| Allocation of Resources Without Limits or Throttling (Brash) |  | 
| Heap-based Buffer Overflow |  | 
| Improper Protection of Physical Side Channels |  | 
| External Control of Assumed-Immutable Web Parameter |  | 
| External Control of Assumed-Immutable Web Parameter |  | 
| Use After Free |  | 
| Use After Free |  | 
| Origin Validation Error |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Use After Free |  | 
| Access Control Bypass |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Exposure of Sensitive System Information to an Unauthorized Control Sphere |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Exposure of Sensitive System Information to an Unauthorized Control Sphere |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Cross-site Scripting (XSS) |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use After Free |  | 
| Integer Overflow or Wraparound |  | 
| Incorrect Calculation of Buffer Size |  | 
| Type Confusion |  | 
| Access Control Bypass |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| External Control of Assumed-Immutable Web Parameter |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Information Exposure |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Function Call with Incorrectly Specified Arguments |  | 
| Information Exposure |  | 
| Access Control Bypass |  | 
| Access Control Bypass |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Improper Privilege Management |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Improper Privilege Management |  | 
| Improper Privilege Management |  | 
| Improper Privilege Management |  | 
| Improper Privilege Management |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Improper Isolation or Compartmentalization |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Out-of-bounds Read |  | 
| Exposure of Sensitive Information Through Metadata |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Directory Traversal |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Insufficient Visual Distinction of Homoglyphs Presented to User |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Stack-based Buffer Overflow |  | 
| Race Condition |  | 
| Out-of-bounds Read |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Improper Input Validation |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Improper Privilege Management |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Information Exposure |  | 
| External Control of Assumed-Immutable Web Parameter |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Out-of-bounds Write |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Out-of-bounds Write |  | 
| External Control of Assumed-Immutable Web Parameter |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Improper Access Control |  | 
| Access Restriction Bypass |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Improper Privilege Management |  | 
| Use After Free |  | 
| Access Control Check Implemented After Asset is Accessed |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Access Control Bypass |  | 
| Arbitrary Code Injection |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access Control Bypass |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Arbitrary Command Execution |  | 
| Type Confusion |  | 
| Type Confusion |  | 
| Improper Input Validation |  | 
| Use of Uninitialized Resource |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Heap-based Buffer Overflow |  | 
| Type Confusion |  | 
| External Control of Assumed-Immutable Web Parameter |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Type Confusion |  | 
| Heap-based Buffer Overflow |  | 
| Cross-site Scripting (XSS) |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Heap-based Buffer Overflow |  | 
| Type Confusion |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds Write |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Heap-based Buffer Overflow |  | 
| Out-of-bounds Write |  | 
| Type Confusion |  | 
| Type Confusion |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Improper Input Validation |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Out-of-Bounds Write |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Use After Free |  | 
| Race Condition |  | 
| Out-of-Bounds |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use of Uninitialized Resource |  | 
| Out-of-Bounds Read |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Restriction of Operations within the Bounds of a Memory Buffer |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Improper Access Control |  | 
| Improper Input Validation |  | 
| Improper Access Control |  | 
| Out-of-Bounds Write |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Out-of-Bounds Read |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Race Condition |  | 
| Use After Free |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Read |  | 
| Improper Control of Generation of Code ('Code Injection') |  | 
| Use After Free |  | 
| Improper Control of Generation of Code ('Code Injection') |  | 
| Out-of-bounds Write |  | 
| Type Confusion |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Out-of-bounds Read |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Improper Privilege Management |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Out-of-Bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Out-of-Bounds Write |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Type Confusion |  | 
| Heap-based Buffer Overflow |  | 
| Type Confusion |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Out-of-Bounds Write |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Improper Access Control |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Out-of-bounds Read |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Improper Access Control |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Improper Access Control |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Improper Restriction of Operations within the Bounds of a Memory Buffer |  | 
| Use After Free |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Out-of-bounds Read |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Origin Validation Error |  | 
| NULL Pointer Dereference |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Type Confusion |  | 
| Type Confusion |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Access Control Bypass |  | 
| Out-of-Bounds Write |  | 
| Access Control Bypass |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Insufficient Policy Enforcement |  | 
| Integer Underflow |  | 
| Information Exposure |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Out-of-Bounds |  | 
| Improper Privilege Management |  | 
| Use After Free |  | 
| Access Control Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Type Confusion |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Type Confusion |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Authorization |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Integer Overflow or Wraparound |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Authentication Bypass by Spoofing |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Authentication Bypass by Spoofing |  | 
| Use After Free |  | 
| Improper Access Control |  | 
| Information Exposure |  | 
| Inappropriate implementation |  | 
| Improper Access Control |  | 
| Improper Input Validation |  | 
| Improper Access Control |  | 
| Heap-based Buffer Overflow |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Access Control |  | 
| Type Confusion |  | 
| Use After Free |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Authentication Bypass |  | 
| Access Control Bypass |  | 
| Improper Input Validation |  | 
| Access Control Bypass |  | 
| Inappropriate Implementation in Custom Tabs |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Authentication Bypass |  | 
| Improper Input Validation |  | 
| Heap-based Buffer Overflow |  | 
| Improper Access Control |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Read |  | 
| Improper Data Handling |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Control Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Access Restriction Bypass |  | 
| Heap-based Buffer Overflow |  | 
| Access Restriction Bypass |  | 
| Improper Access Control |  | 
| Out-of-Bounds |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Access Control |  | 
| Arbitrary File Read |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Out-of-bounds Read |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Improper Access Control |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Arbitrary Code Execution |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Missing Encryption of Sensitive Data |  | 
| Improper Input Validation |  | 
| HTTP Header Injection |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Sensitive Cookie with Improper SameSite Attribute |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Arbitrary Code Execution |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Permissive Cross-domain Policy with Untrusted Domains |  | 
| Arbitrary Code Execution |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Heap-based Buffer Overflow |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Arbitrary File Read |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Arbitrary File Read |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Access Control |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Out-of-Bounds |  | 
| Access Control Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Improper Access Control |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Heap-based Buffer Overflow |  | 
| Out-of-Bounds |  | 
| Heap-based Buffer Overflow |  | 
| Integer Overflow or Wraparound |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Authentication Bypass |  | 
| Improper Input Validation |  | 
| DNS Rebinding |  | 
| Heap-based Buffer Overflow |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Read |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Authentication Bypass |  | 
| Access Restriction Bypass |  | 
| Heap-based Buffer Overflow |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Heap-based Buffer Overflow |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Heap-based Buffer Overflow |  | 
| Authentication Bypass |  | 
| Authentication Bypass |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Stack-based Buffer Overflow |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use After Free |  | 
| Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Integer Overflow to Buffer Overflow |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Heap-based Buffer Overflow |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Out-of-bounds Read |  | 
| Access Restriction Bypass |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Heap-based Buffer Overflow |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Improperly Implemented Security Check for Standard |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Improperly Implemented Security Check for Standard |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Denial of Service (DoS) |  | 
| Integer Overflow or Wraparound |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Control Bypass |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Use After Free |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Data Handling |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Access Control Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Heap-based Buffer Overflow |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Improper Input Validation |  | 
| Type Confusion |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| Race Condition |  | 
| Improper Input Validation |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Heap-based Buffer Overflow |  | 
| Access Restriction Bypass |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Arbitrary Code Injection |  | 
| Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Authentication |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Access Restriction Bypass |  | 
| Creation of Temporary File in Directory with Insecure Permissions |  | 
| Out-of-bounds Write |  | 
| User Interface Misrepresentation of Critical Information |  | 
| User Interface Misrepresentation of Critical Information |  | 
| Type Confusion |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Access Control Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Use After Free |  | 
| User Interface Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| User Interface Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Access Control Bypass |  | 
| Buffer Overflow |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Double Free |  | 
| Heap-based Buffer Overflow |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Access Control Bypass |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Type confusion |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| User Interface Security Issue |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| User Impersonation |  | 
| Type Confusion |  | 
| Heap-based Buffer Overflow |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Use After Free |  | 
| User Interface Security Issue |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Heap-based Buffer Overflow | [,102.0.5005.148)[103.0.0.0,103.0.5060.114)  | 
| Use After Free |  | 
| Protection Mechanism Failure |  | 
| Arbitrary File Read |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Insufficient Policy Enforcement |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Use After Free |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Heap-based Buffer Overflow |  | 
| Insecure Defaults |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Inappropriate implementation |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Type Confusion |  | 
| Improper implementation |  | 
| Type Confusion |  | 
| Information Exposure |  | 
| Heap-based Buffer Overflow |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Out-of-bounds Write |  | 
| Arbitrary File Upload |  | 
| Improper Input Validation | [,59.0.3071.104)(59.0.3071.104,59.0.3071.117)  | 
| Out-of-bounds Write |  | 
| Code |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Privilege Escalation |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Read |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Improper Access Control |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Cross-site Scripting (XSS) |  | 
| Type Confusion |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Use After Free | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Insecure Default |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Read |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Incorrect Authorization |  | 
| Access Restriction Bypass |  | 
| Cross-site Scripting (XSS) |  | 
| Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Denial of Service (DoS) |  | 
| Integer Overflow or Wraparound |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| CVE-2012-5111 |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Cryptographic Issues |  | 
| Information Exposure |  | 
| CVE-2018-6103 |  | 
| Use After Free |  | 
| Integer Overflow or Wraparound |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Type Confusion |  | 
| Access Restriction Bypass |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| Authentication Bypass |  | 
| CVE-2014-1681 |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Improper Data Handling |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Resource Management Errors |  | 
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| NULL Pointer Dereference |  | 
| Integer Overflow or Wraparound |  | 
| Use After Free |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| CVE-2013-2268 | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Improper Preservation of Permissions |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Access Restriction Bypass |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Write |  | 
| Cross-site Scripting (XSS) |  | 
| Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Insecure Default |  | 
| Out-of-Bounds |  | 
| Security Features |  | 
| Insecure Default |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| CVE-2018-17471 |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| User Impersonation |  | 
| Use After Free |  | 
| Improper Input Validation | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83)  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Improper Access Control |  | 
| Incorrect Authorization |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Improper Preservation of Permissions | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| User Impersonation |  | 
| Security Features |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Integer Overflow or Wraparound |  | 
| Use After Free |  | 
| Security Features |  | 
| Information Exposure |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Race Condition |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Resource Management Errors |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Resource Management Errors |  | 
| Type Confusion |  | 
| Out-of-bounds Write |  | 
| Integer Overflow or Wraparound |  | 
| Incorrect Authorization |  | 
| Incorrect Type Conversion or Cast |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Insufficient Verification of Data Authenticity |  | 
| Out-of-Bounds | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81)  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Information Exposure |  | 
| Improper Access Control |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Denial of Service (DoS) |  | 
| CVE-2016-9652 |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| CVE-2013-0886 |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Remote Code Execution (RCE) |  | 
| Security Features |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Type Confusion |  | 
| Improper Input Validation |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Input Validation |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Improper Data Handling |  | 
| Cryptographic Issues |  | 
| Improper Input Validation |  | 
| Security Features |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Security Features |  | 
| Incorrect Type Conversion or Cast |  | 
| Information Exposure |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Incorrect Authorization |  | 
| Directory Traversal |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81)  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Authentication Bypass |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Integer Overflow or Wraparound |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Access Restriction Bypass |  | 
| Use After Free | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Race Condition |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| Information Exposure |  | 
| Access Restriction Bypass |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Insufficiently Protected Credentials |  | 
| Improper Certificate Validation |  | 
| Race Condition |  | 
| Insecure Default |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Information Exposure | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| Out-of-Bounds |  | 
| Out-of-bounds Read |  | 
| Resource Management Errors |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Improper Access Control |  | 
| Out-of-bounds Read |  | 
| Cross-site Scripting (XSS) |  | 
| CVE-2020-15992 |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Resource Management Errors |  | 
| Authentication Bypass |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Type Confusion |  | 
| Resource Management Errors |  | 
| Use After Free |  | 
| Open Redirect |  | 
| Insecure Default |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Incorrect Authorization |  | 
| Use After Free |  | 
| Remote Code Execution (RCE) |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Improper Data Handling |  | 
| User Impersonation |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Insufficiently Protected Credentials |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Code |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| Improper Access Control |  | 
| Information Exposure |  | 
| Authentication Bypass |  | 
| Access Restriction Bypass |  | 
| Security Features |  | 
| Out-of-bounds Read |  | 
| Denial of Service (DoS) |  | 
| Privilege Escalation |  | 
| Cross-site Scripting (XSS) |  | 
| Out-of-Bounds |  | 
| Integer Overflow or Wraparound |  | 
| Improper Input Validation |  | 
| Incorrect Type Conversion or Cast | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92)  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Validation of Array Index |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Code |  | 
| Use of Uninitialized Resource |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| CVE-2013-6628 |  | 
| Authentication Bypass |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Incorrect Type Conversion or Cast |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| CVE-2016-5194 |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Directory Traversal |  | 
| Access Restriction Bypass |  | 
| Directory Traversal |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Use of Uninitialized Resource |  | 
| Resource Management Errors |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Authentication Bypass |  | 
| Out-of-bounds Read |  | 
| Open Redirect |  | 
| Out-of-bounds Write |  | 
| Insecure Encryption |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Use After Free |  | 
| CVE-2013-2872 |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| CRLF Injection |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Incorrect Authorization |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Information Exposure |  | 
| CVE-2020-6420 |  | 
| Use After Free |  | 
| CVE-2011-3101 |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| User Impersonation |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| CVE-2012-2875 |  | 
| Information Exposure |  | 
| Improper Data Handling |  | 
| Out-of-bounds Write |  | 
| Access Restriction Bypass | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Authentication Bypass |  | 
| Improper Input Validation |  | 
| Improper Data Handling |  | 
| Authentication Bypass |  | 
| Improper Input Validation |  | 
| Improper Initialization |  | 
| Cross-site Scripting (XSS) |  | 
| Denial of Service (DoS) |  | 
| Resource Management Errors |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| User Impersonation |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Improper Authentication |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Code |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| CVE-2013-0842 |  | 
| Improper Action Name Cleanup |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Improper Data Handling |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Race Condition |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Use of Uninitialized Resource |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Time and State |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Incorrect Authorization |  | 
| Race Condition |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Insecure Default |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Improper Check for Unusual or Exceptional Conditions |  | 
| Out-of-Bounds |  | 
| User Impersonation |  | 
| Incorrect Authorization |  | 
| Use of Uninitialized Resource |  | 
| CVE-2016-1674 |  | 
| Use After Free |  | 
| Improper Authentication |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Improper Data Handling |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Read |  | 
| Denial of Service (DoS) |  | 
| Cross-site Scripting (XSS) |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Improper Access Control |  | 
| Security Features |  | 
| Security Features |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Read |  | 
| Authentication Bypass |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Authentication Bypass |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| CVE-2012-5141 |  | 
| Code |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Authentication Bypass |  | 
| Improper Authorization |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Arbitrary Command Injection |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Improper Access Control |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92)  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Integer Overflow or Wraparound |  | 
| Use After Free |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Authentication Bypass |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Information Exposure | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81)  | 
| Cross-site Scripting (XSS) |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Unsafe Dependency Resolution |  | 
| Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92)  | 
| Improper Input Validation |  | 
| Improper Initialization |  | 
| Improper Access Control |  | 
| User Impersonation |  | 
| Out-of-Bounds |  | 
| Improper Data Handling |  | 
| Improper Data Handling |  | 
| Out-of-Bounds |  | 
| CVE-2018-16075 |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Use After Free | [,59.0.3071.104)(59.0.3071.104,59.0.3071.117)  | 
| Access Restriction Bypass | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Improper Authorization |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Improper Data Handling |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Race Condition |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Improper Authentication |  | 
| Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| User Impersonation |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Information Exposure | [,36.0.1985.135)(36.0.1985.135,36.0.1985.143)  | 
| Use After Free |  | 
| Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| User Impersonation |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| Out-of-bounds Read |  | 
| Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| Improper Input Validation |  | 
| Resource Management Errors |  | 
| Cryptographic Issues |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Cross-site Scripting (XSS) |  | 
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Denial of Service (DoS) |  | 
| Cryptographic Issues |  | 
| Improper Data Handling |  | 
| Use After Free |  | 
| Incorrect Authorization |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Resource Management Errors |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| CVE-2019-13755 |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Authentication Bypass |  | 
| Authentication Bypass |  | 
| Type Confusion |  | 
| Integer Overflow or Wraparound |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Privilege Escalation |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| CVE-2012-2764 |  | 
| Use After Free |  | 
| Improper Input Validation | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| User Enumeration |  | 
| Authentication Bypass |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Insecure Default |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Missing Encryption of Sensitive Data | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Cross-site Scripting (XSS) |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| User Impersonation |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Improper Access Control |  | 
| Resource Management Errors |  | 
| Security Features |  | 
| CVE-2019-5833 |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Resource Management Errors |  | 
| Security Features |  | 
| Authentication Bypass |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Incorrect Type Conversion or Cast | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83)  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Arbitrary Code Execution |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Insecure Default |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds |  | 
| Integer Overflow or Wraparound |  | 
| Type Confusion |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Privilege Escalation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Data Handling |  | 
| Improper Data Handling |  | 
| Out-of-Bounds |  | 
| Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92)  | 
| Authentication Bypass |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Authentication Bypass |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Out-of-Bounds | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81)  | 
| Information Exposure |  | 
| Resource Management Errors |  | 
| Use After Free |  | 
| Race Condition |  | 
| CVE-2012-5138 |  | 
| Out-of-Bounds | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Authentication Bypass |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| CVE-2021-21212 |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Resource Management Errors |  | 
| Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Use After Free |  | 
| Information Exposure |  | 
| Access Restriction Bypass | [,34.0.1847.130][34.0.1847.130,34.0.1847.137)  | 
| Insecure Default |  | 
| Improper Data Handling |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Cryptographic Issues |  | 
| CVE-2020-6574 |  | 
| Insecure Storage of Sensitive Information |  | 
| Use After Free |  | 
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Use After Free |  | 
| Race Condition |  | 
| DEPRECATED: Use of Uninitialized Resource |  | 
| Cross-site Scripting (XSS) | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83)  | 
| Use After Free |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Incorrect Type Conversion or Cast |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Remote Code Execution (RCE) |  | 
| Integer Overflow or Wraparound |  | 
| Improper Input Validation |  | 
| Cross-site Scripting (XSS) |  | 
| Information Exposure |  | 
| User Impersonation |  | 
| Integer Overflow or Wraparound |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Resource Management Errors |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Use of Uninitialized Resource |  | 
| Security Features |  | 
| Incorrect Authorization |  | 
| Out-of-Bounds |  | 
| Incorrect Authorization |  | 
| Improper Data Handling |  | 
| Information Exposure | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Access Restriction Bypass |  | 
| Race Condition |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Privilege Context Switching Error |  | 
| Out-of-bounds Write |  | 
| Code |  | 
| User Impersonation |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Improper Access Control |  | 
| Arbitrary Code Execution |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Out-of-bounds Read |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Authentication Bypass |  | 
| Information Exposure |  | 
| Out-of-Bounds | [,33.0.1750.151][33.0.1750.151,33.0.1750.154)  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Resource Management Errors | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Security Features |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Out-of-bounds Read |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Resource Management Errors |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Integer Overflow or Wraparound |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Insecure Default |  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Type Confusion |  | 
| CVE-2020-15973 |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| NULL Pointer Dereference |  | 
| Race Condition |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Improper Data Handling |  | 
| Improper Input Validation |  | 
| Incorrect Authorization |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Cross-site Scripting (XSS) |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Incorrect Type Conversion or Cast |  | 
| Access Restriction Bypass |  | 
| Cross-site Scripting (XSS) |  | 
| Resource Management Errors |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Buffer Overflow |  | 
| User Impersonation |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Security Features |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Argument Injection |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Improper Authentication |  | 
| Insecure Storage of Sensitive Information |  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Insecure Default |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Information Exposure |  | 
| Access Restriction Bypass |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Access Restriction Bypass |  | 
| Cross-site Scripting (XSS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Cross-site Scripting (XSS) |  | 
| Type Confusion |  | 
| Use After Free |  | 
| User Impersonation |  | 
| Out-of-bounds Read |  | 
| Resource Management Errors |  | 
| Access Restriction Bypass |  | 
| Security Features |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| CVE-2018-20067 |  | 
| Improper Input Validation |  | 
| CVE-2013-6661 |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Authentication Bypass |  | 
| Improper Data Handling |  | 
| Improper Authentication |  | 
| Security Features |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Incorrect Type Conversion or Cast |  | 
| Access Restriction Bypass |  | 
| Improper Authentication |  | 
| Security Features |  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Code |  | 
| CVE-2021-30618 |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Insecure Default |  | 
| User Enumeration |  | 
| Code |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Improper Access Control |  | 
| Improper Authentication |  | 
| Access Restriction Bypass | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Improper Input Validation |  | 
| Missing Cryptographic Step |  | 
| Improper Input Validation |  | 
| Cross-site Scripting (XSS) |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| User Impersonation |  | 
| Type Confusion |  | 
| Out-of-Bounds |  | 
| Cross-site Scripting (XSS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| CRLF Injection |  | 
| Security Features |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Directory Traversal | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Out-of-bounds Read | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83)  | 
| Out-of-bounds Write |  | 
| User Impersonation |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Input Validation | [,58.0.3029.83)(58.0.3029.83,59.0.3071.86)  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Denial of Service (DoS) |  | 
| Improper Access Control |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| User Impersonation |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Out-of-bounds Read |  | 
| Denial of Service (DoS) |  | 
| CVE-2013-0884 | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Information Exposure |  | 
| CVE-2012-2821 |  | 
| CVE-2013-2867 |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Insecure Default |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| Use After Free | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92)  | 
| Use After Free |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Insecure Default |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Write |  | 
| Resource Management Errors |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Improper Authentication |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Authentication Bypass |  | 
| Improper Input Validation |  | 
| Cross-site Scripting (XSS) |  | 
| Integer Overflow or Wraparound |  | 
| Cryptographic Issues |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Resource Management Errors |  | 
| Incorrect Type Conversion or Cast |  | 
| Improper Input Validation |  | 
| Race Condition |  | 
| Information Exposure |  | 
| Resource Management Errors |  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Use After Free |  | 
| CVE-2014-1726 |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Out-of-Bounds |  | 
| Security Features |  | 
| Denial of Service (DoS) |  | 
| Improper Authentication |  | 
| Information Exposure |  | 
| Access Restriction Bypass |  | 
| Insecure Default |  | 
| CVE-2020-6410 |  | 
| Authentication Bypass |  | 
| Information Exposure | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Information Exposure |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Code |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Incorrect Authorization |  | 
| Insufficiently Protected Credentials |  | 
| Improper Input Validation |  | 
| Improper Data Handling |  | 
| Race Condition | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Authentication Bypass |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Code |  | 
| Resource Management Errors |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Improper Data Handling |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| CVE-2021-30620 |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Read |  | 
| Security Features |  | 
| Improper Data Handling |  | 
| Integer Overflow or Wraparound |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| Out-of-bounds Write |  | 
| Insecure Default |  | 
| Improper Access Control |  | 
| Authentication Bypass |  | 
| Remote Code Execution (RCE) |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| User Impersonation |  | 
| Out-of-bounds Read |  | 
| Directory Traversal |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Improper Access Control |  | 
| Integer Overflow or Wraparound |  | 
| CVE-2021-37958 |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Improper Data Handling |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| User Impersonation |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Authentication Bypass |  | 
| Improper Data Handling |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Resource Management Errors |  | 
| Out-of-bounds Read |  | 
| Information Exposure |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Improper Authorization |  | 
| Double Free |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Improper Authentication |  | 
| Out-of-Bounds |  | 
| Race Condition |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Security Features |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Improper Authentication |  | 
| Improper Input Validation |  | 
| Source Code |  | 
| Remote Code Execution (RCE) |  | 
| Remote Code Execution (RCE) |  | 
| Out-of-bounds Read |  | 
| Security Features |  | 
| Resource Management Errors |  | 
| Improper Preservation of Permissions |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Arbitrary Code Execution |  | 
| Improper Authentication |  | 
| Use After Free |  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Improper Data Handling |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| Improper Access Control |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Observable Discrepancy |  | 
| Cross-site Scripting (XSS) |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Authentication Bypass |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Resource Management Errors |  | 
| Privilege Escalation |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Arbitrary Code Execution |  | 
| Use After Free |  | 
| Race Condition |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Out-of-bounds Read |  | 
| Resource Management Errors |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Security Features |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Incorrect Authorization |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds |  | 
| Type Confusion |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Improper Authentication |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Input Validation |  | 
| Race Condition |  | 
| Improper Input Validation |  | 
| Race Condition |  | 
| Out-of-bounds Read |  | 
| Improper Access Control |  | 
| Resource Management Errors |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Type Confusion |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Access Control |  | 
| Arbitrary Code Injection |  | 
| Improper Authorization |  | 
| Denial of Service (DoS) | [,34.0.1847.130][34.0.1847.130,34.0.1847.137)  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Improper Preservation of Permissions |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Privilege Escalation |  | 
| Privilege Escalation |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Access Restriction Bypass |  | 
| Improper Data Handling |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Authentication Bypass |  | 
| Cross-site Scripting (XSS) |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Improper Handling of Exceptional Conditions |  | 
| Security Features |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Privilege Escalation |  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Out-of-Bounds |  | 
| CVE-2012-2892 |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| CVE-2013-2859 |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Improper Authorization |  | 
| Code |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Privilege Escalation |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Use After Free |  | 
| User Enumeration |  | 
| Out-of-bounds Write |  | 
| Resource Management Errors |  | 
| CVE-2018-18346 |  | 
| Code |  | 
| Use After Free |  | 
| Improper Data Handling |  | 
| Resource Management Errors |  | 
| Integer Overflow or Wraparound | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| User Impersonation |  | 
| Access Restriction Bypass |  | 
| CVE-2013-2868 |  | 
| Out-of-Bounds |  | 
| Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92)  | 
| Cross-site Scripting (XSS) |  | 
| Improper Data Handling |  | 
| Improper Data Handling |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| Race Condition |  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Race Condition |  | 
| Integer Overflow or Wraparound |  | 
| Improper Input Validation |  | 
| Improper Access Control |  | 
| Code |  | 
| Race Condition |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Cross-site Scripting (XSS) |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Information Exposure |  | 
| Security Features |  | 
| Race Condition | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Improper Input Validation |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Privilege Escalation |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Denial of Service (DoS) | [,34.0.1847.130][34.0.1847.130,34.0.1847.137)  | 
| Access Restriction Bypass |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Insufficient Verification of Data Authenticity |  | 
| Denial of Service (DoS) |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Race Condition |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Race Condition |  | 
| Insecure Default |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| CVE-2016-1673 |  | 
| Information Exposure |  | 
| Insecure Default |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Improper Access Control |  | 
| Improper Validation of Array Index |  | 
| Out-of-bounds Write |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Insecure Default |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Write |  | 
| Remote Code Execution (RCE) | [,38.0.2125.7][38.0.2125.7,40.0.2214.109)  | 
| Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| Information Exposure |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Input Validation |  | 
| Arbitrary Code Execution |  | 
| Resource Management Errors |  | 
| Authentication Bypass |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Use After Free |  | 
| Directory Traversal |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Cross-site Scripting (XSS) |  | 
| User Impersonation |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Authorization |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Type Confusion |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Cross-site Scripting (XSS) | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Race Condition |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Resource Management Errors |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Authentication Bypass |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Improper Access Control |  | 
| Out-of-bounds Write |  | 
| Authentication Bypass |  | 
| Out-of-bounds Read |  | 
| Cryptographic Issues |  | 
| Improper Input Validation |  | 
| Security Features |  | 
| Improper Input Validation |  | 
| Insecure Default |  | 
| Use of Uninitialized Resource |  | 
| Improper Access Control |  | 
| Information Exposure |  | 
| Resource Management Errors |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Improper Preservation of Permissions |  | 
| Security Features |  | 
| Out-of-bounds Write |  | 
| Authentication Bypass |  | 
| Improper Input Validation | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Out-of-bounds Write |  | 
| Resource Management Errors |  | 
| Improper Data Handling |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Resource Management Errors | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Improper Input Validation |  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Use After Free |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Out-of-bounds Read |  | 
| Resource Management Errors |  | 
| Security Features |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Cross-site Scripting (XSS) |  | 
| Authentication Bypass |  | 
| Out-of-Bounds |  | 
| Authentication Bypass |  | 
| Improper Access Control |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Integer Overflow or Wraparound |  | 
| Denial of Service (DoS) |  | 
| Type Confusion |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| User Impersonation |  | 
| Denial of Service (DoS) |  | 
| Improper Input Validation |  | 
| Incorrect Type Conversion or Cast |  | 
| Insecure Default |  | 
| User Impersonation |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Resource Management Errors |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Incorrect Type Conversion or Cast |  | 
| Out-of-bounds Write |  | 
| Information Exposure | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92)  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Security Features |  | 
| Cross-site Scripting (XSS) |  | 
| Resource Management Errors |  | 
| Resource Management Errors |  | 
| Out-of-bounds Read |  | 
| CVE-2012-2850 | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| Information Exposure |  | 
| Authentication Bypass |  | 
| Access Restriction Bypass |  | 
| Improper Input Validation |  | 
| Out-of-bounds Read |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Incorrect Authorization |  | 
| Improper Input Validation |  | 
| Directory Traversal | [,33.0.1750.151][33.0.1750.151,33.0.1750.154)  | 
| Improper Restriction of Rendered UI Layers or Frames |  | 
| Insecure Default |  | 
| Resource Management Errors |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| Incorrect Authorization |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| User Impersonation |  | 
| Resource Management Errors |  | 
| Information Exposure |  | 
| Access Restriction Bypass |  | 
| Incorrect Type Conversion or Cast |  | 
| Authentication Bypass |  | 
| Authentication Bypass |  | 
| Integer Overflow or Wraparound |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Resource Management Errors | [,34.0.1847.130][34.0.1847.130,34.0.1847.137)  | 
| Resource Management Errors |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Access Restriction Bypass |  | 
| Type Confusion |  | 
| Integer Overflow or Wraparound |  | 
| Improper Input Validation | [,59.0.3071.86)(59.0.3071.86,59.0.3071.92)  | 
| Information Exposure |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Type Confusion |  | 
| Resource Management Errors | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| Integer Overflow or Wraparound |  | 
| Improper Access Control |  | 
| Race Condition |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Improper Access Control |  | 
| Out-of-Bounds |  | 
| Incorrect Authorization |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Improper Input Validation | [,33.0.1750.151][33.0.1750.151,33.0.1750.154)  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Cross-site Scripting (XSS) |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Incorrect Calculation |  | 
| Integer Overflow or Wraparound |  | 
| Authentication Bypass |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Cross-site Scripting (XSS) |  | 
| CVE-2020-6413 |  | 
| Insecure Default |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Type Confusion |  | 
| CVE-2018-17476 |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Out-of-Bounds | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Authentication Bypass |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Authentication Bypass |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Security Features |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Use After Free |  | 
| Type Confusion |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Incorrect Authorization |  | 
| Incorrect Type Conversion or Cast | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81)  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Read | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83)  | 
| Out-of-bounds Write | [,57.0.2987.75][57.0.2987.75,57.0.2987.132)  | 
| Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Improper Input Validation |  | 
| Incorrect Authorization |  | 
| Race Condition |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Access Restriction Bypass |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Denial of Service (DoS) |  | 
| Resource Management Errors |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Use After Free |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Use After Free | [,58.0.3029.81)(58.0.3029.81,58.0.3029.83)  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Information Exposure |  | 
| Arbitrary Code Execution |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Read |  | 
| Improper Input Validation |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Resource Management Errors |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Authentication Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Improper Data Handling |  | 
| CVE-2015-1211 |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Data Handling |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Out-of-Bounds | [,21.0.1180.56][21.0.1180.56,21.0.1180.89)  | 
| Denial of Service (DoS) |  | 
| Resource Management Errors |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| CVE-2020-16022 |  | 
| Race Condition |  | 
| Security Features |  | 
| User Impersonation |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| CVE-2013-2853 |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Improper Authentication |  | 
| Code |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| CVE-2013-0908 |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation | [,34.0.1847.130][34.0.1847.130,34.0.1847.137)  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| CVE-2021-37964 |  | 
| Denial of Service (DoS) |  | 
| Security Features |  | 
| Security Features |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Code |  | 
| Access Restriction Bypass |  | 
| Remote Code Execution (RCE) |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Access Restriction Bypass |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Denial of Service (DoS) | [,25.0.1364.95][25.0.1364.95,27.0.1453.116)  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Code |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Use After Free |  | 
| Security Features |  | 
| Authentication Bypass |  | 
| Information Exposure | [,61.0.3163.79)(61.0.3163.79,61.0.3163.81)  | 
| Information Exposure |  | 
| Use After Free |  | 
| Improper Input Validation |  | 
| Denial of Service (DoS) |  | 
| NULL Pointer Dereference |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Race Condition |  | 
| Buffer Overflow | [,25.0.1364.97)(25.0.1364.97,25.0.1364.99)  | 
| Cryptographic Issues | [,37.0.2062.103)[37.0.2062.103,40.0.2214.109)  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Resource Management Errors |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Denial of Service (DoS) |  | 
| Out-of-Bounds |  | 
| Security Features |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Heap-based Buffer Overflow |  | 
| Integer Overflow or Wraparound |  | 
| Code |  | 
| Out-of-Bounds |  | 
| Resource Management Errors |  | 
| Out-of-Bounds |  | 
| Integer Overflow or Wraparound | [,10.21.0)[80.0.0.122,80.0.3987.122)  | 
| Code |  | 
| Integer Overflow or Wraparound |  |