interface (UI) Misrepresentation of Critical Information | |
Out-of-bounds Read | |
Improper Input Validation | |
Use After Free | |
User Interface (UI) Misrepresentation of Critical Information | |
Heap-based Buffer Overflow | |
Type Confusion | |
External Control of Assumed-Immutable Web Parameter | |
Use After Free | |
Out-of-bounds Read | |
User Interface (UI) Misrepresentation of Critical Information | |
User Interface (UI) Misrepresentation of Critical Information | |
Type Confusion | |
Heap-based Buffer Overflow | |
Cross-site Scripting (XSS) | |
User Interface (UI) Misrepresentation of Critical Information | |
Heap-based Buffer Overflow | |
Type Confusion | |
Use After Free | |
Use After Free | |
Out-of-Bounds Write | |
Use After Free | |
Type Confusion | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Use After Free | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Read | |
Heap-based Buffer Overflow | |
Out-of-bounds Write | |
Type Confusion | |
Type Confusion | |
User Interface (UI) Misrepresentation of Critical Information | |
User Interface (UI) Misrepresentation of Critical Information | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
User Interface (UI) Misrepresentation of Critical Information | |
Improper Input Validation | |
User Interface (UI) Misrepresentation of Critical Information | |
User Interface (UI) Misrepresentation of Critical Information | |
User Interface (UI) Misrepresentation of Critical Information | |
Cross-site Request Forgery (CSRF) | |
Out-of-Bounds Write | |
Use After Free | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Use After Free | |
Type Confusion | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Race Condition | |
Out-of-Bounds | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use of Uninitialized Resource | |
Out-of-Bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Improper Restriction of Operations within the Bounds of a Memory Buffer | |
Improper Access Control | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Information Exposure | |
Improper Access Control | |
Improper Input Validation | |
Improper Access Control | |
Out-of-Bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Use After Free | |
Race Condition | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Type Confusion | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Improper Control of Generation of Code ('Code Injection') | |
Use After Free | |
Improper Control of Generation of Code ('Code Injection') | |
Out-of-bounds Write | |
Type Confusion | |
Use After Free | |
User Interface (UI) Misrepresentation of Critical Information | |
Out-of-bounds Write | |
Use After Free | |
Heap-based Buffer Overflow | |
Out-of-bounds Read | |
Heap-based Buffer Overflow | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Improper Privilege Management | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Out-of-Bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Heap-based Buffer Overflow | |
Type Confusion | |
Heap-based Buffer Overflow | |
Type Confusion | |
Use After Free | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Out-of-Bounds Write | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Type Confusion | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Write | |
Improper Access Control | |
User Interface (UI) Misrepresentation of Critical Information | |
User Interface (UI) Misrepresentation of Critical Information | |
Out-of-bounds Read | |
User Interface (UI) Misrepresentation of Critical Information | |
Improper Access Control | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Improper Access Control | |
Out-of-bounds Write | |
Use After Free | |
Heap-based Buffer Overflow | |
Improper Restriction of Operations within the Bounds of a Memory Buffer | |
Use After Free | |
Use After Free | |
Type Confusion | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-bounds Read | |
User Interface (UI) Misrepresentation of Critical Information | |
Improper Restriction of Rendered UI Layers or Frames | |
Origin Validation Error | |
NULL Pointer Dereference | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Denial of Service (DoS) | |
Type Confusion | |
Type Confusion | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Use After Free | |
Access Control Bypass | |
Out-of-Bounds Write | |
Access Control Bypass | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
User Interface (UI) Misrepresentation of Critical Information | |
Insufficient Policy Enforcement | |
Integer Underflow | |
Information Exposure | |
User Interface (UI) Misrepresentation of Critical Information | |
Out-of-Bounds | |
Improper Privilege Management | |
Use After Free | |
Access Control Bypass | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Type Confusion | |
Out-of-bounds Write | |
Improper Input Validation | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Type Confusion | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Authorization | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Type Confusion | |
Integer Overflow or Wraparound | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Cross-site Scripting (XSS) | |
Use After Free | |
Access Restriction Bypass | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Authentication Bypass by Spoofing | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
User Interface (UI) Misrepresentation of Critical Information | |
Authentication Bypass by Spoofing | |
Use After Free | |
Improper Access Control | |
Information Exposure | |
Inappropriate implementation | |
Improper Access Control | |
Improper Input Validation | |
Improper Access Control | |
Heap-based Buffer Overflow | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
User Interface (UI) Misrepresentation of Critical Information | |
Improper Access Control | |
Use After Free | |
Use After Free | |
Improper Access Control | |
Type Confusion | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Authentication Bypass | |
Access Control Bypass | |
Improper Input Validation | |
Access Control Bypass | |
Inappropriate Implementation in Custom Tabs | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Authentication Bypass | |
Improper Input Validation | |
Heap-based Buffer Overflow | |
Improper Access Control | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Data Handling | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Control Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Use After Free | |
Heap-based Buffer Overflow | |
Access Restriction Bypass | |
Heap-based Buffer Overflow | |
Access Restriction Bypass | |
Improper Access Control | |
Out-of-Bounds | |
Heap-based Buffer Overflow | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Access Control | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Access Control | |
Arbitrary File Read | |
Improper Access Control | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Read | |
Heap-based Buffer Overflow | |
Use After Free | |
Out-of-Bounds | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Access Control | |
Heap-based Buffer Overflow | |
Use After Free | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Improper Input Validation | |
Information Exposure | |
Arbitrary Code Execution | |
Improper Access Control | |
Improper Access Control | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Missing Encryption of Sensitive Data | |
Improper Input Validation | |
HTTP Header Injection | |
Out-of-bounds Write | |
Use After Free | |
Sensitive Cookie with Improper SameSite Attribute | |
User Interface (UI) Misrepresentation of Critical Information | |
Arbitrary Code Execution | |
Cross-site Request Forgery (CSRF) | |
Permissive Cross-domain Policy with Untrusted Domains | |
Arbitrary Code Execution | |
Use After Free | |
Denial of Service (DoS) | |
User Interface (UI) Misrepresentation of Critical Information | |
Heap-based Buffer Overflow | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Arbitrary File Read | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
User Interface (UI) Misrepresentation of Critical Information | |
Arbitrary File Read | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Denial of Service (DoS) | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Improper Access Control | |
Access Restriction Bypass | |
Out-of-Bounds | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-Bounds | |
Access Control Bypass | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Improper Access Control | |
Improper Access Control | |
Improper Input Validation | |
Information Exposure | |
Improper Access Control | |
Authentication Bypass | |
Use After Free | |
Access Restriction Bypass | |
Improper Input Validation | |
Access Restriction Bypass | |
Heap-based Buffer Overflow | |
Out-of-Bounds | |
Heap-based Buffer Overflow | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Information Exposure | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Access Control | |
Use After Free | |
Authentication Bypass | |
Improper Input Validation | |
DNS Rebinding | |
Heap-based Buffer Overflow | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Use After Free | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Heap-based Buffer Overflow | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Authentication Bypass | |
Access Restriction Bypass | |
Heap-based Buffer Overflow | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Heap-based Buffer Overflow | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Heap-based Buffer Overflow | |
Authentication Bypass | |
Authentication Bypass | |
Heap-based Buffer Overflow | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Stack-based Buffer Overflow | |
Authentication Bypass | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Integer Overflow to Buffer Overflow | |
Improper Access Control | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Heap-based Buffer Overflow | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Read | |
Access Restriction Bypass | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Access Restriction Bypass | |
Heap-based Buffer Overflow | |
Information Exposure | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Access Restriction Bypass | |
Improperly Implemented Security Check for Standard | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Heap-based Buffer Overflow | |
Use After Free | |
Access Restriction Bypass | |
Improperly Implemented Security Check for Standard | |
Use After Free | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Use After Free | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Control Bypass | |
Use After Free | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Authentication Bypass | |
Use After Free | |
Use After Free | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Use After Free | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Data Handling | |
Denial of Service (DoS) | |
Information Exposure | |
Access Control Bypass | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Heap-based Buffer Overflow | |
Improper Input Validation | |
Use After Free | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Improper Input Validation | |
Type Confusion | |
Use After Free | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Race Condition | |
Improper Input Validation | |
Heap-based Buffer Overflow | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Access Restriction Bypass | |
Use After Free | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Heap-based Buffer Overflow | |
Access Restriction Bypass | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Use After Free | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Arbitrary Code Injection | |
Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Improper Authentication | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Authentication Bypass | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Access Restriction Bypass | |
Creation of Temporary File in Directory with Insecure Permissions | |
Out-of-bounds Write | |
User Interface Misrepresentation of Critical Information | |
User Interface Misrepresentation of Critical Information | |
Type Confusion | |
Use After Free | |
Out-of-Bounds | |
Access Control Bypass | |
Use After Free | |
Use After Free | |
Use After Free | |
Type Confusion | |
Use After Free | |
User Interface Misrepresentation of Critical Information | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
User Interface Misrepresentation of Critical Information | |
Use After Free | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Information Exposure | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Access Control Bypass | |
Buffer Overflow | |
Improper Input Validation | |
Information Exposure | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Double Free | |
Heap-based Buffer Overflow | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Access Control Bypass | |
Access Restriction Bypass | |
Use After Free | |
Improper Input Validation | |
Information Exposure | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Type confusion | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
User Interface Security Issue | |
Use After Free | |
Improper Input Validation | |
User Impersonation | |
Type Confusion | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Use After Free | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Heap-based Buffer Overflow | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Use After Free | |
User Interface Security Issue | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Type Confusion | |
Heap-based Buffer Overflow | [,102.0.5005.148)[103.0.0.0,103.0.5060.114) |
Use After Free | |
Protection Mechanism Failure | |
Arbitrary File Read | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Heap-based Buffer Overflow | |
Insufficient Policy Enforcement | |
Information Exposure | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Access Control | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | |
Improper Access Control | |
Improper Access Control | |
Improper Access Control | |
Heap-based Buffer Overflow | |
Insecure Defaults | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Inappropriate implementation | |
Improper Input Validation | |
Use After Free | |
Type Confusion | |
Type Confusion | |
Improper implementation | |
Type Confusion | |
Information Exposure | |
Heap-based Buffer Overflow | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Type Confusion | |
Out-of-Bounds | |
Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Out-of-bounds Write | |
Arbitrary File Upload | |
Improper Input Validation | [,59.0.3071.104)(59.0.3071.104,59.0.3071.117) |
Out-of-bounds Write | |
Code | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Privilege Escalation | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Resource Management Errors | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
Resource Management Errors | |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Improper Access Control | |
Out-of-Bounds | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Type Confusion | |
Out-of-bounds Write | |
Out-of-Bounds | |
Use After Free | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Use After Free | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Insecure Default | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Improper Access Control | |
Use After Free | |
Improper Input Validation | |
Denial of Service (DoS) | |
Incorrect Authorization | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Use After Free | |
Type Confusion | |
Use After Free | |
Out-of-bounds Read | |
CVE-2012-5111 | |
Authentication Bypass | |
Use After Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Cryptographic Issues | |
Information Exposure | |
CVE-2018-6103 | |
Use After Free | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Type Confusion | |
Access Restriction Bypass | |
Authentication Bypass | |
Use After Free | |
Authentication Bypass | |
CVE-2014-1681 | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
Improper Data Handling | |
Use After Free | |
Resource Management Errors | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Resource Management Errors | |
Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Use After Free | |
Use After Free | |
Use After Free | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-bounds Write | |
Improper Input Validation | |
CVE-2013-2268 | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Improper Preservation of Permissions | |
Use After Free | |
Out-of-bounds Write | |
Information Exposure | |
Access Restriction Bypass | |
Information Exposure | |
Denial of Service (DoS) | |
Use After Free | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Insecure Default | |
Out-of-Bounds | |
Security Features | |
Insecure Default | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Resource Management Errors | |
Improper Input Validation | |
Out-of-bounds Write | |
CVE-2018-17471 | |
Improper Input Validation | |
Improper Input Validation | |
User Impersonation | |
Use After Free | |
Improper Input Validation | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
Use After Free | |
Improper Input Validation | |
Improper Access Control | |
Incorrect Authorization | |
Improper Input Validation | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Preservation of Permissions | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Use After Free | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Access Restriction Bypass | |
User Impersonation | |
Security Features | |
Improper Input Validation | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | |
Use After Free | |
Security Features | |
Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Race Condition | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Denial of Service (DoS) | |
Resource Management Errors | |
Type Confusion | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Incorrect Authorization | |
Incorrect Type Conversion or Cast | |
Use After Free | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Input Validation | |
Use After Free | |
Cross-site Scripting (XSS) | |
Insufficient Verification of Data Authenticity | |
Out-of-Bounds | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Improper Access Control | |
Improper Input Validation | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
CVE-2016-9652 | |
Out-of-Bounds | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-bounds Write | |
Information Exposure | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-bounds Write | |
Use After Free | |
CVE-2013-0886 | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-Bounds | |
Out-of-bounds Write | |
Remote Code Execution (RCE) | |
Security Features | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Type Confusion | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Use After Free | |
Access Restriction Bypass | |
Improper Data Handling | |
Cryptographic Issues | |
Improper Input Validation | |
Security Features | |
Out-of-Bounds | |
Improper Input Validation | |
Denial of Service (DoS) | |
Security Features | |
Incorrect Type Conversion or Cast | |
Information Exposure | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-Bounds | |
Incorrect Authorization | |
Directory Traversal | |
Denial of Service (DoS) | |
Improper Input Validation | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
Access Restriction Bypass | |
Use After Free | |
Authentication Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Use After Free | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Use After Free | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Improper Input Validation | |
Improper Input Validation | |
Resource Management Errors | |
Resource Management Errors | |
Race Condition | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
Information Exposure | |
Access Restriction Bypass | |
Information Exposure | |
Out-of-Bounds | |
Insufficiently Protected Credentials | |
Improper Certificate Validation | |
Race Condition | |
Insecure Default | |
Out-of-bounds Write | |
Use After Free | |
Information Exposure | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
Out-of-Bounds | |
Out-of-bounds Read | |
Resource Management Errors | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Use After Free | |
Out-of-Bounds | |
Improper Access Control | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
CVE-2020-15992 | |
Improper Input Validation | |
Out-of-Bounds | |
Information Exposure | |
Resource Management Errors | |
Authentication Bypass | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Use After Free | |
Denial of Service (DoS) | |
Type Confusion | |
Resource Management Errors | |
Use After Free | |
Open Redirect | |
Insecure Default | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
Incorrect Authorization | |
Use After Free | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Improper Data Handling | |
User Impersonation | |
Access Restriction Bypass | |
Use After Free | |
Improper Access Control | |
Use After Free | |
Insufficiently Protected Credentials | |
Use After Free | |
Out-of-bounds Read | |
Code | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Resource Management Errors | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Resource Management Errors | |
Improper Access Control | |
Information Exposure | |
Authentication Bypass | |
Access Restriction Bypass | |
Security Features | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Privilege Escalation | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Validation of Array Index | |
Out-of-Bounds | |
Use After Free | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Input Validation | |
Code | |
Use of Uninitialized Resource | |
Information Exposure | |
Information Exposure | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Out-of-Bounds | |
Denial of Service (DoS) | |
CVE-2013-6628 | |
Authentication Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Information Exposure | |
Use After Free | |
Information Exposure | |
Incorrect Type Conversion or Cast | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Authentication Bypass | |
Use After Free | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
CVE-2016-5194 | |
Improper Input Validation | |
Information Exposure | |
Out-of-bounds Write | |
Information Exposure | |
Use After Free | |
Directory Traversal | |
Access Restriction Bypass | |
Directory Traversal | |
Improper Input Validation | |
Use After Free | |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-bounds Write | |
Use of Uninitialized Resource | |
Resource Management Errors | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Authentication Bypass | |
Out-of-bounds Read | |
Open Redirect | |
Out-of-bounds Write | |
Insecure Encryption | |
Improper Access Control | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
CVE-2013-2872 | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Denial of Service (DoS) | |
CRLF Injection | |
Denial of Service (DoS) | |
Improper Input Validation | |
Use After Free | |
Access Restriction Bypass | |
Use After Free | |
Incorrect Authorization | |
Information Exposure | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
CVE-2020-6420 | |
Use After Free | |
CVE-2011-3101 | |
Out-of-Bounds | |
Use After Free | |
Resource Management Errors | |
Information Exposure | |
Out-of-bounds Write | |
User Impersonation | |
Improper Input Validation | |
Out-of-bounds Write | |
Information Exposure | |
Out-of-Bounds | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Use After Free | |
CVE-2012-2875 | |
Information Exposure | |
Improper Data Handling | |
Out-of-bounds Write | |
Access Restriction Bypass | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Authentication Bypass | |
Improper Input Validation | |
Improper Data Handling | |
Authentication Bypass | |
Improper Input Validation | |
Improper Initialization | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Resource Management Errors | |
Authentication Bypass | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
User Impersonation | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Write | |
Improper Authentication | |
Use After Free | |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Improper Input Validation | |
Denial of Service (DoS) | |
Code | |
Improper Input Validation | |
Out-of-Bounds | |
CVE-2013-0842 | |
Improper Action Name Cleanup | |
Resource Management Errors | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Data Handling | |
Out-of-bounds Write | |
Information Exposure | |
Resource Management Errors | |
Out-of-Bounds | |
Race Condition | |
Out-of-bounds Write | |
Improper Input Validation | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Use of Uninitialized Resource | |
Denial of Service (DoS) | |
Use After Free | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Time and State | |
Resource Management Errors | |
Improper Input Validation | |
Incorrect Authorization | |
Race Condition | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Write | |
Insecure Default | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Use After Free | |
Out-of-bounds Write | |
Information Exposure | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Use After Free | |
Improper Check for Unusual or Exceptional Conditions | |
Out-of-Bounds | |
User Impersonation | |
Incorrect Authorization | |
Use of Uninitialized Resource | |
CVE-2016-1674 | |
Use After Free | |
Improper Authentication | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Write | |
Improper Input Validation | |
Information Exposure | |
Denial of Service (DoS) | |
Improper Data Handling | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Use After Free | |
Improper Access Control | |
Security Features | |
Security Features | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Authentication Bypass | |
Access Restriction Bypass | |
Use After Free | |
Denial of Service (DoS) | |
Authentication Bypass | |
Information Exposure | |
Out-of-Bounds | |
Out-of-bounds Write | |
CVE-2012-5141 | |
Code | |
Information Exposure | |
Denial of Service (DoS) | |
Authentication Bypass | |
Improper Authorization | |
Out-of-Bounds | |
Out-of-bounds Write | |
Improper Input Validation | |
Arbitrary Command Injection | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Information Exposure | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-bounds Read | |
Improper Access Control | |
Access Restriction Bypass | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
Information Exposure | |
Improper Input Validation | |
Use After Free | |
Integer Overflow or Wraparound | |
Use After Free | |
Improper Restriction of Rendered UI Layers or Frames | |
Authentication Bypass | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
Improper Input Validation | |
Information Exposure | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
Unsafe Dependency Resolution | |
Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
Improper Input Validation | |
Improper Initialization | |
Improper Access Control | |
User Impersonation | |
Out-of-Bounds | |
Improper Data Handling | |
Improper Data Handling | |
Out-of-Bounds | |
CVE-2018-16075 | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | [,59.0.3071.104)(59.0.3071.104,59.0.3071.117) |
Access Restriction Bypass | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
Use After Free | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Authorization | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Data Handling | |
Denial of Service (DoS) | |
Use After Free | |
Race Condition | |
Use After Free | |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | |
Improper Authentication | |
Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
User Impersonation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | [,36.0.1985.135)(36.0.1985.135,36.0.1985.143) |
Use After Free | |
Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
User Impersonation | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-bounds Read | |
Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
Improper Input Validation | |
Resource Management Errors | |
Cryptographic Issues | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Denial of Service (DoS) | |
Cryptographic Issues | |
Improper Data Handling | |
Use After Free | |
Incorrect Authorization | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Use After Free | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Use After Free | |
CVE-2019-13755 | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Authentication Bypass | |
Authentication Bypass | |
Type Confusion | |
Integer Overflow or Wraparound | |
Improper Access Control | |
Use After Free | |
Resource Management Errors | |
Privilege Escalation | |
Information Exposure | |
Out-of-Bounds | |
CVE-2012-2764 | |
Use After Free | |
Improper Input Validation | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Use After Free | |
Improper Input Validation | |
User Enumeration | |
Authentication Bypass | |
Out-of-Bounds | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Resource Management Errors | |
Resource Management Errors | |
Insecure Default | |
Resource Management Errors | |
Resource Management Errors | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Missing Encryption of Sensitive Data | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Use After Free | |
User Impersonation | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Improper Access Control | |
Resource Management Errors | |
Security Features | |
CVE-2019-5833 | |
Improper Access Control | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Write | |
Improper Input Validation | |
Resource Management Errors | |
Security Features | |
Authentication Bypass | |
Out-of-Bounds | |
Use After Free | |
Resource Management Errors | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
Denial of Service (DoS) | |
Use After Free | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Insecure Default | |
Access Restriction Bypass | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Type Confusion | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Information Exposure | |
Use After Free | |
Use After Free | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Privilege Escalation | |
Integer Overflow or Wraparound | |
Improper Data Handling | |
Improper Data Handling | |
Out-of-Bounds | |
Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
Authentication Bypass | |
Resource Management Errors | |
Improper Input Validation | |
Denial of Service (DoS) | |
Information Exposure | |
Resource Management Errors | |
Improper Input Validation | |
Denial of Service (DoS) | |
Authentication Bypass | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Improper Access Control | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
Information Exposure | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
Information Exposure | |
Resource Management Errors | |
Use After Free | |
Race Condition | |
CVE-2012-5138 | |
Out-of-Bounds | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Authentication Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | |
CVE-2021-21212 | |
Information Exposure | |
Improper Input Validation | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Use After Free | |
Information Exposure | |
Access Restriction Bypass | [,34.0.1847.130][34.0.1847.130,34.0.1847.137) |
Insecure Default | |
Improper Data Handling | |
Improper Input Validation | |
Improper Input Validation | |
Cryptographic Issues | |
CVE-2020-6574 | |
Insecure Storage of Sensitive Information | |
Use After Free | |
Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Out-of-bounds Write | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Race Condition | |
DEPRECATED: Use of Uninitialized Resource | |
Cross-site Scripting (XSS) | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Incorrect Type Conversion or Cast | |
Use After Free | |
Resource Management Errors | |
Out-of-Bounds | |
Remote Code Execution (RCE) | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Information Exposure | |
User Impersonation | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Access Restriction Bypass | |
Resource Management Errors | |
Use After Free | |
Access Restriction Bypass | |
Use of Uninitialized Resource | |
Security Features | |
Incorrect Authorization | |
Out-of-Bounds | |
Incorrect Authorization | |
Improper Data Handling | |
Information Exposure | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Access Restriction Bypass | |
Race Condition | |
Cross-site Scripting (XSS) | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-bounds Write | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-Bounds | |
CVE-2021-30617 | |
Out-of-bounds Write | |
Code | |
User Impersonation | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Access Control | |
Arbitrary Code Execution | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Out-of-bounds Read | |
Information Exposure | |
Use After Free | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Authentication Bypass | |
Information Exposure | |
Out-of-Bounds | [,33.0.1750.151][33.0.1750.151,33.0.1750.154) |
Use After Free | |
Resource Management Errors | |
Resource Management Errors | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Security Features | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-bounds Read | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Resource Management Errors | |
Out-of-bounds Read | |
Use After Free | |
Information Exposure | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Information Exposure | |
Insecure Default | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Type Confusion | |
CVE-2020-15973 | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Race Condition | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-bounds Write | |
Improper Data Handling | |
Improper Input Validation | |
Incorrect Authorization | |
Information Exposure | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | |
Incorrect Type Conversion or Cast | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Use After Free | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Input Validation | |
Buffer Overflow | |
User Impersonation | |
Out-of-Bounds | |
Out-of-bounds Write | |
Information Exposure | |
Security Features | |
Out-of-Bounds | |
Use After Free | |
Out-of-bounds Write | |
Argument Injection | |
Use After Free | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Improper Authentication | |
Insecure Storage of Sensitive Information | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Insecure Default | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Use After Free | |
Improper Input Validation | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Information Exposure | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Type Confusion | |
Use After Free | |
User Impersonation | |
Out-of-bounds Read | |
Resource Management Errors | |
Access Restriction Bypass | |
Security Features | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Resource Management Errors | |
CVE-2018-20067 | |
Improper Input Validation | |
CVE-2013-6661 | |
Information Exposure | |
Improper Input Validation | |
Authentication Bypass | |
Improper Data Handling | |
Improper Authentication | |
Security Features | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Incorrect Type Conversion or Cast | |
Access Restriction Bypass | |
Improper Authentication | |
Security Features | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Write | |
Code | |
CVE-2021-30618 | |
Out-of-Bounds | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Insecure Default | |
User Enumeration | |
Code | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Access Control | |
Improper Authentication | |
Access Restriction Bypass | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Improper Input Validation | |
Cryptographic Issues | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
User Impersonation | |
Type Confusion | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
CRLF Injection | |
Security Features | |
Resource Management Errors | |
Resource Management Errors | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Information Exposure | |
Directory Traversal | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Out-of-bounds Read | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
Out-of-bounds Write | |
User Impersonation | |
Out-of-Bounds | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Improper Input Validation | [,58.0.3029.83)(58.0.3029.83,59.0.3071.86) |
Use After Free | |
Resource Management Errors | |
Denial of Service (DoS) | |
Improper Access Control | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
User Impersonation | |
Out-of-bounds Read | |
Use After Free | |
Type Confusion | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
CVE-2013-0884 | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Information Exposure | |
CVE-2012-2821 | |
CVE-2013-2867 | |
Denial of Service (DoS) | |
Improper Input Validation | |
Insecure Default | |
Use After Free | |
Resource Management Errors | |
Out-of-bounds Write | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-Bounds | |
Resource Management Errors | |
Use After Free | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
Use After Free | |
Information Exposure | |
Use After Free | |
Insecure Default | |
Use After Free | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Resource Management Errors | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Use After Free | |
Improper Authentication | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Authentication Bypass | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Integer Overflow or Wraparound | |
Cryptographic Issues | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Resource Management Errors | |
Incorrect Type Conversion or Cast | |
Improper Input Validation | |
Race Condition | |
Information Exposure | |
Resource Management Errors | |
Use After Free | |
Cross-site Scripting (XSS) | |
Use After Free | |
Use After Free | |
CVE-2014-1726 | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Security Features | |
Denial of Service (DoS) | |
Improper Authentication | |
Information Exposure | |
Access Restriction Bypass | |
Insecure Default | |
CVE-2020-6410 | |
Authentication Bypass | |
Information Exposure | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Information Exposure | |
Cross-site Scripting (XSS) | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Information Exposure | |
Access Restriction Bypass | |
Use After Free | |
Code | |
Improper Input Validation | |
Access Restriction Bypass | |
Incorrect Authorization | |
Insufficiently Protected Credentials | |
Improper Input Validation | |
Improper Data Handling | |
Race Condition | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Use After Free | |
Authentication Bypass | |
Resource Management Errors | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Code | |
Resource Management Errors | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Data Handling | |
Use After Free | |
Out-of-Bounds | |
Access Restriction Bypass | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-bounds Write | |
CVE-2021-30620 | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Restriction of Rendered UI Layers or Frames | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Security Features | |
Improper Data Handling | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
Out-of-bounds Write | |
Insecure Default | |
Improper Access Control | |
Authentication Bypass | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Out-of-bounds Write | |
User Impersonation | |
Out-of-bounds Read | |
Directory Traversal | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
Improper Access Control | |
Integer Overflow or Wraparound | |
CVE-2021-37958 | |
Out-of-Bounds | |
Information Exposure | |
Improper Data Handling | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
User Impersonation | |
Access Restriction Bypass | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Use After Free | |
Type Confusion | |
Authentication Bypass | |
Improper Data Handling | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-bounds Read | |
Information Exposure | |
Resource Management Errors | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Improper Authorization | |
Double Free | |
Use After Free | |
Out-of-bounds Read | |
Improper Authentication | |
Out-of-Bounds | |
Race Condition | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Security Features | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Authentication | |
Improper Input Validation | |
Source Code | |
Remote Code Execution (RCE) | |
Remote Code Execution (RCE) | |
Out-of-bounds Read | |
Security Features | |
Resource Management Errors | |
Improper Preservation of Permissions | |
Out-of-Bounds | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Improper Authentication | |
Use After Free | |
Use After Free | |
Cross-site Scripting (XSS) | |
Use After Free | |
Use After Free | |
Information Exposure | |
Use After Free | |
Improper Data Handling | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-Bounds | |
Resource Management Errors | |
Improper Access Control | |
Out-of-Bounds | |
Information Exposure | |
Cryptographic Issues | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Authentication Bypass | |
Out-of-Bounds | |
Use After Free | |
Out-of-bounds Write | |
Improper Input Validation | |
Resource Management Errors | |
Privilege Escalation | |
Cross-site Request Forgery (CSRF) | |
Resource Management Errors | |
Resource Management Errors | |
Improper Access Control | |
Use After Free | |
Arbitrary Code Execution | |
Use After Free | |
Race Condition | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-bounds Write | |
Improper Input Validation | |
Out-of-bounds Read | |
Resource Management Errors | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Access Restriction Bypass | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Write | |
Security Features | |
Out-of-bounds Write | |
Improper Input Validation | |
Out-of-bounds Write | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Type Confusion | |
Incorrect Authorization | |
Access Restriction Bypass | |
Out-of-Bounds | |
Type Confusion | |
Use After Free | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Authentication | |
Improper Input Validation | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Race Condition | |
Improper Input Validation | |
Race Condition | |
Out-of-bounds Read | |
Improper Access Control | |
Resource Management Errors | |
Information Exposure | |
Information Exposure | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
Use After Free | |
Access Restriction Bypass | |
Improper Input Validation | |
Out-of-bounds Write | |
Type Confusion | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Improper Access Control | |
Arbitrary Code Injection | |
Improper Authorization | |
Denial of Service (DoS) | [,34.0.1847.130][34.0.1847.130,34.0.1847.137) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Information Exposure | |
Improper Preservation of Permissions | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Privilege Escalation | |
Privilege Escalation | |
Information Exposure | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Improper Data Handling | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Authentication Bypass | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Improper Handling of Exceptional Conditions | |
Security Features | |
Information Exposure | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Use After Free | |
Improper Input Validation | |
Privilege Escalation | |
Use After Free | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
CVE-2012-2892 | |
Resource Management Errors | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Out-of-Bounds | |
Information Exposure | |
CVE-2013-2859 | |
Access Restriction Bypass | |
Use After Free | |
Improper Authorization | |
Code | |
Out-of-bounds Write | |
Use After Free | |
Improper Access Control | |
Improper Access Control | |
Privilege Escalation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
User Enumeration | |
Out-of-bounds Write | |
Resource Management Errors | |
CVE-2018-18346 | |
Code | |
Use After Free | |
Improper Data Handling | |
Resource Management Errors | |
Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Out-of-bounds Write | |
Use After Free | |
Improper Input Validation | |
Information Exposure | |
User Impersonation | |
Access Restriction Bypass | |
CVE-2013-2868 | |
Out-of-Bounds | |
Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
Cross-site Scripting (XSS) | |
Improper Data Handling | |
Improper Data Handling | |
Information Exposure | |
Out-of-bounds Write | |
Improper Input Validation | |
Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
Race Condition | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Improper Input Validation | |
Race Condition | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Improper Access Control | |
Code | |
Race Condition | |
Information Exposure | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Use After Free | |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Use After Free | |
Improper Input Validation | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Security Features | |
Race Condition | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Improper Input Validation | |
Resource Management Errors | |
Resource Management Errors | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Out-of-Bounds | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Denial of Service (DoS) | |
Out-of-Bounds | |
Privilege Escalation | |
Use After Free | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Use After Free | |
Access Restriction Bypass | |
Denial of Service (DoS) | [,34.0.1847.130][34.0.1847.130,34.0.1847.137) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Insufficient Verification of Data Authenticity | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Use After Free | |
Race Condition | |
Improper Access Control | |
Use After Free | |
Race Condition | |
Insecure Default | |
Denial of Service (DoS) | |
Use After Free | |
Information Exposure | |
Denial of Service (DoS) | |
CVE-2016-1673 | |
Information Exposure | |
Insecure Default | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Improper Access Control | |
Improper Validation of Array Index | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Information Exposure | |
Use After Free | |
Insecure Default | |
Resource Management Errors | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Remote Code Execution (RCE) | [,38.0.2125.7][38.0.2125.7,40.0.2214.109) |
Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
Information Exposure | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Arbitrary Code Execution | |
Resource Management Errors | |
Authentication Bypass | |
Improper Input Validation | |
Use After Free | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Use After Free | |
Use After Free | |
Directory Traversal | |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Improper Input Validation | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
User Impersonation | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Information Exposure | |
Out-of-Bounds | |
Resource Management Errors | |
Use After Free | |
Use After Free | |
Improper Authorization | |
Use After Free | |
Improper Input Validation | |
Type Confusion | |
Use After Free | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Race Condition | |
Improper Input Validation | |
Access Restriction Bypass | |
Resource Management Errors | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Authentication Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Access Control | |
Out-of-bounds Write | |
Authentication Bypass | |
Out-of-bounds Read | |
Cryptographic Issues | |
Improper Input Validation | |
Security Features | |
Improper Input Validation | |
Insecure Default | |
Use of Uninitialized Resource | |
Improper Access Control | |
Information Exposure | |
Resource Management Errors | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Preservation of Permissions | |
Security Features | |
Out-of-bounds Write | |
Authentication Bypass | |
Improper Input Validation | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Out-of-bounds Write | |
Resource Management Errors | |
Improper Data Handling | |
Use After Free | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Information Exposure | |
Use After Free | |
Resource Management Errors | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Improper Input Validation | |
Improper Restriction of Rendered UI Layers or Frames | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Improper Input Validation | |
Out-of-bounds Read | |
Resource Management Errors | |
Security Features | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-bounds Write | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Use After Free | |
Cross-site Scripting (XSS) | |
Use After Free | |
Resource Management Errors | |
Authentication Bypass | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Authentication Bypass | |
Out-of-Bounds | |
Authentication Bypass | |
Improper Access Control | |
Use After Free | |
Denial of Service (DoS) | |
Improper Input Validation | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Type Confusion | |
Authentication Bypass | |
Use After Free | |
User Impersonation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Insecure Default | |
User Impersonation | |
Use After Free | |
Out-of-bounds Write | |
Resource Management Errors | |
Out-of-bounds Write | |
Information Exposure | |
Incorrect Type Conversion or Cast | |
Out-of-bounds Write | |
Information Exposure | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
Out-of-Bounds | |
Use After Free | |
Improper Input Validation | |
Denial of Service (DoS) | |
Security Features | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Resource Management Errors | |
Out-of-bounds Read | |
CVE-2012-2850 | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
Information Exposure | |
Authentication Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Incorrect Authorization | |
Improper Input Validation | |
Directory Traversal | [,33.0.1750.151][33.0.1750.151,33.0.1750.154) |
Improper Restriction of Rendered UI Layers or Frames | |
Insecure Default | |
Resource Management Errors | |
Denial of Service (DoS) | |
Information Exposure | |
Use After Free | |
Out-of-bounds Write | |
Information Exposure | |
Authentication Bypass | |
Use After Free | |
Incorrect Authorization | |
Improper Input Validation | |
Access Restriction Bypass | |
Authentication Bypass | |
Use After Free | |
User Impersonation | |
Resource Management Errors | |
Information Exposure | |
Access Restriction Bypass | |
Incorrect Type Conversion or Cast | |
Authentication Bypass | |
Authentication Bypass | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Out-of-bounds Write | |
Improper Input Validation | |
Use After Free | |
Resource Management Errors | [,34.0.1847.130][34.0.1847.130,34.0.1847.137) |
Resource Management Errors | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Type Confusion | |
Integer Overflow or Wraparound | |
Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92) |
Information Exposure | |
Use After Free | |
Denial of Service (DoS) | |
Type Confusion | |
Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
Integer Overflow or Wraparound | |
Improper Access Control | |
Race Condition | |
Out-of-Bounds | |
Information Exposure | |
Improper Access Control | |
Out-of-Bounds | |
Incorrect Authorization | |
Out-of-bounds Write | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | [,33.0.1750.151][33.0.1750.151,33.0.1750.154) |
Out-of-Bounds | |
Improper Input Validation | |
Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
Denial of Service (DoS) | |
Use After Free | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Incorrect Calculation | |
Integer Overflow or Wraparound | |
Authentication Bypass | |
Out-of-Bounds | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
CVE-2020-6413 | |
Insecure Default | |
Out-of-Bounds | |
Use After Free | |
Type Confusion | |
CVE-2018-17476 | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Use After Free | |
Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Authentication Bypass | |
Out-of-bounds Write | |
Information Exposure | |
Use After Free | |
Authentication Bypass | |
Denial of Service (DoS) | |
Use After Free | |
Security Features | |
Access Restriction Bypass | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Use After Free | |
Type Confusion | |
Use After Free | |
Information Exposure | |
Incorrect Authorization | |
Incorrect Type Conversion or Cast | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
Out-of-bounds Write | |
Out-of-bounds Read | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
Out-of-bounds Write | [,57.0.2987.75][57.0.2987.75,57.0.2987.132) |
Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Improper Input Validation | |
Incorrect Authorization | |
Race Condition | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Use After Free | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
Denial of Service (DoS) | |
Access Restriction Bypass | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Use After Free | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83) |
Use After Free | |
Resource Management Errors | |
Information Exposure | |
Arbitrary Code Execution | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-bounds Read | |
Use After Free | |
Resource Management Errors | |
Use After Free | |
Information Exposure | |
Authentication Bypass | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Improper Data Handling | |
CVE-2015-1211 | |
Improper Input Validation | |
Improper Input Validation | |
Improper Data Handling | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | [,21.0.1180.56][21.0.1180.56,21.0.1180.89) |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-Bounds | |
Denial of Service (DoS) | |
CVE-2020-16022 | |
Race Condition | |
Security Features | |
User Impersonation | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2013-2853 | |
Out-of-bounds Write | |
Out-of-Bounds | |
Improper Authentication | |
Code | |
Improper Input Validation | |
Out-of-Bounds | |
CVE-2013-0908 | |
Improper Input Validation | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-bounds Write | |
Improper Input Validation | [,34.0.1847.130][34.0.1847.130,34.0.1847.137) |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
CVE-2021-37964 | |
Denial of Service (DoS) | |
Security Features | |
Security Features | |
Improper Input Validation | |
Use After Free | |
Code | |
Access Restriction Bypass | |
Remote Code Execution (RCE) | |
Information Exposure | |
Out-of-Bounds | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Use After Free | |
Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116) |
Use After Free | |
Improper Input Validation | |
Access Restriction Bypass | |
Code | |
Information Exposure | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Information Exposure | |
Use After Free | |
Security Features | |
Authentication Bypass | |
Information Exposure | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81) |
Information Exposure | |
Use After Free | |
Improper Input Validation | |
Denial of Service (DoS) | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Race Condition | |
Buffer Overflow | [,25.0.1364.97)(25.0.1364.97,25.0.1364.99) |
Cryptographic Issues | [,37.0.2062.103)[37.0.2062.103,40.0.2214.109) |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Security Features | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Heap-based Buffer Overflow | |
Integer Overflow or Wraparound | |
Code | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-Bounds | |
Integer Overflow or Wraparound | [,10.21.0)[80.0.0.122,80.0.3987.122) |
Code | |
Integer Overflow or Wraparound | |