chromium vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://chromium.googlesource.com|chromium package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Stack-based Buffer Overflow

[,132.0.6834.83)
  • H
Race Condition

[,132.0.6834.83)
  • H
Out-of-bounds Read

[,132.0.6834.83)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,132.0.6834.82)
  • M
Improper Input Validation

[,132.0.6834.83)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,132.0.6834.83)
  • H
Improper Privilege Management

[,132.0.6834.83)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,132.0.6834.83)
  • M
Information Exposure

[,132.0.6834.83)
  • H
External Control of Assumed-Immutable Web Parameter

[,132.0.6834.83)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,132.0.6834.83)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,132.0.6834.83)
  • C
Out-of-bounds Write

[,132.0.6834.83)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,131.0.6778.264)
  • H
Out-of-bounds Write

[,131.0.6778.204)
  • H
Out-of-bounds Write

[,131.0.6778.204)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,131.0.6778.204)
  • H
Use After Free

[,131.0.6778.204)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,131.0.6778.139)
  • H
Use After Free

[,131.0.6778.139)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,131.0.6778.108)
  • C
Out-of-bounds Write

[,129.0.6668.89)
  • H
External Control of Assumed-Immutable Web Parameter

[,129.0.6668.89)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,131.0.6778.85)
  • M
Improper Access Control

[,131.0.6778.69)
  • M
Access Restriction Bypass

[,131.0.6778.69)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,131.0.6778.69)
  • H
Improper Privilege Management

[,131.0.6778.69)
  • H
Use After Free

[,131.0.6778.69)
  • M
Access Control Check Implemented After Asset is Accessed

[,131.0.6778.69)
  • H
Use After Free

[,131.0.6778.69)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,131.0.6778.69)
  • H
Use After Free

[,130.0.6723.116)
  • H
Use After Free

[,130.0.6723.116)
  • H
Out-of-bounds Write

[,130.0.6723.92)
  • H
Use After Free

[,130.0.6723.92)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,130.0.6723.69)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,130.0.6723.69)
  • H
Improper Access Control

[,130.0.6723.69)
  • H
Use After Free

[,130.0.6723.58)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,130.0.6723.58)
  • H
Use After Free

[,130.0.6723.58)
  • H
Access Control Bypass

[,130.0.6723.58)
  • H
Arbitrary Code Injection

[,130.0.6723.58)
  • H
Use After Free

[,130.0.6723.58)
  • H
Use After Free

[,130.0.6723.58)
  • M
Access Control Bypass

[,130.0.6723.58)
  • H
Use After Free

[,130.0.6723.58)
  • M
Improper Input Validation

[,130.0.6723.58)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,130.0.6723.58)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,130.0.6723.58)
  • M
Use After Free

[,130.0.6723.58)
  • H
Arbitrary Command Execution

[,126.0.6478.126)
  • H
Type Confusion

[,129.0.6668.100)
  • C
Type Confusion

[,129.0.6668.100)
  • M
Improper Input Validation

[,128.0.6537.0)
  • H
Use of Uninitialized Resource

[,123.0.6312.58)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,124.0.6367.60)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,113.0.5672.63)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,119.0.6045.105)
  • H
Out-of-bounds Read

[,73.0.3683.75)
  • M
Improper Input Validation

[,126.0.6478.54)
  • H
Use After Free

[,92.0.4515.107)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,124.0.6367.60)
  • M
Heap-based Buffer Overflow

[,124.0.6367.78)
  • M
Type Confusion

[,129.0.6668.70)
  • H
External Control of Assumed-Immutable Web Parameter

[,129.0.6668.70)
  • H
Use After Free

[,129.0.6668.70)
  • H
Out-of-bounds Read

[,129.0.6668.70)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,129.0.6668.58)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,129.0.6668.58)
  • H
Type Confusion

[,129.0.6668.58)
  • H
Heap-based Buffer Overflow

[,129.0.6668.58)
  • H
Cross-site Scripting (XSS)

[,129.0.6668.58)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,129.0.6668.58)
  • H
Heap-based Buffer Overflow

[,128.0.6613.137)
  • H
Type Confusion

[,128.0.6613.137)
  • H
Use After Free

[,128.0.6613.137)
  • H
Use After Free

[,128.0.6613.137)
  • C
Out-of-Bounds Write

[,128.0.6613.119)
  • H
Use After Free

[,128.0.6613.119)
  • H
Type Confusion

[,128.0.6613.113)
  • H
Heap-based Buffer Overflow

[,128.0.6613.113)
  • H
Heap-based Buffer Overflow

[,128.0.6613.113)
  • H
Use After Free

[,128.0.6613.84)
  • M
Heap-based Buffer Overflow

[,128.0.6613.84)
  • M
Heap-based Buffer Overflow

[,128.0.6613.84)
  • H
Out-of-bounds Read

[,128.0.6613.84)
  • H
Use After Free

[,128.0.6613.84)
  • M
Out-of-bounds Read

[,128.0.6613.84)
  • H
Heap-based Buffer Overflow

[,128.0.6613.84)
  • H
Out-of-bounds Write

[,128.0.6613.84)
  • H
Type Confusion

[,128.0.6613.84)
  • H
Type Confusion

[,128.0.6613.84)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,128.0.6613.84)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,128.0.6613.84)
  • H
Information Exposure

[,128.0.6613.84)
  • M
Improper Input Validation

[,128.0.6613.84)
  • M
Improper Input Validation

[,128.0.6613.84)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,128.0.6613.84)
  • H
Improper Input Validation

[,128.0.6613.84)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,128.0.6613.84)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,128.0.6613.84)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,128.0.6613.84)
  • C
Cross-site Request Forgery (CSRF)

[,129.0.6626.0)
  • H
Out-of-Bounds Write

[,127.0.6533.99)
  • H
Use After Free

[,127.0.6533.99)
  • M
Heap-based Buffer Overflow

[,127.0.6533.99)
  • M
Heap-based Buffer Overflow

[,127.0.6533.99)
  • H
Use After Free

[,127.0.6533.99)
  • M
Type Confusion

[,127.0.6533.99)
  • M
Improper Input Validation

[,127.0.6533.72)
  • M
Improper Input Validation

[,127.0.6533.72)
  • M
Out-of-Bounds

[,127.0.6533.72)
  • M
Out-of-Bounds

[,127.0.6533.72)
  • M
Use After Free

[,127.0.6533.72)
  • H
Out-of-Bounds

[,127.0.6533.72)
  • H
Use After Free

[,127.0.6533.72)
  • H
Use After Free

[,127.0.6533.72)
  • H
Race Condition

[,127.0.6533.72)
  • H
Out-of-Bounds

[,127.0.6533.72)
  • M
Heap-based Buffer Overflow

[,127.0.6533.72)
  • H
Use After Free

[,127.0.6533.72)
  • H
Use After Free

[,127.0.6533.72)
  • H
Use After Free

[,127.0.6533.72)
  • H
Use of Uninitialized Resource

[,127.0.6533.88)
  • H
Out-of-Bounds Read

[,127.0.6533.88)
  • M
Improper Input Validation

[,127.0.6533.88)
  • M
Improper Input Validation

[,121.0.6167.85)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,119.0.6045.105)
  • M
Improper Access Control

[,122.0.6261.57)
  • H
Use After Free

[,122.0.6261.57)
  • M
Improper Input Validation

[,120.0.6099.62)
  • H
Use After Free

[,121.0.6167.85)
  • H
Use After Free

[,117.0.5938.62)
  • H
Use After Free

[,121.0.6167.139)
  • H
Improper Input Validation

[,117.0.5938.62)
  • M
Information Exposure

[,85.0.4183.83)
  • M
Improper Access Control

[,119.0.6045.105)
  • C
Improper Input Validation

[,115.0.5790.98)
  • M
Improper Access Control

[,119.0.6045.105)
  • H
Out-of-Bounds Write

[,117.0.5938.62)
  • H
Improper Input Validation

[,77.0.3865.75)
  • M
Improper Input Validation

[,120.0.6099.62)
  • M
Out-of-Bounds Read

[,121.0.6167.139)
  • H
Out-of-bounds Read

[,126.0.6478.182)
  • M
Use After Free

[,122.0.6261.57)
  • H
Use After Free

[,126.0.6478.182)
  • H
Use After Free

[,126.0.6478.182)
  • M
Race Condition

[,126.0.6478.182)
  • H
Use After Free

[,126.0.6478.182)
  • H
Use After Free

[,126.0.6478.182)
  • H
Heap-based Buffer Overflow

[,126.0.6478.182)
  • C
Out-of-bounds Read

[,126.0.6478.182)
  • H
Use After Free

[,126.0.6478.126)
  • H
Use After Free

[,126.0.6478.126)
  • H
Use After Free

[,126.0.6478.126)
  • H
Use After Free

[,126.0.6478.126)
  • H
Use After Free

[,126.0.6478.114)
  • M
Type Confusion

[,126.0.6478.114)
  • C
Out-of-bounds Write

[,126.0.6478.114)
  • H
Out-of-bounds Read

[,126.0.6478.114)
  • C
Improper Control of Generation of Code ('Code Injection')

[,126.0.6478.54)
  • H
Use After Free

[,126.0.6478.54)
  • C
Improper Control of Generation of Code ('Code Injection')

[,126.0.6478.54)
  • H
Out-of-bounds Write

[,126.0.6478.54)
  • C
Type Confusion

[,126.0.6478.54)
  • H
Use After Free

[,126.0.6478.54)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,126.0.6478.54)
  • H
Out-of-bounds Write

[,126.0.6478.54)
  • H
Use After Free

[,126.0.6478.54)
  • H
Heap-based Buffer Overflow

[,126.0.6478.54)
  • M
Out-of-bounds Read

[,126.0.6478.54)
  • M
Heap-based Buffer Overflow

[,126.0.6478.54)
  • H
Use After Free

[,126.0.6478.54)
  • H
Out-of-bounds Write

[,126.0.6478.54)
  • H
Use After Free

[,126.0.6478.54)
  • M
Improper Privilege Management

[,126.0.6478.54)
  • M
Use After Free

[,126.0.6478.57)
  • M
Use After Free

[,126.0.6478.57)
  • H
Improper Input Validation

[,95.0.4638.69)
  • H
Out-of-Bounds Write

[,125.0.6422.141)
  • H
Use After Free

[,125.0.6422.141)
  • H
Use After Free

[,125.0.6422.141)
  • H
Use After Free

[,125.0.6422.141)
  • H
Heap-based Buffer Overflow

[,125.0.6422.141)
  • H
Use After Free

[,125.0.6422.141)
  • H
Out-of-Bounds Write

[,125.0.6422.141)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,125.0.6422.112)
  • H
Use After Free

[,125.0.6422.76)
  • H
Heap-based Buffer Overflow

[,125.0.6422.76)
  • H
Type Confusion

[,125.0.6422.76)
  • H
Heap-based Buffer Overflow

[,125.0.6422.76)
  • C
Type Confusion

[,125.0.6422.60)
  • H
Use After Free

[,125.0.6422.60)
  • L
User Interface (UI) Misrepresentation of Critical Information

[,125.0.6422.60)
  • H
Use After Free

[,125.0.6422.60)
  • H
Out-of-Bounds Write

[,124.0.6367.207)
  • H
Use After Free

[,124.0.6367.201)
  • H
Heap-based Buffer Overflow

[,124.0.6367.155)
  • H
Use After Free

[,124.0.6367.155)
  • H
Use After Free

[,124.0.6367.118)
  • H
Use After Free

[,124.0.6367.118)
  • H
Out-of-bounds Read

[,124.0.6367.78)
  • H
Use After Free

[,124.0.6367.78)
  • H
Type Confusion

[,124.0.6367.78)
  • H
Out-of-Bounds

[,123.0.6312.105)
  • H
Use After Free

[,124.0.6367.60)
  • H
Out-of-Bounds

[,124.0.6367.60)
  • H
Out-of-bounds Write

[,124.0.6367.60)
  • M
Improper Access Control

[,124.0.6367.60)
  • L
User Interface (UI) Misrepresentation of Critical Information

[,124.0.6367.60)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,124.0.6367.60)
  • M
Out-of-bounds Read

[,124.0.6367.60)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,124.0.6367.60)
  • M
Improper Access Control

[,124.0.6367.60)
  • M
Improper Input Validation

[,124.0.6367.60)
  • H
Use After Free

[,124.0.6367.60)
  • H
Use After Free

[,124.0.6367.60)
  • M
Improper Input Validation

[,124.0.6367.60)
  • L
Improper Access Control

[,124.0.6367.60)
  • H
Out-of-bounds Write

[,123.0.6312.122)
  • H
Use After Free

[,123.0.6312.122)
  • H
Heap-based Buffer Overflow

[,123.0.6312.122)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,123.0.6312.105)
  • H
Use After Free

[,123.0.6312.105)
  • C
Use After Free

[,123.0.6312.86)
  • C
Type Confusion

[,123.0.6312.86)
  • H
Use After Free

[,123.0.6312.86)
  • H
Use After Free

[,123.0.6312.86)
  • M
Use After Free

[,123.0.6312.58)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,123.0.6312.58)
  • M
Out-of-bounds Read

[,123.0.6312.58)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,123.0.6312.58)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,123.0.6312.58)
  • M
Origin Validation Error

[,123.0.6312.58)
  • H
NULL Pointer Dereference

[,123.0.6312.58)
  • H
Use After Free

[,122.0.6261.128)
  • H
Heap-based Buffer Overflow

[,122.0.6261.111)
  • H
Use After Free

[,122.0.6261.111)
  • H
Denial of Service (DoS)

[,122.0.6261.111)
  • C
Type Confusion

[,122.0.6261.94)
  • H
Type Confusion

[,122.0.6261.94)
  • M
Cross-site Scripting (XSS)

[,122.0.6261.57)
  • M
Cross-site Scripting (XSS)

[,122.0.6261.57)
  • H
Use After Free

[,122.0.6261.57)
  • M
Access Control Bypass

[,122.0.6261.57)
  • H
Out-of-Bounds Write

[,122.0.6261.57)
  • M
Access Control Bypass

[,122.0.6261.57)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,122.0.6261.57)
  • H
Use After Free

[,122.0.6261.57)
  • H
Heap-based Buffer Overflow

[,121.0.6167.160)
  • C
Use After Free

[,121.0.6167.160)
  • H
Use After Free

[,121.0.6167.139)
  • H
Use After Free

[,121.0.6167.139)
  • H
Use After Free

[,121.0.6167.139)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,121.0.6167.85)
  • H
Insufficient Policy Enforcement

[,121.0.6167.85)
  • H
Integer Underflow

[,121.0.6167.85)
  • M
Information Exposure

[,121.0.6167.85)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,121.0.6167.85)
  • H
Out-of-Bounds

[,121.0.6167.85)
  • M
Improper Privilege Management

[,121.0.6167.85)
  • M
Use After Free

[,121.0.6167.85)
  • M
Access Control Bypass

[,121.0.6167.85)
  • H
Use After Free

[,121.0.6167.85)
  • M
Use After Free

[,121.0.6167.85)
  • H
Out-of-bounds Read

[,120.0.6099.224)
  • H
Type Confusion

[,120.0.6099.224)
  • H
Out-of-bounds Write

[,120.0.6099.224)
  • H
Improper Input Validation

[,120.0.6099.216)
  • H
Heap-based Buffer Overflow

[,120.0.6099.199)
  • H
Use After Free

[,120.0.6099.199)
  • H
Use After Free

[,120.0.6099.199)
  • H
Use After Free

[,120.0.6099.199)
  • H
Heap-based Buffer Overflow

[,120.0.6099.129)
  • H
Type Confusion

[,120.0.6099.109)
  • H
Use After Free

[,120.0.6099.109)
  • M
Use After Free

[,120.0.6099.109)
  • H
Use After Free

[,120.0.6099.109)
  • H
Use After Free

[,120.0.6099.109)
  • H
Use After Free

[,120.0.6099.62)
  • M
Use After Free

[,120.0.6099.62)
  • M
Improper Authorization

[,120.0.6099.62)
  • L
User Interface (UI) Misrepresentation of Critical Information

[,120.0.6099.62)
  • H
Use After Free

[,120.0.6099.62)
  • M
Access Restriction Bypass

[,120.0.6099.62)
  • H
Use After Free

[,119.0.6045.199)
  • H
Use After Free

[,119.0.6045.199)
  • H
Type Confusion

[,119.0.6045.199)
  • H
Integer Overflow or Wraparound

[,119.0.6045.199)
  • H
Use After Free

[,119.0.6045.199)
  • H
Out-of-Bounds

[,119.0.6045.199)
  • H
Use After Free

[,119.0.6045.159)
  • H
Use After Free

[,119.0.6045.159)
  • H
Use After Free

[,119.0.6045.123)
  • H
Cross-site Scripting (XSS)

[,119.0.6045.106)
  • M
Use After Free

[,119.0.6045.106)
  • M
Access Restriction Bypass

[,119.0.6045.106)
  • H
Improper Input Validation

[,119.0.6045.106)
  • H
Integer Overflow or Wraparound

[,119.0.6045.106)
  • M
Authentication Bypass by Spoofing

[,119.0.6045.105)
  • M
Improper Input Validation

[,119.0.6045.105)
  • M
Improper Input Validation

[,119.0.6045.105)
  • M
Use After Free

[,119.0.6045.105)
  • M
Use After Free

[,119.0.6045.105)
  • M
Use After Free

[,119.0.6045.105)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,119.0.6045.105)
  • L
Authentication Bypass by Spoofing

[,119.0.6045.105)
  • H
Use After Free

[,118.0.5993.117)
  • M
Improper Access Control

[,118.0.5993.70)
  • L
Information Exposure

[,118.0.5993.70)
  • L
Inappropriate implementation

[,118.0.5993.70)
  • M
Improper Access Control

[,118.0.5993.70)
  • M
Improper Input Validation

[,118.0.5993.70)
  • M
Improper Access Control

[,118.0.5993.70)
  • M
Heap-based Buffer Overflow

[,118.0.5993.70)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,118.0.5993.70)
  • L
Use After Free

[,118.0.5993.70)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,118.0.5993.70)
  • M
Improper Access Control

[,118.0.5993.70)
  • C
Use After Free

[,118.0.5993.70)
  • M
Use After Free

[,118.0.5993.70)
  • M
Improper Access Control

[,118.0.5993.70)
  • H
Type Confusion

[,117.0.5938.149)
  • H
Use After Free

[,117.0.5938.132)
  • H
Use After Free

[,117.0.5938.132)
  • H
Heap-based Buffer Overflow

[,117.0.5938.132)
  • M
Authentication Bypass

[,117.0.5938.62)
  • M
Access Control Bypass

[,117.0.5938.62)
  • M
Improper Input Validation

[,117.0.5938.62)
  • M
Access Control Bypass

[,117.0.5938.62)
  • M
Inappropriate Implementation in Custom Tabs

[,117.0.5938.62)
  • M
Improper Input Validation

[,117.0.5938.62)
  • M
Improper Input Validation

[,117.0.5938.62)
  • M
Improper Input Validation

[,117.0.5938.62)
  • M
Authentication Bypass

[,117.0.5938.62)
  • M
Improper Input Validation

[,117.0.5938.62)
  • C
Heap-based Buffer Overflow

[,116.0.5845.187)
  • M
Improper Access Control

[,116.0.5845.179)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,116.0.5845.179)
  • H
Use After Free

[,116.0.5845.179)
  • H
Out-of-Bounds

[,116.0.5845.179)
  • H
Use After Free

[,116.0.5845.140)
  • H
Out-of-bounds Read

[,116.0.5845.110)
  • H
Use After Free

[,116.0.5845.110)
  • H
Use After Free

[,116.0.5845.110)
  • H
Out-of-Bounds

[,116.0.5845.110)
  • H
Out-of-bounds Read

[,116.0.5845.110)
  • H
Improper Data Handling

[,107.0.5304.62)
  • H
Access Restriction Bypass

[,116.0.5845.96)
  • M
Access Restriction Bypass

[,116.0.5845.96)
  • M
Access Restriction Bypass

[,116.0.5845.96)
  • M
Access Control Bypass

[,116.0.5845.96)
  • M
Access Restriction Bypass

[,116.0.5845.96)
  • M
Access Restriction Bypass

[,116.0.5845.96)
  • M
Use After Free

[,116.0.5845.96)
  • M
Heap-based Buffer Overflow

[,116.0.5845.96)
  • M
Access Restriction Bypass

[,116.0.5845.96)
  • H
Heap-based Buffer Overflow

[,116.0.5845.96)
  • M
Access Restriction Bypass

[,116.0.5845.96)
  • M
Improper Access Control

[,116.0.5845.96)
  • H
Out-of-Bounds

[,116.0.5845.96)
  • H
Heap-based Buffer Overflow

[,116.0.5845.96)
  • M
Use After Free

[,116.0.5845.96)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,116.0.5845.96)
  • M
Improper Access Control

[,116.0.5845.96)
  • M
Use After Free

[,116.0.5845.96)
  • H
Use After Free

[,116.0.5845.96)
  • H
Use After Free

[,116.0.5845.96)
  • H
Use After Free

[,116.0.5845.96)
  • H
Improper Access Control

[,116.0.5845.96)
  • M
Arbitrary File Read

[,108.0.5359.72)
  • M
Improper Access Control

[,115.0.5790.170)
  • H
Use After Free

[,115.0.5790.170)
  • H
Use After Free

[,115.0.5790.170)
  • M
Improper Input Validation

[,115.0.5790.170)
  • H
Out-of-bounds Read

[,115.0.5790.170)
  • H
Heap-based Buffer Overflow

[,115.0.5790.170)
  • H
Use After Free

[,115.0.5790.170)
  • H
Out-of-Bounds

[,115.0.5790.170)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,115.0.5790.170)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,115.0.5790.170)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,115.0.5790.170)
  • L
Improper Access Control

[,103.0.5060.53)
  • H
Heap-based Buffer Overflow

[,101.0.4951.41)
  • H
Use After Free

[,101.0.4951.41)
  • M
Improper Access Control

[,115.0.5790.98)
  • M
Improper Access Control

[,115.0.5790.98)
  • M
Improper Access Control

[,115.0.5790.98)
  • M
Improper Input Validation

[,115.0.5790.98)
  • M
Information Exposure

[,115.0.5790.98)
  • M
Arbitrary Code Execution

[,115.0.5790.98)
  • M
Improper Access Control

[,115.0.5790.98)
  • M
Improper Access Control

[,115.0.5790.98)
  • H
Use After Free

[,115.0.5790.98)
  • H
Use After Free

[,115.0.5790.98)
  • H
Use After Free

[,115.0.5790.98)
  • H
Out-of-bounds Write

[,115.0.5790.99)
  • H
Use After Free

[,115.0.5790.99)
  • H
Use After Free

[,115.0.5790.99)
  • H
Use After Free

[,97.0.4692.71)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,99.0.4844.51)
  • H
Use After Free

[,99.0.4844.51)
  • L
Missing Encryption of Sensitive Data

[,99.0.4844.51)
  • M
Improper Input Validation

[,107.0.5304.62)
  • M
HTTP Header Injection

[,97.0.4692.71)
  • H
Out-of-bounds Write

[,114.0.5735.90)
  • M
Use After Free

[,102.0.5005.61)
  • M
Sensitive Cookie with Improper SameSite Attribute

[,109.0.5414.119)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,112.0.5615.49)
  • H
Arbitrary Code Execution

[,112.0.5615.49)
  • M
Cross-site Request Forgery (CSRF)

[,111.0.5563.64)
  • M
Permissive Cross-domain Policy with Untrusted Domains

[,107.0.5304.62)
  • M
Arbitrary Code Execution

[,108.0.5359.71)
  • H
Use After Free

[,103.0.5060.53)
  • M
Denial of Service (DoS)

[,105.0.5195.52)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,103.0.5060.134)
  • M
Heap-based Buffer Overflow

[,104.0.5112.79)
  • M
Access Restriction Bypass

[,105.0.5195.52)
  • M
Access Restriction Bypass

[,107.0.5304.62)
  • L
Access Restriction Bypass

[,106.0.5249.62)
  • H
Access Restriction Bypass

[,108.0.5359.72)
  • M
Arbitrary File Read

[,90.0.4430.72)
  • M
Access Restriction Bypass

[,91.0.4472.77)
  • H
Use After Free

[,92.0.4515.107)
  • H
Use After Free

[,93.0.4577.82)
  • H
Use After Free

[,91.0.4472.77)
  • H
Use After Free

[,96.0.4664.93)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,96.0.4664.45)
  • M
Arbitrary File Read

[,90.0.4430.93)
  • H
Denial of Service (DoS)

[,94.0.4606.54)
  • M
Denial of Service (DoS)

[,114.0.5735.90)
  • H
Use After Free

[,114.0.5735.198)
  • H
Use After Free

[,114.0.5735.198)
  • H
Denial of Service (DoS)

[,114.0.5735.198)
  • H
Use After Free

[,114.0.5735.133)
  • H
Use After Free

[,114.0.5735.133)
  • H
Use After Free

[,114.0.5735.133)
  • H
Heap-based Buffer Overflow

[,114.0.5735.133)
  • M
Denial of Service (DoS)

[,114.0.5735.110)
  • H
Use After Free

[,114.0.5735.90)
  • M
Improper Input Validation

[,114.0.5735.90)
  • H
Use After Free

[,114.0.5735.90)
  • C
Use After Free

[,114.0.5735.90)
  • M
Improper Input Validation

[,114.0.5735.90)
  • M
Improper Input Validation

[,114.0.5735.90)
  • M
Improper Access Control

[,114.0.5735.90)
  • M
Access Restriction Bypass

[,114.0.5735.90)
  • H
Out-of-Bounds

[,14.0.5735.90)
  • H
Use After Free

[,14.0.5735.90)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,114.0.5735.90)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,114.0.5735.90)
  • H
Out-of-Bounds

[,114.0.5735.90)
  • M
Access Control Bypass

[,113.0.5672.126)
  • C
Use After Free

[,113.0.5672.126)
  • H
Use After Free

[,113.0.5672.126)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,113.0.5672.126)
  • H
Use After Free

[,113.0.5672.126)
  • H
Use After Free

[,113.0.5672.126)
  • H
Use After Free

[,113.0.5672.114)
  • H
Out-of-bounds Write

[,113.0.5672.114)
  • M
Improper Access Control

[,113.0.5672.63)
  • M
Improper Access Control

[,113.0.5672.63)
  • M
Improper Input Validation

[,113.0.5672.63)
  • M
Information Exposure

[,113.0.5672.63)
  • M
Improper Access Control

[,113.0.5672.63)
  • M
Authentication Bypass

[,113.0.5672.63)
  • M
Use After Free

[,113.0.5672.63)
  • M
Access Restriction Bypass

[,113.0.5672.63)
  • M
Improper Input Validation

[,113.0.5672.63)
  • M
Access Restriction Bypass

[,113.0.5672.63)
  • M
Heap-based Buffer Overflow

[,112.0.5615.137)
  • H
Out-of-Bounds

[,112.0.5615.137)
  • H
Heap-based Buffer Overflow

[,112.0.5615.137)
  • H
Integer Overflow or Wraparound

[,112.0.5615.137)
  • H
Denial of Service (DoS)

[,112.0.5615.137)
  • M
Information Exposure

[,97.0.4692.71)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,112.0.5615.121)
  • M
Improper Access Control

[,112.0.5615.49)
  • H
Use After Free

[,112.0.5615.49)
  • M
Authentication Bypass

[,112.0.5615.49)
  • M
Improper Input Validation

[,112.0.5615.49)
  • M
DNS Rebinding

[,112.0.5615.49)
  • M
Heap-based Buffer Overflow

[,112.0.5615.49)
  • H
Out-of-Bounds

[,112.0.5615.49)
  • M
Denial of Service (DoS)

[,112.0.5615.49)
  • H
Use After Free

[,112.0.5615.49)
  • M
Access Restriction Bypass

[,112.0.5615.49)
  • M
Out-of-bounds Read

[,112.0.5615.49)
  • M
Access Restriction Bypass

[,112.0.5615.49)
  • M
Access Restriction Bypass

[,112.0.5615.49)
  • H
Heap-based Buffer Overflow

[,112.0.5615.49)
  • H
Use After Free

[,111.0.5563.110)
  • H
Out-of-bounds Read

[,111.0.5563.110)
  • H
Use After Free

[,111.0.5563.110)
  • H
Use After Free

[,111.0.5563.110)
  • H
Use After Free

[,111.0.5563.110)
  • H
Out-of-Bounds

[,111.0.5563.110)
  • H
Use After Free

[,111.0.5563.110)
  • M
Access Restriction Bypass

[,111.0.5563.64)
  • M
Access Restriction Bypass

[,111.0.5563.64)
  • M
Authentication Bypass

[,111.0.5563.64)
  • M
Access Restriction Bypass

[,111.0.5563.64)
  • H
Heap-based Buffer Overflow

[,111.0.5563.64)
  • M
Access Restriction Bypass

[,111.0.5563.64)
  • M
Access Restriction Bypass

[,111.0.5563.64)
  • H
Denial of Service (DoS)

[,111.0.5563.64)
  • M
Access Restriction Bypass

[,111.0.5563.64)
  • M
Access Restriction Bypass

[,111.0.5563.64)
  • L
Heap-based Buffer Overflow

[,111.0.5563.64)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,111.0.5563.64)
  • H
Heap-based Buffer Overflow

[,111.0.5563.64)
  • M
Authentication Bypass

[,111.0.5563.64)
  • M
Authentication Bypass

[,111.0.5563.64)
  • H
Heap-based Buffer Overflow

[,111.0.5563.64)
  • H
Use After Free

[,111.0.5563.64)
  • M
Information Exposure

[,111.0.5563.64)
  • M
Information Exposure

[,111.0.5563.64)
  • H
Stack-based Buffer Overflow

[,111.0.5563.64)
  • M
Authentication Bypass

[,111.0.5563.64)
  • H
Use After Free

[,111.0.5563.64)
  • H
Use After Free

[,111.0.5563.64)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,111.0.5563.64)
  • H
Use After Free

[,110.0.5481.177)
  • M
Buffer Overflow

[,110.0.5481.177)
  • H
Use After Free

[,110.0.5481.177)
  • H
Use After Free

[,110.0.5481.177)
  • H
Heap-based Buffer Overflow

[,110.0.5481.177)
  • H
Use After Free

[,110.0.5481.177)
  • H
Use After Free

[,110.0.5481.177)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,110.0.5481.77)
  • M
Integer Overflow to Buffer Overflow

[,110.0.5481.77)
  • M
Improper Access Control

[,110.0.5481.77)
  • M
Use After Free

[,110.0.5481.77)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,110.0.5481.77)
  • M
Heap-based Buffer Overflow

[,110.0.5481.77)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,110.0.5481.77)
  • H
Out-of-bounds Read

[,110.0.5481.77)
  • M
Access Restriction Bypass

[,110.0.5481.77)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,109.0.5414.119)
  • H
Use After Free

[,109.0.5414.119)
  • M
Use After Free

[,109.0.5414.119)
  • H
Use After Free

[,109.0.5414.119)
  • M
Access Restriction Bypass

[,109.0.5414.74)
  • L
Heap-based Buffer Overflow

[,109.0.5414.74)
  • L
Information Exposure

[,109.0.5414.74)
  • H
Use After Free

[,109.0.5414.74)
  • M
Heap-based Buffer Overflow

[,109.0.5414.74)
  • M
Use After Free

[,109.0.5414.74)
  • M
Access Restriction Bypass

[,109.0.5414.74)
  • M
Improperly Implemented Security Check for Standard

[,109.0.5414.74)
  • M
Access Restriction Bypass

[,109.0.5414.74)
  • M
Access Restriction Bypass

[,109.0.5414.74)
  • H
Heap-based Buffer Overflow

[,109.0.5414.74)
  • H
Use After Free

[,109.0.5414.74)
  • M
Access Restriction Bypass

[,109.0.5414.74)
  • M
Improperly Implemented Security Check for Standard

[,109.0.5414.74)
  • H
Use After Free

[,72.0.3626.81)
  • M
Denial of Service (DoS)

[,89.0.4389.72)
  • M
Access Restriction Bypass

[,91.0.4472.77)
  • M
Denial of Service (DoS)

[,104.0.5112.79)
  • M
Integer Overflow or Wraparound

[,104.0.5112.79)
  • M
Denial of Service (DoS)

[,105.0.5195.125)
  • M
Denial of Service (DoS)

[,100.0.4896.75)
  • M
Information Exposure

[,98.0.4758.80)
  • M
Information Exposure

[,97.0.4692.71)
  • M
Use After Free

[,108.0.5359.124)
  • H
Use After Free

[,108.0.5359.124)
  • H
Use After Free

[,108.0.5359.124)
  • H
Use After Free

[,108.0.5359.124)
  • H
Use After Free

[,108.0.5359.124)
  • H
Denial of Service (DoS)

[,108.0.5359.9)
  • H
Out-of-bounds Write

[,108.0.5359.71)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,108.0.5359.71)
  • H
Use After Free

[,108.0.5359.71)
  • H
Use After Free

[,108.0.5359.71)
  • H
Use After Free

[,108.0.5359.71)
  • H
Use After Free

[,108.0.5359.71)
  • M
Access Restriction Bypass

[,108.0.5359.71)
  • H
Use After Free

[,108.0.5359.71)
  • H
Use After Free

[,108.0.5359.71)
  • M
Access Restriction Bypass

[,108.0.5359.71)
  • M
Access Restriction Bypass

[,108.0.5359.71)
  • M
Access Restriction Bypass

[,108.0.5359.71)
  • M
Access Restriction Bypass

[,108.0.5359.71)
  • M
Access Restriction Bypass

[,108.0.5359.71)
  • H
Use After Free

[,108.0.5359.71)
  • M
Use After Free

[,108.0.5359.71)
  • M
Use After Free

[,108.0.5359.71)
  • M
Access Restriction Bypass

[,108.0.5359.71)
  • M
Access Restriction Bypass

[,108.0.5359.71)
  • M
Access Restriction Bypass

[,108.0.5359.71)
  • M
Access Restriction Bypass

[,108.0.5359.71)
  • M
Access Control Bypass

[,108.0.5359.71)
  • M
Use After Free

[,108.0.5359.71)
  • H
Heap-based Buffer Overflow

[,107.0.5304.121)
  • H
Heap-based Buffer Overflow

[,106.0.5249.119)
  • H
Use After Free

[,106.0.5249.119)
  • H
Use After Free

[,106.0.5249.119)
  • H
Denial of Service (DoS)

[,106.0.5249.119)
  • H
Use After Free

[,107.0.5304.110)
  • H
Heap-based Buffer Overflow

[,107.0.5304.106)
  • H
Use After Free

[,107.0.5304.110)
  • H
Denial of Service (DoS)

[,107.0.5304.110)
  • H
Use After Free

[,107.0.5304.110)
  • H
Use After Free

[,107.0.5304.110)
  • M
Authentication Bypass

[,106.0.5249.62)
  • M
Use After Free

[,106.0.5249.61)
  • M
Use After Free

[,106.0.5249.61)
  • L
Access Restriction Bypass

[,106.0.5249.61)
  • M
Access Restriction Bypass

[,106.0.5249.61)
  • L
Use After Free

[,106.0.5249.61)
  • L
Access Restriction Bypass

[,106.0.5249.61)
  • M
Access Restriction Bypass

[,106.0.5249.61)
  • M
Access Restriction Bypass

[,106.0.5249.62)
  • M
Improper Input Validation

[,106.0.5249.62)
  • M
Use After Free

[,106.0.5249.62)
  • H
Use After Free

[,106.0.5249.62)
  • H
Use After Free

[,106.0.5249.62)
  • M
Improper Data Handling

[,107.0.5304.62)
  • M
Denial of Service (DoS)

[,107.0.5304.62)
  • L
Information Exposure

[,107.0.5304.62)
  • M
Access Control Bypass

[,107.0.5304.62)
  • M
Use After Free

[,107.0.5304.62)
  • H
Use After Free

[,107.0.5304.62)
  • H
Use After Free

[,107.0.5304.62)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,107.0.5304.62)
  • M
Heap-based Buffer Overflow

[,107.0.5304.62)
  • M
Improper Input Validation

[,106.0.5249.61)
  • H
Use After Free

[,107.0.5304.62)
  • H
Heap-based Buffer Overflow

[,107.0.5304.62)
  • H
Heap-based Buffer Overflow

[,107.0.5304.62)
  • M
Improper Input Validation

[,107.0.5304.62)
  • H
Type Confusion

[,107.0.5304.87)
  • H
Use After Free

[,106.0.5249.119)
  • H
Use After Free

[,106.0.5249.119)
  • H
Use After Free

[,106.0.5249.61)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,106.0.5249.61)
  • H
Out-of-bounds Write

[,106.0.5249.91)
  • H
Use After Free

[,106.0.5249.61)
  • H
Use After Free

[,106.0.5249.91)
  • M
Race Condition

[0,73.0.3683.75)
  • H
Improper Input Validation

[,105.0.5195.125)
  • H
Heap-based Buffer Overflow

[,105.0.5195.125)
  • H
Use After Free

[,105.0.5195.52)
  • H
Out-of-bounds Write

[,105.0.5195.125)
  • H
Use After Free

[,105.0.5195.125)
  • L
Use After Free

[,105.0.5195.52)
  • M
Access Restriction Bypass

[,105.0.5195.52)
  • M
Use After Free

[,105.0.5195.52)
  • L
Access Restriction Bypass

[,105.0.5195.52)
  • L
Access Restriction Bypass

[,105.0.5195.52)
  • M
Heap-based Buffer Overflow

[,105.0.5195.52)
  • M
Access Restriction Bypass

[,105.0.5195.52)
  • M
Heap-based Buffer Overflow

[,105.0.5195.52)
  • M
Heap-based Buffer Overflow

[,105.0.5195.52)
  • M
Use After Free

[,105.0.5195.52)
  • M
Access Restriction Bypass

[,105.0.5195.52)
  • H
Access Restriction Bypass

[,105.0.5195.52)
  • M
Access Restriction Bypass

[,105.0.5195.52)
  • H
Use After Free

[,105.0.5195.52)
  • H
Use After Free

[,105.0.5195.52)
  • H
Heap-based Buffer Overflow

[,105.0.5195.52)
  • H
Use After Free

[,105.0.5195.52)
  • H
Use After Free

[,104.0.5112.101)
  • H
Use After Free

[,104.0.5112.101)
  • H
Improper Input Validation

[,104.0.5112.101)
  • M
Use After Free

[,104.0.5112.101)
  • M
Arbitrary Code Injection

[,104.0.5112.101)
  • H
Buffer Overflow

[0,104.0.5112.101)
  • H
Use After Free

[,104.0.5112.101)
  • H
Use After Free

[,105.0.5195.125)
  • H
Use After Free

[,105.0.5195.125)
  • H
Use After Free

[,105.0.5195.125)
  • H
Improper Input Validation

[,105.0.5195.102)
  • H
Use After Free

[,100.0.4896.88)
  • H
Use After Free

[,100.0.4896.60)
  • H
Use After Free

[,104.0.5112.79)
  • H
Use After Free

[,105.0.5195.52)
  • H
Use After Free

[,105.0.5195.52)
  • H
Use After Free

[,105.0.5195.52)
  • H
Use After Free

[,105.0.5195.52)
  • H
Denial of Service (DoS)

[,105.0.5195.52)
  • H
Use After Free

[,104.0.5112.101)
  • H
Use After Free

[0,104.0.5112.101)
  • M
Improper Authentication

[0,104.0.5112.101)
  • H
Use After Free

[0,104.0.5112.101)
  • H
Improper Input Validation

[,104.0.5112.101)
  • H
Use After Free

[,96.0.4664.93)
  • M
Cross-site Scripting (XSS)

[,99.0.4844.51)
  • L
Information Exposure

[,96.0.4664.93)
  • H
Use After Free

[,96.0.4664.93)
  • H
Use After Free

[,96.0.4664.93)
  • H
Out-of-Bounds

[,96.0.4664.93)
  • H
Use After Free

[,96.0.4664.93)
  • M
Heap-based Buffer Overflow

[,96.0.4664.93)
  • H
Use After Free

[,96.0.4664.93)
  • M
Heap-based Buffer Overflow

[,96.0.4664.93)
  • H
Use After Free

[,96.0.4664.93)
  • M
Authentication Bypass

[,96.0.4664.93)
  • H
Use After Free

[,99.0.4844.51)
  • H
Heap-based Buffer Overflow

[,99.0.4844.51)
  • H
Use After Free

[,99.0.4844.51)
  • H
Use After Free

[,99.0.4844.51)
  • H
Use After Free

[,99.0.4844.51)
  • H
Heap-based Buffer Overflow

[,99.0.4844.51)
  • M
Access Restriction Bypass

[,99.0.4844.51)
  • H
Creation of Temporary File in Directory with Insecure Permissions

[,99.0.4844.51)
  • C
Out-of-bounds Write

[,99.0.4844.51)
  • M
User Interface Misrepresentation of Critical Information

[,99.0.4844.51)
  • M
User Interface Misrepresentation of Critical Information

[,99.0.4844.51)
  • H
Type Confusion

[,99.0.4844.51)
  • H
Use After Free

[,99.0.4844.51)
  • H
Out-of-Bounds

[,99.0.4844.51)
  • M
Access Control Bypass

[,99.0.4844.51)
  • H
Use After Free

[,99.0.4844.51)
  • H
Use After Free

[,99.0.4844.51)
  • C
Use After Free

[,99.0.4844.51)
  • H
Type Confusion

[,96.0.4664.93)
  • H
Use After Free

[,104.0.5112.79)
  • M
User Interface Misrepresentation of Critical Information

[,104.0.5112.79)
  • H
Use After Free

[,104.0.5112.79)
  • H
Use After Free

[,104.0.5112.79)
  • H
Use After Free

[,104.0.5112.79)
  • H
Use After Free

[,104.0.5112.79)
  • M
User Interface Misrepresentation of Critical Information

[,104.0.5112.79)
  • H
Use After Free

[,104.0.5112.79)
  • M
Access Restriction Bypass

[,104.0.5112.79)
  • H
Use After Free

[,104.0.5112.79)
  • H
Use After Free

[,104.0.5112.79)
  • H
Use After Free

[,104.0.5112.79)
  • M
Improper Input Validation

[,104.0.5112.79)
  • L
Information Exposure

[,104.0.5112.79)
  • H
Use After Free

[,104.0.5112.79)
  • H
Out-of-bounds Read

[,104.0.5112.79)
  • H
Use After Free

[,104.0.5112.79)
  • M
Access Control Bypass

[,104.0.5112.79)
  • M
Buffer Overflow

[,104.0.5112.79)
  • M
Improper Input Validation

[,104.0.5112.79)
  • M
Information Exposure

[,104.0.5112.79)
  • H
Use After Free

[,100.0.4896.88)
  • H
Denial of Service (DoS)

[,101.0.4951.41)
  • H
Use After Free

[,102.0.5005.115)
  • H
Double Free

[,102.0.5005.115)
  • H
Heap-based Buffer Overflow

[,103.0.5060.53)
  • L
Access Restriction Bypass

[,103.0.5060.53)
  • M
Improper Input Validation

[,103.0.5060.53)
  • H
Denial of Service (DoS)

[,103.0.5060.134)
  • M
Information Exposure

[,103.0.5060.134)
  • H
Denial of Service (DoS)

[,103.0.5060.53)
  • H
Denial of Service (DoS)

[,103.0.5060.53)
  • H
Denial of Service (DoS)

[,103.0.5060.53)
  • H
Denial of Service (DoS)

[,103.0.5060.134)
  • M
Denial of Service (DoS)

[,103.0.5060.53)
  • H
Denial of Service (DoS)

[,103.0.5060.134)
  • M
Information Exposure

[,103.0.5060.53)
  • M
Denial of Service (DoS)

[,103.0.5060.134)
  • M
Use After Free

[,103.0.5060.134)
  • M
Information Exposure

[,102.0.5005.61)
  • M
Information Exposure

[,101.0.4951.41)
  • M
Information Exposure

[,101.0.4951.41)
  • M
Access Control Bypass

[,101.0.4951.41)
  • L
Access Restriction Bypass

[,101.0.4951.41)
  • M
Use After Free

[,101.0.4951.41)
  • M
Improper Input Validation

[,101.0.4951.41)
  • M
Information Exposure

[,101.0.4951.41)
  • M
Use After Free

[,101.0.4951.41)
  • H
Improper Input Validation

[,101.0.4951.41)
  • M
Use After Free

[,101.0.4951.41)
  • M
Type confusion

[,101.0.4951.41)
  • M
Out-of-Bounds

[,101.0.4951.41)
  • M
Use After Free

[,101.0.4951.41)
  • M
Use After Free

[,101.0.4951.41)
  • H
Heap-based Buffer Overflow

[,101.0.4951.41)
  • H
Use After Free

[,101.0.4951.41)
  • M
Use After Free

[,101.0.4951.64)
  • H
Use After Free

[,101.0.4951.64)
  • H
Use After Free

[,101.0.4951.64)
  • H
Use After Free

[,101.0.4951.64)
  • H
Use After Free

[,101.0.4951.64)
  • H
Use After Free

[,101.0.4951.64)
  • H
Use After Free

[,100.0.4896.88)
  • H
Use After Free

[,100.0.4896.88)
  • H
User Interface Security Issue

[,100.0.4896.88)
  • H
Use After Free

[,100.0.4896.88)
  • H
Improper Input Validation

[,100.0.4896.88)
  • M
User Impersonation

[,100.0.4896.88)
  • H
Type Confusion

[,100.0.4896.75)
  • M
Heap-based Buffer Overflow

[,100.0.4896.60)
  • M
Heap-based Buffer Overflow

[,100.0.4896.60)
  • M
Use After Free

[,100.0.4896.60)
  • H
Use After Free

[,100.0.4896.60)
  • M
Information Exposure

[,100.0.4896.60)
  • M
Information Exposure

[,100.0.4896.60)
  • M
Use After Free

[,100.0.4896.60)
  • M
Heap-based Buffer Overflow

[,100.0.4896.60)
  • M
Use After Free

[,100.0.4896.60)
  • M
Information Exposure

[,100.0.4896.60)
  • H
Use After Free

[,99.0.4844.74)
  • M
Use After Free

[,99.0.4844.74)
  • M
Information Exposure

[,100.0.4896.60)
  • H
Improper Input Validation

[,100.0.4896.60)
  • H
Use After Free

[,100.0.4896.60)
  • M
Information Exposure

[,100.0.4896.60)
  • H
Use After Free

[,100.0.4896.60)
  • M
User Interface Security Issue

[,100.0.4896.60)
  • H
Use After Free

[,100.0.4896.60)
  • H
Use After Free

[,99.0.4844.74)
  • H
Use After Free

[,99.0.4844.740)
  • H
Use After Free

[,103.0.5060.114)
  • H
Type Confusion

[,103.0.5060.114)
  • H
Heap-based Buffer Overflow

[,102.0.5005.148)[103.0.0.0,103.0.5060.114)
  • H
Use After Free

[,101.0.4951.41)
  • M
Protection Mechanism Failure

[,103.0.5060.53)
  • M
Arbitrary File Read

[,102.0.5005.115)
  • H
Use After Free

[,102.0.5005.115)
  • M
Information Exposure

[,102.0.5005.61)
  • M
Improper Input Validation

[,102.0.5005.61)
  • H
Use After Free

[,102.0.5005.61)
  • H
Use After Free

[,102.0.5005.61)
  • H
Use After Free

[,102.0.5005.61)
  • H
Use After Free

[,102.0.5005.61)
  • H
Heap-based Buffer Overflow

[,102.0.5005.61)
  • H
Insufficient Policy Enforcement

[,102.0.5005.61)
  • M
Information Exposure

[,102.0.5005.61)
  • H
Use After Free

[,102.0.5005.61)
  • H
Use After Free

[,102.0.5005.61)
  • H
Use After Free

[,102.0.5005.61)
  • H
Out-of-bounds Read

[,102.0.5005.61)
  • H
Use After Free

[,102.0.5005.61)
  • H
Use After Free

[,102.0.5005.61)
  • M
Use After Free

[,102.0.5005.61)
  • M
Improper Access Control

[,102.0.5005.61)
  • M
Use After Free

[,102.0.5005.61)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,102.0.5005.61)
  • M
Use After Free

[,102.0.5005.61)
  • M
Improper Access Control

[,102.0.5005.61)
  • M
Improper Access Control

[,102.0.5005.61)
  • M
Improper Access Control

[,102.0.5005.61)
  • H
Heap-based Buffer Overflow

[,101.0.4951.64)
  • M
Insecure Defaults

[,101.0.4951.64)
  • H
Use After Free

[,101.0.4951.64)
  • H
Use After Free

[,100.0.4896.88)
  • H
Use After Free

[,101.0.4951.41)
  • H
Use After Free

[,100.0.4896.88)
  • H
Inappropriate implementation

[,101.0.4951.41)
  • H
Improper Input Validation

[,101.0.4951.41)
  • H
Use After Free

[,101.0.4951.41)
  • H
Type Confusion

[,100.0.4896.60)
  • M
Type Confusion

[,100.0.4896.88)
  • M
Improper implementation

[,97.0.4692.71)
  • C
Type Confusion

[,100.0.4896.127)
  • M
Information Exposure

[,99.0.4844.51)
  • H
Heap-based Buffer Overflow

[,99.0.4844.74)
  • H
Use After Free

[,99.0.4844.74)
  • M
Out-of-bounds Read

[,99.0.4844.51)
  • H
Use After Free

[,98.0.4758.102)
  • H
Type Confusion

[,96.0.4664.93)
  • H
Out-of-Bounds

[,61.0.3163.79)
  • H
Out-of-Bounds

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • H
Out-of-bounds Write

[,81.0.4044.92)
  • C
Arbitrary File Upload

[,66.0.3359.106)
  • H
Improper Input Validation

[,59.0.3071.104)(59.0.3071.104,59.0.3071.117)
  • H
Out-of-bounds Write

[,75.0.3770.80)
  • M
Code

[,44.0.2403.89)
  • H
Out-of-bounds Read

[,71.0.3578.80)
  • M
Out-of-bounds Read

[,67.0.3396.62)
  • H
Use After Free

[,80.0.3987.149)
  • C
Privilege Escalation

[,22.0.1229.94)
  • H
Denial of Service (DoS)

[0,40.0.2214.111)
  • H
Out-of-bounds Read

[,67.0.3396.62)
  • M
Resource Management Errors

[,30.0.1599.101)
  • H
Improper Input Validation

[,76.0.3809.87)
  • H
Out-of-Bounds

[,53.0.2785.103)
  • C
Use After Free

[,87.0.4280.66)
  • H
Resource Management Errors

[,34.0.1847.137)
  • H
Out-of-bounds Write

[,84.0.4147.105)
  • C
Use After Free

[,90.0.4430.85)
  • H
Out-of-Bounds

[,88.0.4324.96)
  • H
Improper Access Control

[,54.0.2840.100)
  • M
Out-of-Bounds

[,63.0.3239.84)
  • M
Improper Input Validation

[,64.0.3282.119)
  • M
Cross-site Scripting (XSS)

[,72.0.3626.81)
  • H
Type Confusion

[,83.0.4103.61)
  • H
Out-of-bounds Write

[,90.0.4430.212)
  • H
Out-of-Bounds

[,44.0.2403.89)
  • H
Use After Free

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • H
Use After Free

[,86.0.4240.183)
  • M
Out-of-bounds Write

[,77.0.3865.75)
  • H
Integer Overflow or Wraparound

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • M
Denial of Service (DoS)

[,19.0.1084.52)
  • M
Access Restriction Bypass

[,79.0.3945.79)
  • M
Out-of-bounds Read

[,23.0.1271.97)
  • M
Improper Input Validation

[,66.0.3359.117)
  • M
Improper Input Validation

[,68.0.3440.75)
  • M
Insecure Default

[,83.0.4103.88)
  • M
Denial of Service (DoS)

[,20.0.1132.57)
  • M
Denial of Service (DoS)

[,84.0.4147.89)
  • M
Out-of-bounds Read

[,53.0.2785.144)
  • H
Improper Access Control

[,53.0.2785.103)
  • H
Use After Free

[,89.0.4389.90)
  • H
Improper Input Validation

[,71.0.3578.80)
  • M
Denial of Service (DoS)

[,20.0.1132.57)
  • M
Incorrect Authorization

[,91.0.4472.77)
  • M
Access Restriction Bypass

[,33.0.1750.154)
  • M
Cross-site Scripting (XSS)

[,23.0.1271.97)
  • H
Out-of-Bounds

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • H
Denial of Service (DoS)

[,20.0.1132.57)
  • H
Integer Overflow or Wraparound

[,86.0.4240.75)
  • H
Use After Free

[,94.0.4606.54)
  • H
Type Confusion

[,80.0.3987.116)
  • H
Use After Free

[,53.0.2785.103)
  • M
Out-of-bounds Read

[,75.0.3770.80)
  • H
CVE-2012-5111

[,23.0.1271.97)
  • M
Authentication Bypass

[,79.0.3945.79)
  • H
Use After Free

[,83.0.4103.97)
  • H
Use After Free

[,81.0.4044.92)
  • H
Use After Free

[,90.0.4430.72)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Cryptographic Issues

[,21.0.1180.89)
  • M
Information Exposure

[,60.0.3112.78)
  • M
CVE-2018-6103

[,66.0.3359.117)
  • H
Use After Free

[,86.0.4240.111)
  • H
Integer Overflow or Wraparound

[,80.0.3987.87)
  • H
Improper Input Validation

[,53.0.2785.103)
  • H
Out-of-Bounds

[,44.0.2403.89)
  • H
Improper Input Validation

[,71.0.3578.80)
  • H
Out-of-Bounds

[,23.0.1271.97)
  • H
Type Confusion

[,90.0.4430.212)
  • M
Access Restriction Bypass

[,87.0.4280.66)
  • M
Authentication Bypass

[,30.0.1599.101)
  • H
Use After Free

[,23.0.1271.97)
  • M
Authentication Bypass

[,89.0.4389.72)
  • C
CVE-2014-1681

[,32.0.1700.102)
  • M
Information Exposure

[,80.0.3987.87)
  • H
Use After Free

[,86.0.4240.99)
  • H
Out-of-bounds Write

[,86.0.4240.198)
  • M
Improper Data Handling

[,44.0.2403.89)
  • H
Use After Free

[,88.0.4324.96)
  • H
Resource Management Errors

[,24.0.1312.56)
  • H
Out-of-bounds Write

[,79.0.3945.79)
  • H
Denial of Service (DoS)

[,27.0.1453.116)
  • H
Resource Management Errors

[,30.0.1599.101)
  • H
Integer Overflow or Wraparound

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • M
NULL Pointer Dereference

[,56.0.2924.67)
  • M
Integer Overflow or Wraparound

[,85.0.4183.83)
  • H
Use After Free

[,91.0.4472.101)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,87.0.4280.66)
  • H
Use After Free

[,27.0.1453.116)
  • C
Use After Free

[,87.0.4280.66)
  • H
Use After Free

[,84.0.4147.125)
  • H
Access Restriction Bypass

[,87.0.4280.66)
  • H
Resource Management Errors

[,20.0.1132.57)
  • H
Out-of-bounds Write

[,92.0.4515.107)
  • M
Improper Input Validation

[,77.0.3865.75)
  • H
CVE-2013-2268

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • H
Improper Preservation of Permissions

[,77.0.3865.75)
  • H
Use After Free

[,84.0.4147.125)
  • H
Out-of-bounds Write

[,92.0.4515.131)
  • M
Information Exposure

[,84.0.4147.105)
  • M
Access Restriction Bypass

[,29.0.1547.57)
  • M
Information Exposure

[,77.0.3865.75)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • H
Use After Free

[,77.0.3865.90)
  • M
Access Restriction Bypass

[,19.0.1084.52)
  • H
Out-of-bounds Write

[,71.0.3578.80)
  • M
Out-of-bounds Write

[,75.0.3770.90)
  • C
Out-of-bounds Write

[,87.0.4280.66)
  • H
Out-of-bounds Read

[,89.0.4389.114)
  • H
Out-of-bounds Write

[,71.0.3578.80)
  • M
Cross-site Scripting (XSS)

[,62.0.3202.62)
  • H
Denial of Service (DoS)

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • H
Insecure Default

[,81.0.4044.92)
  • H
Out-of-Bounds

[,27.0.1453.116)
  • M
Security Features

[,53.0.2785.103)
  • M
Insecure Default

[,81.0.4044.92)
  • H
Use After Free

[,89.0.4389.114)
  • H
Improper Input Validation

[,64.0.3282.119)
  • H
Use After Free

[,40.0.2214.109)
  • C
Use After Free

[,81.0.4044.129)
  • M
Resource Management Errors

[,30.0.1599.101)
  • M
Improper Input Validation

[,58.0.3029.81)
  • H
Out-of-bounds Write

[,71.0.3578.98)
  • M
CVE-2018-17471

[,70.0.3538.67)
  • C
Improper Input Validation

[,19.0.1084.52)
  • H
Improper Input Validation

[,24.0.1312.56)
  • M
User Impersonation

[,79.0.3945.79)
  • H
Use After Free

[,60.0.3112.78)
  • M
Improper Input Validation

[,58.0.3029.81)(58.0.3029.81,58.0.3029.83)
  • H
Use After Free

[0,)
  • H
Improper Input Validation

[,48.0.2564.97)
  • M
Improper Access Control

[,56.0.2924.67)
  • M
Incorrect Authorization

[,91.0.4472.77)
  • M
Improper Input Validation

[,80.0.3987.87)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Access Restriction Bypass

[,44.0.2403.89)
  • M
Improper Preservation of Permissions

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • H
Use After Free

[,88.0.4324.96)
  • H
Cross-site Scripting (XSS)

[,79.0.3945.79)
  • H
Use After Free

[,53.0.2785.103)
  • M
Out-of-bounds Read

[,79.0.3945.79)
  • H
Use After Free

[,84.0.4147.125)
  • H
Access Restriction Bypass

[,48.0.2564.97)
  • M
User Impersonation

[,78.0.3904.70)
  • M
Security Features

[,44.0.2403.89)
  • M
Improper Input Validation

[,20.0.1132.57)
  • H
Access Restriction Bypass

[,62.0.3202.62)
  • M
Integer Overflow or Wraparound

[,54.0.2840.100)
  • H
Use After Free

[,69.0.3497.81)
  • M
Security Features

[,44.0.2403.89)
  • M
Information Exposure

[,77.0.3865.75)
  • M
Cross-site Request Forgery (CSRF)

[,29.0.1547.57)
  • H
Race Condition

[,57.0.2987.132)
  • M
Access Restriction Bypass

[,87.0.4280.66)
  • H
Improper Input Validation

[,72.0.3626.81)
  • M
Improper Input Validation

[,80.0.3987.87)
  • H
Access Restriction Bypass

[,49.0.2623.87)
  • H
Resource Management Errors

[,34.0.1847.137)
  • H
Denial of Service (DoS)

[,29.0.1547.57)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • M
Improper Input Validation

[,84.0.4147.89)
  • M
Improper Input Validation

[,85.0.4183.83)
  • M
Improper Input Validation

[,53.0.2785.144)
  • C
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Resource Management Errors

[,30.0.1599.101)
  • H
Type Confusion

[,92.0.4515.159)
  • M
Out-of-bounds Write

[,73.0.3683.86)
  • H
Integer Overflow or Wraparound

[,65.0.3325.146)
  • M
Incorrect Authorization

[,92.0.4515.107)
  • H
Incorrect Type Conversion or Cast

[,53.0.2785.103)
  • H
Use After Free

[,54.0.2840.100)
  • M
Out-of-Bounds

[,53.0.2785.103)
  • M
Denial of Service (DoS)

[,40.0.2214.109)
  • M
Improper Input Validation

[,53.0.2785.103)
  • H
Use After Free

[,81.0.4044.92)
  • M
Cross-site Scripting (XSS)

[,44.0.2403.89)
  • H
Insufficient Verification of Data Authenticity

[,81.0.4044.92)
  • H
Out-of-Bounds

[,61.0.3163.79)(61.0.3163.79,61.0.3163.81)
  • L
Denial of Service (DoS)

[,79.0.3945.79)
  • M
Access Restriction Bypass

[,27.0.1453.116)
  • M
Information Exposure

[,81.0.4044.92)
  • M
Improper Access Control

[,53.0.2785.103)
  • M
Improper Input Validation

[,80.0.3987.87)
  • H
Access Restriction Bypass

[,89.0.4389.72)
  • H
Denial of Service (DoS)

[,34.0.1847.137)
  • C
CVE-2016-9652

[,55.0.2883.75)
  • H
Out-of-Bounds

[,80.0.3987.87)
  • H
Improper Input Validation

[,66.0.3359.170)
  • H
Resource Management Errors

[,33.0.1750.154)
  • H
Out-of-bounds Write

[,73.0.3683.103)
  • M
Information Exposure

[,81.0.4044.92)
  • M
Improper Input Validation

[,34.0.1847.137)
  • M
Out-of-bounds Write

[,81.0.4044.92)
  • H
Use After Free

[,92.0.4515.107)
  • M
Improper Input Validation

[,77.0.3865.75)
  • M
Resource Management Errors

[,24.0.1312.56)
  • H
Out-of-bounds Write

[,54.0.2840.100)
  • H
Use After Free

[,66.0.3359.117)
  • H
CVE-2013-0886

[,27.0.1453.116)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,94.0.4606.54)
  • M
Out-of-Bounds

[,40.0.2214.109)
  • H
Out-of-bounds Write

[,76.0.3809.87)
  • H
Remote Code Execution (RCE)

[,53.0.2785.103)
  • M
Security Features

[,53.0.2785.103)
  • H
Use After Free

[,92.0.4515.107)
  • H
Improper Input Validation

[,72.0.3626.81)
  • C
Use After Free

[,86.0.4240.99)
  • M
Information Exposure

[,33.0.1750.154)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • H
Out-of-Bounds

[,54.0.2840.98)
  • H
Type Confusion

[,91.0.4472.101)
  • M
Improper Input Validation

[,83.0.4103.61)
  • M
Cross-site Scripting (XSS)

[,23.0.1271.97)
  • M
Improper Input Validation

[,75.0.3770.80)
  • M
Cross-site Scripting (XSS)

[,53.0.2785.103)
  • H
Use After Free

[,84.0.4147.125)
  • H
Access Restriction Bypass

[,77.0.3865.75)
  • H
Improper Data Handling

[,53.0.2785.103)
  • H
Cryptographic Issues

[0,)
  • H
Improper Input Validation

[,34.0.1847.137)
  • M
Security Features

[,71.0.3578.80)
  • H
Out-of-Bounds

[,49.0.2623.87)
  • M
Improper Input Validation

[,54.0.2840.100)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Security Features

[,65.0.3325.146)
  • H
Incorrect Type Conversion or Cast

[,64.0.3282.168)
  • M
Information Exposure

[,53.0.2785.103)
  • M
Access Restriction Bypass

[,31.0.1650.63)
  • H
Out-of-bounds Read

[,64.0.3282.119)
  • H
Out-of-bounds Write

[,74.0.3729.108)
  • M
Out-of-Bounds

[,19.0.1084.52)
  • H
Incorrect Authorization

[,79.0.3945.130)
  • H
Directory Traversal

[,29.0.1547.57)
  • M
Denial of Service (DoS)

[0,40.0.2214.111)
  • L
Improper Input Validation

[,61.0.3163.79)(61.0.3163.79,61.0.3163.81)
  • M
Access Restriction Bypass

[,44.0.2403.89)
  • H
Use After Free

[0,)
  • M
Authentication Bypass

[,77.0.3865.75)
  • H
Access Restriction Bypass

[,40.0.2214.109)
  • C
Improper Input Validation

[,19.0.1084.52)
  • H
Use After Free

[,79.0.3945.79)
  • C
Integer Overflow or Wraparound

[,23.0.1271.97)
  • M
Improper Input Validation

[,69.0.3497.81)
  • H
Out-of-bounds Write

[,89.0.4389.114)
  • M
Out-of-Bounds

[,80.0.3987.149)
  • M
Out-of-Bounds

[,53.0.2785.103)
  • H
Use After Free

[,63.0.3239.84)
  • M
Denial of Service (DoS)

[,48.0.2564.97)
  • M
Out-of-bounds Write

[,79.0.3945.79)
  • M
Access Restriction Bypass

[,24.0.1312.56)
  • H
Use After Free

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • H
Improper Input Validation

[,86.0.4240.183)
  • M
Improper Input Validation

[,76.0.3809.87)
  • H
Resource Management Errors

[,24.0.1312.56)
  • H
Resource Management Errors

[,19.0.1084.52)
  • H
Race Condition

[,85.0.4183.102)
  • C
Resource Management Errors

[,19.0.1084.52)
  • H
Out-of-Bounds

[,27.0.1453.116)
  • M
Resource Management Errors

[,31.0.1650.63)
  • L
Information Exposure

[,53.0.2785.103)
  • H
Access Restriction Bypass

[,49.0.2623.87)
  • H
Information Exposure

[,77.0.3865.75)
  • M
Out-of-Bounds

[,30.0.1599.101)
  • M
Insufficiently Protected Credentials

[,74.0.3729.108)
  • M
Improper Certificate Validation

[0,)
  • H
Race Condition

[,68.0.3440.75)
  • M
Insecure Default

[,83.0.4103.61)
  • M
Out-of-bounds Write

[,73.0.3683.86)
  • H
Use After Free

[,79.0.3945.117)
  • M
Information Exposure

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • H
Out-of-Bounds

[,48.0.2564.97)
  • H
Out-of-bounds Read

[,57.0.2987.133)
  • H
Resource Management Errors

[,23.0.1271.97)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Out-of-bounds Read

[,80.0.3987.87)
  • H
Use After Free

[,53.0.2785.144)
  • H
Out-of-Bounds

[,21.0.1180.89)
  • M
Improper Access Control

[,54.0.2840.100)
  • H
Out-of-bounds Read

[,51.0.2704.63)
  • M
Cross-site Scripting (XSS)

[,53.0.2785.103)
  • H
CVE-2020-15992

[,86.0.4240.75)
  • M
Improper Input Validation

[,92.0.4515.107)
  • H
Out-of-Bounds

[,65.0.3325.146)
  • M
Information Exposure

[,89.0.4389.72)
  • H
Resource Management Errors

[,27.0.1453.116)
  • M
Authentication Bypass

[,30.0.1599.101)
  • H
Access Restriction Bypass

[,19.0.1084.52)
  • M
Out-of-Bounds

[,40.0.2214.109)
  • H
Out-of-bounds Write

[,84.0.4147.125)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Improper Input Validation

[,68.0.3440.75)
  • H
Out-of-bounds Write

[,78.0.3904.70)
  • M
Out-of-Bounds

[,63.0.3239.84)
  • M
Improper Input Validation

[,48.0.2564.97)
  • M
Information Exposure

[,48.0.2564.97)
  • H
Out-of-Bounds

[,89.0.4389.72)
  • H
Use After Free

[,36.0.1985.143)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Type Confusion

[,91.0.4472.164)
  • C
Resource Management Errors

[,19.0.1084.52)
  • H
Use After Free

[,91.0.4472.114)
  • M
Open Redirect

[,74.0.3729.108)
  • M
Insecure Default

[,80.0.3987.87)
  • H
Access Restriction Bypass

[,36.0.1985.143)
  • H
Access Restriction Bypass

[,65.0.3325.146)
  • H
Resource Management Errors

[,29.0.1547.57)
  • H
Out-of-Bounds

[,23.0.1271.97)
  • M
Incorrect Authorization

[,78.0.3904.70)
  • H
Use After Free

[,91.0.4472.114)
  • C
Remote Code Execution (RCE)

[,23.0.1271.97)
  • H
Out-of-Bounds

[,56.0.2924.67)
  • M
Out-of-bounds Write

[,73.0.3683.75)
  • H
Use After Free

[,91.0.4472.164)
  • M
Improper Input Validation

[,60.0.3112.78)
  • M
Out-of-Bounds

[,40.0.2214.109)
  • H
Denial of Service (DoS)

[,20.0.1132.57)
  • H
Out-of-Bounds

[,53.0.2785.144)
  • M
Use After Free

[,32.0.1700.77)
  • H
Use After Free

[,91.0.4472.101)
  • H
Out-of-Bounds

[,57.0.2987.133)
  • H
Use After Free

[,63.0.3239.84)
  • M
Improper Data Handling

[,44.0.2403.89)
  • M
User Impersonation

[,78.0.3904.70)
  • H
Access Restriction Bypass

[,62.0.3202.62)
  • H
Use After Free

[,84.0.4147.105)
  • M
Improper Access Control

[,40.0.2214.109)
  • C
Use After Free

[,76.0.3809.87)
  • M
Insufficiently Protected Credentials

[,72.0.3626.81)
  • C
Use After Free

[,94.0.4606.61)
  • C
Out-of-bounds Read

[,57.0.2987.133)
  • M
Code

[,40.0.2214.109)
  • H
Out-of-bounds Write

[,88.0.4324.146)
  • H
Use After Free

[,86.0.4240.75)
  • H
Out-of-bounds Write

[,79.0.3945.79)
  • H
Resource Management Errors

[,30.0.1599.101)
  • M
Improper Input Validation

[,81.0.4044.122)
  • M
Information Exposure

[,69.0.3497.81)
  • M
Out-of-Bounds

[,48.0.2564.97)
  • M
Out-of-Bounds

[,44.0.2403.89)
  • H
Use After Free

[,27.0.1453.116)
  • M
Out-of-Bounds

[,63.0.3239.84)
  • M
Resource Management Errors

[,21.0.1180.89)
  • H
Improper Access Control

[,50.0.2661.75)
  • M
Information Exposure

[,65.0.3325.146)
  • M
Authentication Bypass

[,79.0.3945.79)
  • M
Access Restriction Bypass

[,40.0.2214.109)
  • M
Security Features

[,44.0.2403.89)
  • H
Out-of-bounds Read

[,72.0.3626.81)
  • M
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Privilege Escalation

[,83.0.4103.61)
  • M
Cross-site Scripting (XSS)

[,44.0.2403.89)
  • H
Out-of-Bounds

[,63.0.3239.84)
  • H
Integer Overflow or Wraparound

[,53.0.2785.103)
  • M
Improper Input Validation

[,80.0.3987.87)
  • H
Incorrect Type Conversion or Cast

[,59.0.3071.86)(59.0.3071.86,59.0.3071.92)
  • M
Improper Input Validation

[,83.0.4103.97)
  • H
Use After Free

[,84.0.4147.125)
  • H
Use After Free

[,54.0.2840.100)
  • C
Use After Free

[,87.0.4280.141)
  • H
Improper Validation of Array Index

[,69.0.3497.92)
  • M
Out-of-Bounds

[,56.0.2924.67)
  • H
Use After Free

[,53.0.2785.103)
  • M
Improper Input Validation

[,23.0.1271.97)
  • M
Access Restriction Bypass

[,40.0.2214.109)
  • M
Improper Input Validation

[,76.0.3809.87)
  • H
Code

[,44.0.2403.89)
  • M
Use of Uninitialized Resource

[,90.0.4430.72)
  • M
Information Exposure

[,85.0.4183.83)
  • M
Information Exposure

[,66.0.3359.117)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Out-of-bounds Write

[,84.0.4147.89)
  • M
Out-of-Bounds

[,44.0.2403.89)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • M
CVE-2013-6628

[,31.0.1650.63)
  • M
Authentication Bypass

[,77.0.3865.75)
  • H
Access Restriction Bypass

[,87.0.4280.141)
  • M
Improper Input Validation

[,62.0.3202.62)
  • M
Information Exposure

[,84.0.4147.125)
  • H
Use After Free

[,81.0.4044.122)
  • M
Information Exposure

[,86.0.4240.75)
  • H
Incorrect Type Conversion or Cast

[,65.0.3325.146)
  • H
Denial of Service (DoS)

[,19.0.1084.52)
  • H
Use After Free

[,80.0.3987.149)
  • H
Out-of-bounds Write

[,86.0.4240.183)
  • H
Use After Free

[,86.0.4240.99)
  • H
Out-of-bounds Write

[,70.0.3538.110)
  • M
Authentication Bypass

[,86.0.4240.75)
  • H
Use After Free

[,77.0.3865.90)
  • M
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Improper Input Validation

[,64.0.3282.119)
  • H
Out-of-bounds Write

[,79.0.3945.79)
  • M
Use After Free

[,72.0.3626.121)
  • H
Out-of-bounds Write

[,87.0.4280.66)
  • C
CVE-2016-5194

[,54.0.2840.59)
  • H
Improper Input Validation

[,48.0.2564.97)
  • M
Information Exposure

[,44.0.2403.89)
  • M
Out-of-bounds Write

[,75.0.3770.142)
  • M
Information Exposure

[,83.0.4103.61)
  • H
Use After Free

[,91.0.4472.77)
  • H
Directory Traversal

[,27.0.1453.116)
  • M
Access Restriction Bypass

[,27.0.1453.116)
  • H
Directory Traversal

[,33.0.1750.154)
  • M
Improper Input Validation

[,80.0.3987.87)
  • H
Use After Free

[,90.0.4430.72)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Resource Management Errors

[,30.0.1599.101)
  • H
Out-of-bounds Write

[,93.0.4577.82)
  • H
Use of Uninitialized Resource

[,89.0.4389.72)
  • H
Resource Management Errors

[,40.0.2214.109)
  • C
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Out-of-bounds Write

[,77.0.3865.75)
  • M
Authentication Bypass

[,79.0.3945.79)
  • H
Out-of-bounds Read

[,90.0.4430.212)
  • M
Open Redirect

[,63.0.3239.84)
  • H
Out-of-bounds Write

[,62.0.3202.62)
  • M
Insecure Encryption

[,48.0.2564.97)
  • M
Improper Access Control

[,56.0.2924.67)
  • H
Use After Free

[,89.0.4389.72)
  • M
Information Exposure

[,85.0.4183.83)
  • H
Use After Free

[,53.0.2785.144)
  • H
Use After Free

[,90.0.4430.212)
  • M
CVE-2013-2872

[,29.0.1547.57)
  • M
Improper Input Validation

[,72.0.3626.81)
  • H
Use After Free

[0,)
  • M
Information Exposure

[,79.0.3945.79)
  • H
Denial of Service (DoS)

[,23.0.1271.97)
  • M
CRLF Injection

[,67.0.3396.79)
  • H
Denial of Service (DoS)

[,50.0.2661.75)
  • M
Improper Input Validation

[,90.0.4430.72)
  • C
Use After Free

[,53.0.2785.103)
  • M
Access Restriction Bypass

[,84.0.4147.89)
  • C
Use After Free

[,87.0.4280.141)
  • M
Incorrect Authorization

[,89.0.4389.72)
  • M
Information Exposure

[,90.0.4430.72)
  • M
Denial of Service (DoS)

[,40.0.2214.109)
  • C
Access Restriction Bypass

[,53.0.2785.103)
  • M
Information Exposure

[,64.0.3282.119)
  • H
CVE-2020-6420

[,80.0.3987.132)
  • H
Use After Free

[,92.0.4515.159)
  • C
CVE-2011-3101

[,19.0.1084.52)
  • H
Out-of-Bounds

[,53.0.2785.103)
  • H
Use After Free

[,84.0.4147.125)
  • H
Resource Management Errors

[,24.0.1312.56)
  • H
Information Exposure

[,53.0.2785.103)
  • M
Out-of-bounds Write

[,68.0.3440.75)
  • M
User Impersonation

[,78.0.3904.70)
  • M
Improper Input Validation

[,59.0.3071.104)
  • M
Out-of-bounds Write

[,87.0.4280.88)
  • M
Information Exposure

[,68.0.3440.75)
  • H
Out-of-Bounds

[,53.0.2785.103)
  • H
Out-of-bounds Write

[,72.0.3626.81)
  • C
Denial of Service (DoS)

[,48.0.2564.97)
  • M
Out-of-Bounds

[,44.0.2403.89)
  • H
Use After Free

[,77.0.3865.90)
  • M
CVE-2012-2875

[,23.0.1271.97)
  • M
Information Exposure

[,27.0.1453.116)
  • M
Improper Data Handling

[,68.0.3440.75)
  • H
Out-of-bounds Write

[,78.0.3904.108)
  • H
Access Restriction Bypass

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • M
Authentication Bypass

[,83.0.4103.61)
  • M
Improper Input Validation

[,73.0.3683.75)
  • M
Improper Data Handling

[,68.0.3440.75)
  • M
Authentication Bypass

[,79.0.3945.79)
  • M
Improper Input Validation

[,77.0.3865.75)
  • M
Improper Initialization

[,86.0.4240.75)
  • M
Cross-site Scripting (XSS)

[,63.0.3239.108)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • C
Resource Management Errors

[,19.0.1084.52)
  • M
Authentication Bypass

[,71.0.3578.80)
  • C
Use After Free

[,83.0.4103.61)
  • M
Out-of-bounds Write

[,77.0.3865.75)
  • H
Use After Free

[,94.0.4606.54)
  • H
Out-of-bounds Write

[,79.0.3945.79)
  • M
Out-of-bounds Write

[,74.0.3729.108)
  • M
User Impersonation

[,90.0.4430.93)
  • M
Improper Input Validation

[,64.0.3282.119)
  • H
Use After Free

[,91.0.4472.101)
  • M
Improper Input Validation

[,53.0.2785.144)
  • H
Out-of-bounds Write

[,77.0.3865.75)
  • M
Improper Authentication

[,88.0.4324.96)
  • H
Use After Free

[,62.0.3202.62)
  • M
Denial of Service (DoS)

[,71.0.3578.80)
  • M
Improper Input Validation

[,53.0.2785.103)
  • H
Denial of Service (DoS)

[,72.0.3626.81)
  • H
Improper Input Validation

[,34.0.1847.132)
  • M
Improper Input Validation

[,63.0.3239.84)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • M
Code

[,44.0.2403.89)
  • M
Improper Input Validation

[,62.0.3202.62)
  • H
Out-of-Bounds

[,20.0.1132.57)
  • C
CVE-2013-0842

[,24.0.1312.56)
  • M
Improper Action Name Cleanup

[,70.0.3538.67)
  • H
Resource Management Errors

[,31.0.1650.63)
  • M
Improper Input Validation

[,60.0.3112.78)
  • H
Improper Input Validation

[,72.0.3626.81)
  • H
Access Restriction Bypass

[,48.0.2564.97)
  • M
Information Exposure

[,61.0.3163.79)
  • M
Improper Input Validation

[,66.0.3359.117)
  • H
Denial of Service (DoS)

[,31.0.1650.57)
  • M
Improper Data Handling

[,66.0.3359.117)
  • M
Out-of-bounds Write

[,76.0.3809.100)
  • M
Information Exposure

[,59.0.3071.92)
  • H
Resource Management Errors

[,20.0.1132.57)
  • M
Out-of-Bounds

[,53.0.2785.103)
  • H
Race Condition

[,23.0.1271.97)
  • H
Out-of-bounds Write

[,86.0.4240.183)
  • M
Improper Input Validation

[,60.0.3112.78)
  • M
Information Exposure

[,66.0.3359.117)
  • M
Improper Input Validation

[,68.0.3440.75)
  • H
Denial of Service (DoS)

[,34.0.1847.137)
  • H
Access Restriction Bypass

[,49.0.2623.87)
  • M
Use of Uninitialized Resource

[,67.0.3396.62)
  • M
Denial of Service (DoS)

[,31.0.1650.63)
  • H
Use After Free

[,81.0.4044.92)
  • H
Access Restriction Bypass

[,19.0.1084.52)
  • M
Out-of-Bounds

[,23.0.1271.97)
  • H
Out-of-Bounds

[,62.0.3202.62)
  • C
Out-of-bounds Write

[,88.0.4324.182)
  • H
Out-of-bounds Write

[,88.0.4324.146)
  • M
Denial of Service (DoS)

[,24.0.1312.56)
  • M
Out-of-Bounds

[,49.0.2623.87)
  • H
Out-of-bounds Write

[,88.0.4324.182)
  • H
Use After Free

[,90.0.4430.212)
  • M
Out-of-Bounds

[,19.0.1084.52)
  • H
Time and State

[,49.0.2623.87)
  • H
Resource Management Errors

[,33.0.1750.154)
  • M
Improper Input Validation

[,74.0.3729.108)
  • M
Incorrect Authorization

[,89.0.4389.72)
  • H
Race Condition

[,74.0.3729.108)
  • H
Use After Free

[,91.0.4472.77)
  • H
Out-of-Bounds

[,19.0.1084.52)
  • M
Information Exposure

[,84.0.4147.89)
  • H
Out-of-bounds Write

[,88.0.4324.182)
  • M
Insecure Default

[,84.0.4147.89)
  • M
Access Restriction Bypass

[,65.0.3325.146)
  • M
Access Restriction Bypass

[,72.0.3626.81)
  • H
Access Restriction Bypass

[,49.0.2623.87)
  • H
Use After Free

[0,)
  • H
Out-of-bounds Write

[,89.0.4389.90)
  • M
Information Exposure

[,92.0.4515.107)
  • H
Out-of-bounds Write

[,71.0.3578.80)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Use After Free

[,72.0.3626.81)
  • H
Improper Check for Unusual or Exceptional Conditions

[,72.0.3626.81)
  • H
Out-of-Bounds

[,23.0.1271.97)
  • M
User Impersonation

[,78.0.3904.70)
  • M
Incorrect Authorization

[,83.0.4103.106)
  • H
Use of Uninitialized Resource

[,92.0.4515.107)
  • H
CVE-2016-1674

[,53.0.2785.103)
  • H
Use After Free

[,92.0.4515.107)
  • H
Improper Authentication

[,32.0.1700.77)
  • M
Information Exposure

[,94.0.4606.54)
  • H
Use After Free

[,66.0.3359.117)
  • H
Out-of-Bounds

[,79.0.3945.79)
  • H
Out-of-bounds Write

[,88.0.4324.96)
  • M
Improper Input Validation

[,64.0.3282.119)
  • M
Information Exposure

[,50.0.2661.75)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • C
Improper Data Handling

[,70.0.3538.67)
  • M
Cross-site Scripting (XSS)

[,56.0.2924.67)
  • H
Use After Free

[,94.0.4606.71)
  • M
Out-of-bounds Read

[,80.0.3987.87)
  • H
Out-of-bounds Write

[,62.0.3202.62)
  • H
Out-of-Bounds

[,21.0.1180.89)
  • H
Out-of-bounds Read

[,68.0.3440.75)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • M
Cross-site Scripting (XSS)

[,40.0.2214.109)
  • M
Access Restriction Bypass

[,44.0.2403.89)
  • H
Use After Free

[,62.0.3202.62)
  • M
Improper Access Control

[,53.0.2785.144)
  • M
Security Features

[,67.0.3396.62)
  • M
Security Features

[,44.0.2403.89)
  • H
Access Restriction Bypass

[,49.0.2623.87)
  • M
Out-of-bounds Read

[,67.0.3396.62)
  • M
Authentication Bypass

[,80.0.3987.87)
  • M
Access Restriction Bypass

[,40.0.2214.109)
  • H
Use After Free

[,77.0.3865.120)
  • H
Denial of Service (DoS)

[,36.0.1985.143)
  • M
Authentication Bypass

[,83.0.4103.61)
  • M
Information Exposure

[0,)
  • M
Out-of-Bounds

[,44.0.2403.89)
  • H
Out-of-bounds Write

[,74.0.3729.131)
  • C
CVE-2012-5141

[,23.0.1271.97)
  • M
Code

[,44.0.2403.89)
  • M
Information Exposure

[,74.0.3729.108)
  • H
Denial of Service (DoS)

[,36.0.1985.143)
  • M
Authentication Bypass

[,92.0.4515.107)
  • M
Improper Authorization

[,69.0.3497.81)
  • M
Out-of-Bounds

[,31.0.1650.63)
  • H
Out-of-bounds Write

[,84.0.4147.89)
  • M
Improper Input Validation

[,64.0.3282.119)
  • H
Arbitrary Command Injection

[,61.0.3163.113)
  • H
Improper Input Validation

[,71.0.3578.80)
  • H
Denial of Service (DoS)

[,20.0.1132.57)
  • M
Improper Input Validation

[,64.0.3282.119)
  • M
Information Exposure

[,36.0.1985.143)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Use After Free

[,23.0.1271.97)
  • H
Out-of-bounds Read

[,75.0.3770.80)
  • M
Improper Access Control

[,53.0.2785.103)
  • H
Access Restriction Bypass

[,61.0.3163.113)
  • H
Improper Input Validation

[,72.0.3626.81)
  • H
Out-of-Bounds

[,84.0.4147.89)
  • M
Out-of-Bounds

[,56.0.2924.67)
  • H
Improper Input Validation

[,59.0.3071.86)(59.0.3071.86,59.0.3071.92)
  • M
Information Exposure

[,85.0.4183.83)
  • C
Improper Input Validation

[,85.0.4183.121)
  • H
Use After Free

[,92.0.4515.107)
  • H
Integer Overflow or Wraparound

[,68.0.3440.75)
  • H
Use After Free

[,89.0.4389.72)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,68.0.3440.75)
  • M
Authentication Bypass

[,79.0.3945.79)
  • H
Improper Input Validation

[,85.0.4183.121)
  • C
Use After Free

[,70.0.3538.67)
  • H
Out-of-bounds Write

[,79.0.3945.88)
  • M
Improper Input Validation

[,64.0.3282.119)
  • M
Information Exposure

[,61.0.3163.79)(61.0.3163.79,61.0.3163.81)
  • M
Cross-site Scripting (XSS)

[,53.0.2785.103)
  • M
Resource Management Errors

[,30.0.1599.101)
  • H
Out-of-bounds Write

[,89.0.4389.72)
  • M
Out-of-bounds Write

[,73.0.3683.75)
  • H
Improper Input Validation

[,61.0.3163.100)
  • H
Improper Input Validation

[,49.0.2623.87)
  • H
Out-of-Bounds

[,33.0.1750.154)
  • H
Use After Free

[,57.0.2987.132)
  • H
Unsafe Dependency Resolution

[,90.0.4430.212)
  • M
Improper Input Validation

[,59.0.3071.86)(59.0.3071.86,59.0.3071.92)
  • M
Improper Input Validation

[,64.0.3282.119)
  • M
Improper Initialization

[,78.0.3904.70)
  • H
Improper Access Control

[,44.0.2403.89)
  • M
User Impersonation

[,92.0.4515.131)
  • M
Out-of-Bounds

[,19.0.1084.52)
  • M
Improper Data Handling

[,68.0.3440.75)
  • H
Improper Data Handling

[,66.0.3359.117)
  • M
Out-of-Bounds

[,36.0.1985.143)
  • M
CVE-2018-16075

[,69.0.3497.81)
  • M
Improper Input Validation

[,53.0.2785.103)
  • M
Out-of-Bounds

[,23.0.1271.97)
  • H
Out-of-Bounds

[,50.0.2661.75)
  • H
Use After Free

[,59.0.3071.104)(59.0.3071.104,59.0.3071.117)
  • M
Access Restriction Bypass

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • C
Use After Free

[,83.0.4103.97)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Denial of Service (DoS)

[,20.0.1132.57)
  • H
Improper Authorization

[,53.0.2785.103)
  • M
Improper Input Validation

[,19.0.1084.52)
  • H
Out-of-Bounds

[,62.0.3202.75)
  • M
Improper Data Handling

[,68.0.3440.75)
  • H
Denial of Service (DoS)

[,50.0.2661.75)
  • H
Use After Free

[,86.0.4240.75)
  • M
Race Condition

[,53.0.2785.103)
  • M
Use After Free

[,53.0.2785.144)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • H
Resource Management Errors

[,30.0.1599.101)
  • H
Out-of-Bounds

[,40.0.2214.109)
  • M
Improper Input Validation

[,80.0.3987.87)
  • H
Use After Free

[,53.0.2785.103)
  • H
Improper Authentication

[,88.0.4324.96)
  • M
Denial of Service (DoS)

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • M
User Impersonation

[,88.0.4324.96)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • H
Denial of Service (DoS)

[,40.0.2214.110)
  • C
Improper Input Validation

[,69.0.3497.81)
  • H
Improper Input Validation

[,29.0.1547.57)
  • M
Information Exposure

[,36.0.1985.135)(36.0.1985.135,36.0.1985.143)
  • H
Use After Free

[,88.0.4324.146)
  • M
Resource Management Errors

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • M
User Impersonation

[,90.0.4430.72)
  • C
Denial of Service (DoS)

[,49.0.2623.87)
  • H
Out-of-bounds Read

[,66.0.3359.117)
  • M
Improper Input Validation

[,66.0.3359.117)
  • H
Out-of-bounds Read

[,92.0.4515.131)
  • M
Denial of Service (DoS)

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • H
Improper Input Validation

[,68.0.3440.75)
  • M
Resource Management Errors

[,30.0.1599.101)
  • M
Cryptographic Issues

[,40.0.2214.109)
  • M
Improper Input Validation

[,78.0.3904.70)
  • H
Denial of Service (DoS)

[,30.0.1599.101)
  • M
Improper Input Validation

[,68.0.3440.75)
  • C
Out-of-bounds Write

[,88.0.4324.182)
  • H
Out-of-bounds Write

[,86.0.4240.111)
  • M
Cross-site Scripting (XSS)

[,21.0.1180.89)
  • H
Integer Overflow or Wraparound

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Cryptographic Issues

[,33.0.1750.154)
  • M
Improper Data Handling

[,66.0.3359.117)
  • H
Use After Free

[,88.0.4324.96)
  • M
Incorrect Authorization

[,91.0.4472.77)
  • M
Use After Free

[,56.0.2924.67)
  • H
Use After Free

[,91.0.4472.101)
  • M
Out-of-Bounds

[,61.0.3163.100)
  • H
Out-of-Bounds

[,56.0.2924.67)
  • H
Use After Free

[,63.0.3239.84)
  • C
Denial of Service (DoS)

[,49.0.2623.87)
  • M
Resource Management Errors

[,30.0.1599.101)
  • H
Use After Free

[,83.0.4103.61)
  • H
Use After Free

[,87.0.4280.88)
  • H
Use After Free

[,84.0.4147.105)
  • M
Denial of Service (DoS)

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • H
Use After Free

[,77.0.3865.120)
  • H
Out-of-Bounds

[,80.0.3987.87)
  • M
Access Restriction Bypass

[,33.0.1750.154)
  • H
Access Restriction Bypass

[,19.0.1084.52)
  • H
Out-of-bounds Write

[,89.0.4389.72)
  • H
Use After Free

[,86.0.4240.75)
  • M
CVE-2019-13755

[,79.0.3945.79)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • L
Information Exposure

[,77.0.3865.75)
  • M
Information Exposure

[,53.0.2785.103)
  • M
Denial of Service (DoS)

[,24.0.1312.56)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Authentication Bypass

[,77.0.3865.75)
  • M
Authentication Bypass

[,70.0.3538.67)
  • H
Type Confusion

[,91.0.4472.164)
  • H
Integer Overflow or Wraparound

[,73.0.3683.75)
  • M
Improper Access Control

[,62.0.3202.62)
  • H
Use After Free

[,87.0.4280.141)
  • M
Resource Management Errors

[,40.0.2214.109)
  • M
Privilege Escalation

[,71.0.3578.80)
  • M
Information Exposure

[,75.0.3770.80)
  • H
Out-of-Bounds

[,81.0.4044.92)
  • H
CVE-2012-2764

[,20.0.1132.57)
  • H
Use After Free

[,61.0.3163.79)
  • M
Improper Input Validation

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • H
Out-of-bounds Write

[,89.0.4389.72)
  • H
Denial of Service (DoS)

[,27.0.1453.116)
  • H
Use After Free

[,69.0.3497.81)
  • H
Improper Input Validation

[,66.0.3359.117)
  • M
User Enumeration

[,84.0.4147.89)
  • M
Authentication Bypass

[,86.0.4240.75)
  • H
Out-of-Bounds

[,48.0.2564.97)
  • H
Out-of-bounds Write

[,91.0.4472.164)
  • H
Improper Input Validation

[,60.0.3112.78)
  • M
Improper Input Validation

[,66.0.3359.117)
  • C
Use After Free

[,93.0.4577.82)
  • H
Resource Management Errors

[,33.0.1750.154)
  • H
Resource Management Errors

[,23.0.1271.97)
  • M
Insecure Default

[,83.0.4103.61)
  • M
Resource Management Errors

[,23.0.1271.97)
  • H
Resource Management Errors

[,34.0.1847.137)
  • M
Information Exposure

[,48.0.2564.97)
  • C
Improper Input Validation

[,19.0.1084.52)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Missing Encryption of Sensitive Data

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • M
Cross-site Scripting (XSS)

[,33.0.1750.154)
  • M
Access Restriction Bypass

[,44.0.2403.89)
  • H
Use After Free

[,70.0.3538.67)
  • M
User Impersonation

[,77.0.3865.75)
  • H
Use After Free

[,59.0.3071.86)
  • H
Denial of Service (DoS)

[,36.0.1985.143)
  • H
Out-of-bounds Write

[,80.0.3987.122)
  • M
Improper Access Control

[,56.0.2924.67)
  • H
Resource Management Errors

[,23.0.1271.97)
  • M
Security Features

[,44.0.2403.89)
  • M
CVE-2019-5833

[,75.0.3770.80)
  • M
Improper Access Control

[,69.0.3497.81)
  • H
Use After Free

[,87.0.4280.88)
  • M
Improper Input Validation

[,90.0.4430.72)
  • H
Out-of-bounds Write

[,78.0.3904.108)
  • M
Improper Input Validation

[,60.0.3112.78)
  • H
Resource Management Errors

[,23.0.1271.97)
  • H
Security Features

[,53.0.2785.103)
  • M
Authentication Bypass

[,79.0.3945.79)
  • H
Out-of-Bounds

[,49.0.2623.87)
  • H
Use After Free

[,77.0.3865.90)
  • H
Resource Management Errors

[,40.0.2214.109)
  • M
Improper Input Validation

[,53.0.2785.103)
  • H
Incorrect Type Conversion or Cast

[,58.0.3029.81)(58.0.3029.81,58.0.3029.83)
  • M
Denial of Service (DoS)

[,21.0.1180.89)
  • H
Use After Free

[,57.0.2987.132)
  • M
Arbitrary Code Execution

[,86.0.4240.75)
  • H
Access Restriction Bypass

[,49.0.2623.87)
  • H
Use After Free

[,87.0.4280.66)
  • H
Use After Free

[,87.0.4280.141)
  • M
Insecure Default

[,81.0.4044.92)
  • M
Access Restriction Bypass

[,27.0.1453.116)
  • H
Out-of-Bounds

[,54.0.2840.98)
  • C
Integer Overflow or Wraparound

[,90.0.4430.85)
  • H
Type Confusion

[,81.0.4044.138)
  • H
Out-of-bounds Write

[,63.0.3239.84)
  • M
Out-of-bounds Write

[,72.0.3626.81)
  • H
Use After Free

[,23.0.1271.97)
  • M
Information Exposure

[,87.0.4280.66)
  • H
Use After Free

[,86.0.4240.99)
  • H
Use After Free

[,66.0.3359.117)
  • H
Resource Management Errors

[,33.0.1750.152)
  • H
Resource Management Errors

[,27.0.1453.116)
  • H
Out-of-bounds Write

[,69.0.3497.81)
  • H
Out-of-Bounds

[,91.0.4472.77)
  • H
Out-of-bounds Write

[,71.0.3578.80)
  • H
Out-of-bounds Write

[,71.0.3578.80)
  • H
Privilege Escalation

[,84.0.4147.125)
  • H
Integer Overflow or Wraparound

[,73.0.3683.75)
  • M
Improper Data Handling

[,54.0.2840.100)
  • M
Improper Data Handling

[,68.0.3440.75)
  • H
Out-of-Bounds

[,50.0.2661.75)
  • M
Improper Input Validation

[,59.0.3071.86)(59.0.3071.86,59.0.3071.92)
  • M
Authentication Bypass

[,88.0.4324.146)
  • H
Resource Management Errors

[,29.0.1547.57)
  • M
Improper Input Validation

[,23.0.1271.97)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Information Exposure

[,64.0.3282.119)
  • H
Resource Management Errors

[,34.0.1847.137)
  • M
Improper Input Validation

[,54.0.2840.100)
  • C
Denial of Service (DoS)

[,48.0.2564.97)
  • M
Authentication Bypass

[,77.0.3865.75)
  • M
Improper Input Validation

[,73.0.3683.75)
  • M
Integer Overflow or Wraparound

[,54.0.2840.100)
  • H
Improper Input Validation

[,77.0.3865.75)
  • H
Out-of-Bounds

[,48.0.2564.97)
  • M
Information Exposure

[,44.0.2403.89)
  • H
Improper Input Validation

[,24.0.1312.56)
  • H
Improper Input Validation

[,72.0.3626.81)
  • H
Use After Free

[,62.0.3202.62)
  • M
Improper Input Validation

[,80.0.3987.87)
  • H
Improper Access Control

[,53.0.2785.103)
  • H
Use After Free

[,89.0.4389.72)
  • M
Information Exposure

[,85.0.4183.102)
  • H
Improper Input Validation

[,53.0.2785.103)
  • C
Denial of Service (DoS)

[,50.0.2661.75)
  • M
Improper Input Validation

[,66.0.3359.117)
  • H
Resource Management Errors

[,34.0.1847.137)
  • M
Improper Input Validation

[,77.0.3865.75)
  • M
Information Exposure

[,84.0.4147.89)
  • H
Improper Input Validation

[,65.0.3325.146)
  • C
Use After Free

[,81.0.4044.113)
  • H
Out-of-Bounds

[,61.0.3163.79)(61.0.3163.79,61.0.3163.81)
  • M
Information Exposure

[,53.0.2785.103)
  • H
Resource Management Errors

[,40.0.2214.109)
  • M
Use After Free

[,68.0.3440.75)
  • M
Race Condition

[,58.0.3029.81)
  • C
CVE-2012-5138

[,23.0.1271.97)
  • H
Out-of-Bounds

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • M
Authentication Bypass

[,79.0.3945.79)
  • M
Improper Input Validation

[,71.0.3578.80)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • M
CVE-2021-21212

[,90.0.4430.72)
  • M
Information Exposure

[,85.0.4183.83)
  • H
Improper Input Validation

[,64.0.3282.119)
  • C
Access Restriction Bypass

[,49.0.2623.87)
  • H
Resource Management Errors

[,23.0.1271.97)
  • H
Out-of-Bounds

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • H
Use After Free

[,86.0.4240.111)
  • M
Information Exposure

[,48.0.2564.97)
  • H
Access Restriction Bypass

[,34.0.1847.130][34.0.1847.130,34.0.1847.137)
  • M
Insecure Default

[,81.0.4044.92)
  • M
Improper Data Handling

[,44.0.2403.89)
  • M
Improper Input Validation

[,73.0.3683.75)
  • M
Improper Input Validation

[,73.0.3683.75)
  • H
Cryptographic Issues

[,62.0.3202.74)
  • H
CVE-2020-6574

[,85.0.4183.102)
  • M
Insecure Storage of Sensitive Information

[,78.0.3904.70)
  • H
Use After Free

[,24.0.1312.56)
  • H
Integer Overflow or Wraparound

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • H
Out-of-bounds Write

[,74.0.3729.108)
  • M
Out-of-bounds Read

[,67.0.3396.62)
  • H
Use After Free

[,90.0.4430.72)
  • M
Use After Free

[,92.0.4515.131)
  • M
Race Condition

[,69.0.3497.81)
  • H
DEPRECATED: Use of Uninitialized Resource

[,80.0.3987.87)
  • M
Cross-site Scripting (XSS)

[,58.0.3029.81)(58.0.3029.81,58.0.3029.83)
  • H
Use After Free

[,86.0.4240.99)
  • M
Information Exposure

[,78.0.3904.70)
  • H
Out-of-bounds Write

[,90.0.4430.212)
  • H
Incorrect Type Conversion or Cast

[,67.0.3396.62)
  • H
Use After Free

[,86.0.4240.75)
  • M
Resource Management Errors

[,21.0.1180.89)
  • H
Out-of-Bounds

[,44.0.2403.89)
  • C
Remote Code Execution (RCE)

[,40.0.2214.109)
  • H
Integer Overflow or Wraparound

[,73.0.3683.75)
  • M
Improper Input Validation

[,60.0.3112.78)
  • M
Cross-site Scripting (XSS)

[,19.0.1084.52)
  • M
Information Exposure

[,65.0.3325.146)
  • M
User Impersonation

[,90.0.4430.72)
  • H
Integer Overflow or Wraparound

[,53.0.2785.103)
  • M
Out-of-Bounds

[,23.0.1271.97)
  • M
Access Restriction Bypass

[,33.0.1750.154)
  • H
Resource Management Errors

[,20.0.1132.57)
  • C
Use After Free

[,86.0.4240.198)
  • M
Access Restriction Bypass

[,44.0.2403.89)
  • M
Use of Uninitialized Resource

[,79.0.3945.79)
  • M
Security Features

[,48.0.2564.97)
  • M
Incorrect Authorization

[,91.0.4472.77)
  • H
Out-of-Bounds

[,44.0.2403.89)
  • M
Incorrect Authorization

[,91.0.4472.77)
  • M
Improper Data Handling

[,68.0.3440.75)
  • M
Information Exposure

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • H
Access Restriction Bypass

[,40.0.2214.109)
  • H
Race Condition

[,61.0.3163.113)
  • M
Cross-site Scripting (XSS)

[,54.0.2840.100)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,87.0.4280.66)
  • H
Out-of-bounds Write

[,74.0.3729.108)
  • M
Information Exposure

[,94.0.4606.54)
  • H
Out-of-bounds Write

[,79.0.3945.130)
  • H
Out-of-Bounds

[,24.0.1312.56)
  • M
CVE-2021-30617

[0,)
  • H
Out-of-bounds Write

[,86.0.4240.99)
  • H
Code

[,44.0.2403.89)
  • M
User Impersonation

[,90.0.4430.72)
  • H
Out-of-bounds Write

[,68.0.3440.75)
  • H
Improper Input Validation

[,86.0.4240.75)
  • L
Improper Access Control

[,59.0.3071.92)
  • H
Arbitrary Code Execution

[,72.0.3626.81)
  • H
Use After Free

[,92.0.4515.107)
  • M
Out-of-bounds Write

[,69.0.3497.81)
  • H
Use After Free

[,91.0.4472.77)
  • H
Out-of-Bounds

[,36.0.1985.143)
  • M
Improper Input Validation

[,77.0.3865.75)
  • M
Out-of-Bounds

[,23.0.1271.97)
  • M
Improper Input Validation

[,19.0.1084.52)
  • M
Improper Input Validation

[,78.0.3904.70)
  • M
Information Exposure

[,20.0.1132.57)
  • H
Out-of-bounds Read

[,70.0.3538.67)
  • M
Information Exposure

[,80.0.3987.87)
  • H
Use After Free

[,54.0.2840.100)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Authentication Bypass

[,70.0.3538.67)
  • M
Information Exposure

[,87.0.4280.88)
  • H
Out-of-Bounds

[,33.0.1750.151][33.0.1750.151,33.0.1750.154)
  • H
Use After Free

[,91.0.4472.101)
  • M
Resource Management Errors

[,19.0.1084.52)
  • H
Resource Management Errors

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • M
Improper Input Validation

[,76.0.3809.87)
  • H
Out-of-Bounds

[,89.0.4389.128)
  • M
Denial of Service (DoS)

[,21.0.1180.89)
  • M
Security Features

[,53.0.2785.103)
  • H
Out-of-Bounds

[,80.0.3987.87)
  • M
Improper Input Validation

[,68.0.3440.75)
  • H
Out-of-bounds Read

[,94.0.4606.54)
  • M
Information Exposure

[,79.0.3945.79)
  • H
Out-of-bounds Write

[,85.0.4183.121)
  • C
Out-of-bounds Write

[,75.0.3770.142)
  • H
Resource Management Errors

[,27.0.1453.116)
  • H
Out-of-bounds Read

[,91.0.4472.77)
  • H
Use After Free

[,94.0.4606.54)
  • M
Information Exposure

[,66.0.3359.117)
  • H
Integer Overflow or Wraparound

[,75.0.3770.80)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • H
Out-of-bounds Write

[,74.0.3729.108)
  • M
Information Exposure

[,66.0.3359.117)
  • C
Insecure Default

[,83.0.4103.61)
  • H
Out-of-bounds Write

[,86.0.4240.183)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • H
Access Restriction Bypass

[,86.0.4240.75)
  • H
Type Confusion

[,90.0.4430.93)
  • M
CVE-2020-15973

[,86.0.4240.75)
  • H
Improper Input Validation

[,66.0.3359.117)
  • H
Use After Free

[,91.0.4472.77)
  • H
Out-of-bounds Write

[,74.0.3729.108)
  • M
NULL Pointer Dereference

[,66.0.3359.117)
  • H
Race Condition

[,23.0.1271.97)
  • M
Improper Input Validation

[,60.0.3112.78)
  • H
Out-of-bounds Write

[,76.0.3809.87)
  • M
Out-of-Bounds

[,29.0.1547.57)
  • H
Out-of-bounds Write

[,79.0.3945.130)
  • M
Improper Data Handling

[,66.0.3359.117)
  • M
Improper Input Validation

[,58.0.3029.81)
  • M
Incorrect Authorization

[,91.0.4472.77)
  • H
Information Exposure

[,50.0.2661.75)
  • H
Denial of Service (DoS)

[0,3.24.35.33)
  • M
Cross-site Scripting (XSS)

[,56.0.2924.67)
  • M
Information Exposure

[,70.0.3538.67)
  • H
Out-of-bounds Write

[0,)
  • H
Use After Free

[,32.0.1700.77)
  • H
Use After Free

[,86.0.4240.111)
  • H
Access Restriction Bypass

[,89.0.4389.72)
  • M
Denial of Service (DoS)

[,54.0.2840.100)
  • M
Information Exposure

[,69.0.3497.81)
  • H
Incorrect Type Conversion or Cast

[,60.0.3112.78)
  • H
Access Restriction Bypass

[,48.0.2564.97)
  • M
Cross-site Scripting (XSS)

[,36.0.1985.143)
  • H
Resource Management Errors

[,34.0.1847.137)
  • H
Use After Free

[,53.0.2785.103)
  • H
Out-of-bounds Read

[,70.0.3538.67)
  • H
Denial of Service (DoS)

[,31.0.1650.63)
  • M
Out-of-Bounds

[,27.0.1453.116)
  • M
Denial of Service (DoS)

[0,)
  • H
Improper Input Validation

[,48.0.2564.97)
  • H
Buffer Overflow

[,84.0.4147.89)
  • M
User Impersonation

[,88.0.4324.96)
  • H
Out-of-Bounds

[,23.0.1271.97)
  • H
Out-of-bounds Write

[,71.0.3578.80)
  • M
Information Exposure

[,85.0.4183.83)
  • H
Security Features

[,53.0.2785.103)
  • M
Out-of-Bounds

[,44.0.2403.89)
  • H
Use After Free

[,84.0.4147.125)
  • H
Out-of-bounds Write

[,65.0.3325.146)
  • M
Argument Injection

[,73.0.3683.75)
  • H
Use After Free

[,92.0.4515.159)
  • M
Information Exposure

[,54.0.2840.100)
  • M
Use After Free

[,62.0.3202.62)
  • M
Out-of-bounds Write

[,73.0.3683.75)
  • H
Use After Free

[,88.0.4324.96)
  • C
Out-of-Bounds

[,53.0.2785.144)
  • M
Improper Authentication

[,31.0.1650.63)
  • M
Insecure Storage of Sensitive Information

[,78.0.3904.70)
  • H
Out-of-bounds Write

[,74.0.3729.108)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • M
Insecure Default

[,83.0.4103.61)
  • H
Denial of Service (DoS)

[,36.0.1985.143)
  • M
Access Restriction Bypass

[,81.0.4044.92)
  • C
Use After Free

[,87.0.4280.141)
  • C
Improper Input Validation

[,24.0.1312.56)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,88.0.4324.96)
  • M
Out-of-Bounds

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • M
Information Exposure

[,60.0.3112.78)
  • H
Access Restriction Bypass

[,27.0.1453.116)
  • H
Resource Management Errors

[,29.0.1547.57)
  • H
Out-of-Bounds

[,53.0.2785.103)
  • H
Improper Input Validation

[,76.0.3809.87)
  • M
Information Exposure

[,65.0.3325.146)
  • M
Access Restriction Bypass

[,44.0.2403.89)
  • M
Cross-site Scripting (XSS)

[,23.0.1271.97)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • H
Denial of Service (DoS)

[,49.0.2623.87)
  • M
Cross-site Scripting (XSS)

[,21.0.1180.89)
  • H
Type Confusion

[,93.0.4577.82)
  • H
Use After Free

[,80.0.3987.116)
  • M
User Impersonation

[0,)
  • H
Out-of-bounds Read

[,73.0.3683.75)
  • H
Resource Management Errors

[,32.0.1700.102)
  • H
Access Restriction Bypass

[,48.0.2564.97)
  • M
Security Features

[,44.0.2403.89)
  • M
Improper Input Validation

[,60.0.3112.78)
  • H
Out-of-bounds Write

[,79.0.3945.79)
  • C
Use After Free

[,88.0.4324.96)
  • H
Resource Management Errors

[,33.0.1750.154)
  • M
CVE-2018-20067

[,71.0.3578.80)
  • M
Improper Input Validation

[,50.0.2661.75)
  • H
CVE-2013-6661

[,33.0.1750.154)
  • M
Information Exposure

[,93.0.4577.82)
  • M
Improper Input Validation

[,53.0.2785.144)
  • M
Authentication Bypass

[,77.0.3865.75)
  • H
Improper Data Handling

[,40.0.2214.109)
  • M
Improper Authentication

[,88.0.4324.96)
  • M
Security Features

[,53.0.2785.103)
  • H
Out-of-bounds Write

[,88.0.4324.182)
  • H
Out-of-bounds Write

[,67.0.3396.62)
  • H
Incorrect Type Conversion or Cast

[,63.0.3239.84)
  • M
Access Restriction Bypass

[,81.0.4044.92)
  • M
Improper Authentication

[,88.0.4324.96)
  • M
Security Features

[,48.0.2564.97)
  • H
Out-of-bounds Write

[,77.0.3865.75)
  • H
Denial of Service (DoS)

[,23.0.1271.97)
  • H
Use After Free

[,91.0.4472.77)
  • M
Out-of-Bounds

[,24.0.1312.56)
  • M
Information Exposure

[,90.0.4430.72)
  • H
Out-of-bounds Write

[,89.0.4389.114)
  • H
Code

[,40.0.2214.109)
  • H
CVE-2021-30618

[0,)
  • H
Out-of-Bounds

[,48.0.2564.97)
  • H
Use After Free

[,60.0.3112.78)
  • M
Denial of Service (DoS)

[,40.0.2214.109)
  • H
Use After Free

[,59.0.3071.86)
  • M
Insecure Default

[,83.0.4103.88)
  • M
User Enumeration

[,89.0.4389.72)
  • M
Code

[,49.0.2623.87)
  • H
Out-of-bounds Write

[,87.0.4280.141)
  • H
Out-of-bounds Write

[,54.0.2840.100)
  • M
Improper Access Control

[,56.0.2924.67)
  • H
Improper Authentication

[,27.0.1453.116)
  • H
Access Restriction Bypass

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • M
Improper Input Validation

[,62.0.3202.62)
  • L
Cryptographic Issues

[0,)
  • H
Improper Input Validation

[,74.0.3729.108)
  • M
Cross-site Scripting (XSS)

[,65.0.3325.146)
  • M
Information Exposure

[,94.0.4606.54)
  • M
Information Exposure

[,56.0.2924.67)
  • M
User Impersonation

[0,)
  • H
Type Confusion

[,90.0.4430.212)
  • H
Out-of-Bounds

[,36.0.1985.143)
  • M
Cross-site Scripting (XSS)

[,53.0.2785.144)
  • C
Denial of Service (DoS)

[,49.0.2623.87)
  • M
Denial of Service (DoS)

[,19.0.1084.52)
  • M
Access Restriction Bypass

[,29.0.1547.57)
  • H
CRLF Injection

[,62.0.3202.74)
  • M
Security Features

[,64.0.3282.119)
  • H
Resource Management Errors

[,27.0.1453.116)
  • H
Resource Management Errors

[,20.0.1132.57)
  • H
Improper Input Validation

[,32.0.1700.102)
  • M
Access Restriction Bypass

[,79.0.3945.79)
  • H
Out-of-bounds Write

[,90.0.4430.93)
  • H
Use After Free

[,86.0.4240.75)
  • M
Cross-site Scripting (XSS)

[,83.0.4103.61)
  • H
Out-of-bounds Write

[,68.0.3440.75)
  • M
Information Exposure

[,88.0.4324.96)
  • H
Directory Traversal

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • M
Out-of-bounds Read

[,58.0.3029.81)(58.0.3029.81,58.0.3029.83)
  • H
Out-of-bounds Write

[,74.0.3729.108)
  • M
User Impersonation

[,89.0.4389.72)
  • M
Out-of-Bounds

[,24.0.1312.56)
  • M
Information Exposure

[,68.0.3440.75)
  • M
Cross-site Scripting (XSS)

[,27.0.1453.116)
  • M
Improper Input Validation

[,58.0.3029.83)(58.0.3029.83,59.0.3071.86)
  • H
Use After Free

[,78.0.3904.70)
  • H
Resource Management Errors

[,33.0.1750.154)
  • M
Denial of Service (DoS)

[,20.0.1132.57)
  • H
Improper Access Control

[,53.0.2785.103)
  • L
Information Exposure

[,64.0.3282.119)
  • M
Information Exposure

[,29.0.1547.57)
  • H
Improper Input Validation

[,24.0.1312.56)
  • M
Improper Input Validation

[,48.0.2564.97)
  • M
User Impersonation

[,78.0.3904.70)
  • M
Out-of-bounds Read

[,73.0.3683.75)
  • H
Use After Free

[,91.0.4472.101)
  • H
Type Confusion

[,92.0.4515.107)
  • H
Out-of-bounds Read

[,54.0.2840.98)
  • M
Denial of Service (DoS)

[,21.0.1180.89)
  • H
CVE-2013-0884

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • M
Information Exposure

[,65.0.3325.146)
  • H
CVE-2012-2821

[,20.0.1132.57)
  • H
CVE-2013-2867

[,29.0.1547.57)
  • M
Denial of Service (DoS)

[,20.0.1132.57)
  • M
Improper Input Validation

[,20.0.1132.57)
  • M
Insecure Default

[,83.0.4103.61)
  • C
Use After Free

[,88.0.4324.182)
  • H
Resource Management Errors

[,23.0.1271.97)
  • C
Out-of-bounds Write

[,86.0.4240.183)
  • M
Improper Input Validation

[,80.0.3987.87)
  • H
Use After Free

[,81.0.4044.92)
  • H
Use After Free

[,80.0.3987.149)
  • H
Out-of-bounds Write

[,75.0.3770.80)
  • H
Out-of-Bounds

[,19.0.1084.52)
  • H
Resource Management Errors

[,20.0.1132.57)
  • H
Use After Free

[,59.0.3071.86)(59.0.3071.86,59.0.3071.92)
  • H
Use After Free

[,94.0.4606.54)
  • M
Information Exposure

[,85.0.4183.83)
  • H
Use After Free

[,88.0.4324.96)
  • C
Insecure Default

[,83.0.4103.61)
  • H
Use After Free

[,84.0.4147.89)
  • M
Out-of-Bounds

[,40.0.2214.109)
  • M
Access Restriction Bypass

[,24.0.1312.56)
  • H
Out-of-bounds Write

[,72.0.3626.81)
  • M
Resource Management Errors

[,31.0.1650.63)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • H
Access Restriction Bypass

[,87.0.4280.66)
  • C
Use After Free

[,88.0.4324.182)
  • M
Improper Authentication

[,88.0.4324.96)
  • H
Out-of-bounds Write

[,68.0.3440.75)
  • H
Use After Free

[,94.0.4606.71)
  • H
Out-of-bounds Write

[,90.0.4430.212)
  • M
Authentication Bypass

[,89.0.4389.72)
  • M
Improper Input Validation

[,56.0.2924.76)
  • M
Cross-site Scripting (XSS)

[,56.0.2924.67)
  • H
Integer Overflow or Wraparound

[,73.0.3683.75)
  • M
Cryptographic Issues

[,63.0.3239.84)
  • M
Access Restriction Bypass

[,44.0.2403.89)
  • H
Out-of-bounds Write

[,87.0.4280.141)
  • C
Denial of Service (DoS)

[,40.0.2214.109)
  • H
Resource Management Errors

[,20.0.1132.57)
  • H
Incorrect Type Conversion or Cast

[,68.0.3440.75)
  • M
Improper Input Validation

[,64.0.3282.119)
  • H
Race Condition

[,58.0.3029.96)
  • M
Information Exposure

[,66.0.3359.117)
  • H
Resource Management Errors

[,19.0.1084.52)
  • H
Use After Free

[,74.0.3729.108)
  • M
Cross-site Scripting (XSS)

[,53.0.2785.103)
  • H
Use After Free

[,89.0.4389.72)
  • C
Use After Free

[,23.0.1271.97)
  • M
CVE-2014-1726

[,34.0.1847.137)
  • M
Improper Input Validation

[,69.0.3497.81)
  • M
Out-of-bounds Write

[,90.0.4430.85)
  • H
Use After Free

[,89.0.4389.128)
  • C
Use After Free

[,87.0.4280.141)
  • M
Cross-site Scripting (XSS)

[,56.0.2924.67)
  • M
Out-of-Bounds

[,27.0.1453.116)
  • H
Security Features

[,48.0.2564.97)
  • C
Denial of Service (DoS)

[,53.0.2785.103)
  • M
Improper Authentication

[,53.0.2785.103)
  • M
Information Exposure

[,23.0.1271.97)
  • M
Access Restriction Bypass

[,30.112.62.0)
  • M
Insecure Default

[,83.0.4103.61)
  • H
CVE-2020-6410

[,80.0.3987.87)
  • M
Authentication Bypass

[,77.0.3865.75)
  • M
Information Exposure

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • M
Information Exposure

[,48.0.2564.97)
  • M
Cross-site Scripting (XSS)

[,64.0.3282.119)
  • H
Use After Free

[,86.0.4240.75)
  • H
Use After Free

[,81.0.4044.92)
  • H
Improper Input Validation

[,24.0.1312.56)
  • M
Information Exposure

[,72.0.3626.81)
  • M
Access Restriction Bypass

[,48.0.2564.97)
  • H
Use After Free

[,90.0.4430.72)
  • M
Code

[,44.0.2403.89)
  • C
Improper Input Validation

[,86.0.4240.193)
  • M
Access Restriction Bypass

[,85.0.4183.83)
  • M
Incorrect Authorization

[,84.0.4147.89)
  • M
Insufficiently Protected Credentials

[,75.0.3770.142)
  • M
Improper Input Validation

[,31.0.1650.63)
  • M
Improper Data Handling

[,67.0.3396.62)
  • M
Race Condition

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Improper Input Validation

[,80.0.3987.87)
  • M
Denial of Service (DoS)

[,23.0.1271.97)
  • H
Use After Free

[,90.0.4430.212)
  • M
Authentication Bypass

[,92.0.4515.107)
  • H
Resource Management Errors

[,33.0.1750.154)
  • C
Improper Input Validation

[,62.0.3202.74)
  • H
Out-of-bounds Write

[,79.0.3945.79)
  • M
Use After Free

[,54.0.2840.100)
  • H
Use After Free

[,75.0.3770.80)
  • H
Out-of-bounds Write

[,84.0.4147.89)
  • H
Out-of-bounds Write

[,81.0.4044.122)
  • H
Access Restriction Bypass

[,44.0.2403.89)
  • H
Use After Free

[,83.0.4103.61)
  • H
Use After Free

[,60.0.3112.78)
  • M
Improper Input Validation

[,48.0.2564.97)
  • C
Out-of-Bounds

[,27.0.1453.116)
  • C
Out-of-Bounds

[,19.0.1084.52)
  • M
Improper Input Validation

[,59.0.3071.115)
  • M
Code

[,44.0.2403.89)
  • H
Resource Management Errors

[,27.0.1453.116)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,87.0.4280.66)
  • H
Improper Data Handling

[,74.0.3729.108)
  • H
Use After Free

[,53.0.2785.103)
  • M
Out-of-Bounds

[,40.0.2214.109)
  • M
Access Restriction Bypass

[,29.0.1547.57)
  • M
Improper Input Validation

[,62.0.3202.62)
  • H
Resource Management Errors

[,20.0.1132.57)
  • M
Out-of-bounds Write

[,76.0.3809.132)
  • H
CVE-2021-30620

[0,)
  • M
Out-of-bounds Write

[,76.0.3809.87)
  • M
Improper Input Validation

[,77.0.3865.75)
  • C
Improper Restriction of Rendered UI Layers or Frames

[,88.0.4324.96)
  • M
Out-of-bounds Write

[,67.0.3396.62)
  • M
Out-of-bounds Read

[,23.0.1271.97)
  • M
Security Features

[,44.0.2403.89)
  • M
Improper Data Handling

[,66.0.3359.117)
  • H
Integer Overflow or Wraparound

[,66.0.3359.117)
  • M
Improper Input Validation

[,71.0.3578.80)
  • H
Out-of-Bounds

[,50.0.2661.75)
  • H
Out-of-Bounds

[,57.0.2987.133)
  • M
Out-of-Bounds

[,44.0.2403.89)
  • M
Denial of Service (DoS)

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • H
Out-of-bounds Write

[,80.0.3987.87)
  • M
Insecure Default

[,81.0.4044.92)
  • C
Improper Access Control

[,53.0.2785.103)
  • M
Authentication Bypass

[,31.0.1650.63)
  • H
Remote Code Execution (RCE)

[,55.0.2883.75)
  • H
Out-of-Bounds

[,80.0.3987.87)
  • H
Out-of-bounds Write

[,80.0.3987.87)
  • M
User Impersonation

[,88.0.4324.96)
  • M
Out-of-bounds Read

[,86.0.4240.75)
  • H
Directory Traversal

[,53.0.2785.103)
  • H
Use After Free

[,32.0.1700.77)
  • H
Use After Free

[,80.0.3987.87)
  • M
Out-of-Bounds

[,19.0.1084.52)
  • M
Improper Input Validation

[,65.0.3325.146)
  • C
Out-of-Bounds

[,62.0.3202.89)
  • H
Use After Free

[,80.0.3987.149)
  • H
Improper Access Control

[,74.0.3729.108)
  • H
Integer Overflow or Wraparound

[,53.0.2785.103)
  • M
CVE-2021-37958

[,94.0.4606.54)
  • H
Out-of-Bounds

[,58.0.3029.81)
  • M
Information Exposure

[,85.0.4183.83)
  • M
Improper Data Handling

[,54.0.2840.100)
  • H
Out-of-Bounds

[,21.0.1180.89)
  • C
Out-of-Bounds

[,53.0.2785.103)
  • H
Out-of-Bounds

[,40.0.2214.109)
  • H
Improper Input Validation

[,59.0.3071.86)
  • H
Denial of Service (DoS)

[,50.0.2661.75)
  • M
Out-of-bounds Write

[,65.0.3325.146)
  • M
User Impersonation

[,94.0.4606.54)
  • H
Access Restriction Bypass

[,87.0.4280.66)
  • H
Use After Free

[,93.0.4577.82)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Out-of-Bounds

[,44.0.2403.89)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Out-of-bounds Write

[,69.0.3497.81)
  • H
Use After Free

[,27.0.1453.116)
  • H
Type Confusion

[,85.0.4183.121)
  • M
Authentication Bypass

[,32.0.1700.102)
  • M
Improper Data Handling

[,66.0.3359.117)
  • H
Use After Free

[,80.0.3987.149)
  • M
Improper Input Validation

[,76.0.3809.87)
  • H
Use After Free

[,84.0.4147.105)
  • M
Improper Input Validation

[,63.0.3239.84)
  • H
Resource Management Errors

[,36.0.1985.143)
  • H
Out-of-bounds Read

[,87.0.4280.88)
  • M
Information Exposure

[,66.0.3359.117)
  • H
Resource Management Errors

[,27.0.1453.116)
  • H
Improper Input Validation

[,66.0.3359.117)
  • C
Improper Input Validation

[,53.0.2785.144)
  • H
Use After Free

[,89.0.4389.114)
  • M
Improper Authorization

[,69.0.3497.81)
  • H
Double Free

[,91.0.4472.77)
  • H
Use After Free

[,80.0.3987.149)
  • H
Out-of-bounds Read

[,69.0.3497.81)
  • H
Improper Authentication

[,88.0.4324.96)
  • H
Out-of-Bounds

[,53.0.2785.103)
  • M
Race Condition

[,21.0.1180.89)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • M
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Security Features

[,44.0.2403.89)
  • H
Out-of-bounds Write

[,71.0.3578.80)
  • H
Out-of-bounds Write

[,91.0.4472.101)
  • M
Access Restriction Bypass

[,44.0.2403.89)
  • H
Out-of-Bounds

[,72.0.3626.81)
  • H
Out-of-bounds Write

[,83.0.4103.106)
  • H
Out-of-bounds Write

[,75.0.3770.80)
  • M
Improper Authentication

[,89.0.4389.72)
  • H
Improper Input Validation

[,67.0.3396.62)
  • M
Source Code

[,71.0.3578.80)
  • H
Remote Code Execution (RCE)

[,34.0.1847.137)
  • M
Remote Code Execution (RCE)

[,78.0.3904.70)
  • H
Out-of-bounds Read

[,62.0.3202.94)
  • M
Security Features

[,53.0.2785.103)
  • H
Resource Management Errors

[,29.0.1547.57)
  • H
Improper Preservation of Permissions

[,79.0.3945.79)
  • M
Out-of-Bounds

[,21.0.1180.89)
  • M
Access Restriction Bypass

[,48.0.2564.97)
  • M
Access Restriction Bypass

[,80.0.3987.87)
  • H
Arbitrary Code Execution

[,70.0.3538.67)
  • M
Improper Authentication

[,89.0.4389.72)
  • C
Use After Free

[,87.0.4280.141)
  • H
Use After Free

[,92.0.4515.131)
  • M
Cross-site Scripting (XSS)

[,67.0.3396.62)
  • H
Use After Free

[,64.0.3282.119)
  • H
Use After Free

[,90.0.4430.72)
  • M
Information Exposure

[,89.0.4389.72)
  • H
Use After Free

[,27.0.1453.116)
  • M
Improper Data Handling

[,54.0.2840.100)
  • H
Out-of-Bounds

[,44.0.2403.89)
  • C
Resource Management Errors

[,19.0.1084.52)
  • M
Out-of-Bounds

[,29.0.1547.57)
  • M
Resource Management Errors

[,30.0.1599.101)
  • M
Improper Access Control

[,53.0.2785.103)
  • M
Out-of-Bounds

[,29.0.1547.57)
  • M
Information Exposure

[,60.0.3112.78)
  • L
Cryptographic Issues

[0,)
  • M
Cross-site Scripting (XSS)

[,87.0.4280.66)
  • M
Access Restriction Bypass

[,24.0.1312.56)
  • M
Improper Input Validation

[,65.0.3325.146)
  • H
Integer Overflow or Wraparound

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • M
Authentication Bypass

[,70.0.3538.67)
  • C
Out-of-Bounds

[,23.0.1271.97)
  • H
Use After Free

[,71.0.3578.80)
  • H
Out-of-bounds Write

[,67.0.3396.62)
  • H
Improper Input Validation

[,54.0.2840.98)
  • H
Resource Management Errors

[,29.0.1547.57)
  • H
Privilege Escalation

[,94.0.4606.54)
  • M
Cross-site Request Forgery (CSRF)

[,74.0.3729.108)
  • H
Resource Management Errors

[,44.0.2403.89)
  • H
Resource Management Errors

[,29.0.1547.57)
  • M
Improper Access Control

[,66.0.3359.117)
  • H
Use After Free

[0,)
  • C
Arbitrary Code Execution

[,31.0.1650.63)
  • H
Use After Free

[0,)
  • M
Race Condition

[,30.0.1599.101)
  • H
Resource Management Errors

[,27.0.1453.116)
  • H
Resource Management Errors

[,31.0.1650.63)
  • H
Out-of-bounds Write

[,91.0.4472.77)
  • H
Improper Input Validation

[,53.0.2785.103)
  • H
Out-of-bounds Read

[,62.0.3202.62)
  • H
Resource Management Errors

[,27.0.1453.116)
  • H
Denial of Service (DoS)

[,24.0.1312.56)
  • H
Out-of-Bounds

[,63.0.3239.84)
  • M
Access Restriction Bypass

[,44.0.2403.89)
  • M
Information Exposure

[,90.0.4430.72)
  • H
Out-of-bounds Write

[,92.0.4515.107)
  • H
Out-of-Bounds

[,27.0.1453.116)
  • M
Out-of-Bounds

[,19.0.1084.52)
  • H
Out-of-bounds Write

[,78.0.3904.70)
  • H
Security Features

[,53.0.2785.103)
  • H
Out-of-bounds Write

[,69.0.3497.81)
  • M
Improper Input Validation

[,72.0.3626.81)
  • H
Out-of-bounds Write

[,74.0.3729.131)
  • M
Improper Input Validation

[0,)
  • H
Out-of-bounds Write

[,91.0.4472.164)
  • H
Use After Free

[,92.0.4515.107)
  • C
Use After Free

[,72.0.3626.81)
  • H
Denial of Service (DoS)

[,29.0.1547.57)
  • H
Use After Free

[,92.0.4515.107)
  • H
Type Confusion

[,79.0.3945.79)
  • C
Incorrect Authorization

[,92.0.4515.107)
  • M
Access Restriction Bypass

[,19.0.1084.52)
  • M
Out-of-Bounds

[0,40.0.2214.91)
  • H
Type Confusion

[,84.0.4147.89)
  • C
Use After Free

[,83.0.4103.106)
  • M
Out-of-Bounds

[,30.0.1599.101)
  • H
Denial of Service (DoS)

[,49.0.2623.87)
  • M
Improper Authentication

[,88.0.4324.96)
  • M
Improper Input Validation

[,72.0.3626.81)
  • M
Information Exposure

[,83.0.4103.61)
  • M
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • M
Cross-site Scripting (XSS)

[,84.0.4147.105)
  • M
Improper Input Validation

[,84.0.4147.89)
  • M
Race Condition

[0,41.0.2272.118)
  • M
Improper Input Validation

[,44.0.2403.89)
  • M
Race Condition

[,75.0.3770.80)
  • H
Out-of-bounds Read

[,69.0.3497.81)
  • M
Improper Access Control

[,56.0.2924.67)
  • M
Resource Management Errors

[,31.0.1650.63)
  • M
Information Exposure

[,67.0.3396.62)
  • M
Information Exposure

[,77.0.3865.120)
  • M
Out-of-Bounds

[,24.0.1312.56)
  • H
Access Restriction Bypass

[,27.0.1453.116)
  • H
Out-of-Bounds

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • H
Use After Free

[,53.0.2785.103)
  • M
Access Restriction Bypass

[,78.0.3904.70)
  • H
Improper Input Validation

[,44.0.2403.89)
  • H
Out-of-bounds Write

[,68.0.3440.75)
  • H
Type Confusion

[,84.0.4147.105)
  • H
Denial of Service (DoS)

[,29.0.1547.57)
  • H
Use After Free

[,89.0.4389.114)
  • H
Use After Free

[,94.0.4606.54)
  • H
Improper Access Control

[,53.0.2785.103)
  • H
Arbitrary Code Injection

[,90.0.4430.212)
  • M
Improper Authorization

[,69.0.3497.81)
  • H
Denial of Service (DoS)

[,34.0.1847.130][34.0.1847.130,34.0.1847.137)
  • M
Denial of Service (DoS)

[,36.0.1985.143)
  • H
Denial of Service (DoS)

[,34.0.1847.137)
  • C
Improper Input Validation

[,53.0.2785.103)
  • C
Denial of Service (DoS)

[,53.0.2785.103)
  • H
Out-of-bounds Write

[,88.0.4324.150)
  • M
Information Exposure

[,78.0.3904.70)
  • H
Improper Preservation of Permissions

[,77.0.3865.75)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,72.0.3626.81)
  • M
Improper Input Validation

[,64.0.3282.119)
  • H
Use After Free

[,66.0.3359.139)
  • H
Use After Free

[,52.0.2743.82)
  • H
Out-of-bounds Write

[,65.0.3325.146)
  • M
Privilege Escalation

[,79.0.3945.79)
  • M
Privilege Escalation

[,78.0.3904.70)
  • M
Information Exposure

[,67.0.3396.62)
  • H
Out-of-bounds Write

[,71.0.3578.80)
  • H
Access Restriction Bypass

[,87.0.4280.66)
  • H
Improper Data Handling

[,53.0.2785.103)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • M
Denial of Service (DoS)

[,40.0.2214.109)
  • H
Out-of-bounds Write

[,72.0.3626.81)
  • M
Improper Input Validation

[,23.0.1271.97)
  • H
Use After Free

[,53.0.2785.103)
  • H
Out-of-bounds Write

[,88.0.4324.182)
  • H
Use After Free

[,89.0.4389.72)
  • M
Authentication Bypass

[,89.0.4389.72)
  • M
Cross-site Scripting (XSS)

[,67.0.3396.62)
  • H
Out-of-bounds Write

[,57.0.2987.132)
  • H
Use After Free

[,77.0.3865.120)
  • M
Out-of-Bounds

[,40.0.2214.109)
  • M
Improper Handling of Exceptional Conditions

[,77.0.3865.75)
  • M
Security Features

[,50.0.2661.75)
  • M
Information Exposure

[,75.0.3770.80)
  • H
Improper Input Validation

[,23.0.1271.97)
  • H
Out-of-Bounds

[,19.0.1084.52)
  • H
Out-of-Bounds

[,27.0.1453.116)
  • H
Access Restriction Bypass

[0,)
  • H
Use After Free

[,91.0.4472.77)
  • M
Improper Input Validation

[,62.0.3202.62)
  • M
Privilege Escalation

[,72.0.3626.81)
  • H
Use After Free

[,88.0.4324.182)
  • M
Cross-site Scripting (XSS)

[,54.0.2840.100)
  • H
Out-of-Bounds

[,80.0.3987.87)
  • M
CVE-2012-2892

[,23.0.1271.97)
  • H
Resource Management Errors

[,19.0.1084.52)
  • M
Out-of-Bounds

[,30.0.1599.101)
  • M
Access Restriction Bypass

[,84.0.4147.89)
  • H
Out-of-bounds Write

[,67.0.3396.62)
  • M
Out-of-Bounds

[,27.0.1453.116)
  • M
Information Exposure

[,79.0.3945.79)
  • H
CVE-2013-2859

[,27.0.1453.116)
  • H
Access Restriction Bypass

[,24.0.1312.56)
  • H
Use After Free

[,91.0.4472.101)
  • H
Improper Authorization

[,53.0.2785.103)
  • H
Code

[0,41.0.2272.118)
  • M
Out-of-bounds Write

[,76.0.3809.87)
  • H
Use After Free

[,65.0.3325.146)
  • M
Improper Access Control

[,49.0.2623.87)
  • H
Improper Access Control

[,53.0.2785.103)
  • H
Privilege Escalation

[,88.0.4324.96)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Out-of-Bounds

[,30.0.1599.101)
  • H
Out-of-bounds Write

[,65.0.3325.146)
  • H
Out-of-bounds Read

[,77.0.3865.75)
  • H
Use After Free

[0,40.0.2214.111)
  • C
Use After Free

[,23.0.1271.97)
  • M
User Enumeration

[,89.0.4389.72)
  • H
Out-of-bounds Write

[,71.0.3578.80)
  • H
Resource Management Errors

[,27.0.1453.116)
  • M
CVE-2018-18346

[,71.0.3578.80)
  • H
Code

[,44.0.2403.89)
  • C
Use After Free

[,90.0.4430.72)
  • M
Improper Data Handling

[,66.0.3359.117)
  • H
Resource Management Errors

[,29.0.1547.57)
  • H
Integer Overflow or Wraparound

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • H
Out-of-bounds Write

[,67.0.3396.87)
  • M
Use After Free

[,86.0.4240.75)
  • M
Improper Input Validation

[,80.0.3987.87)
  • M
Information Exposure

[,54.0.2840.100)
  • M
User Impersonation

[,78.0.3904.70)
  • M
Access Restriction Bypass

[,29.0.1547.57)
  • M
CVE-2013-2868

[,29.0.1547.57)
  • H
Out-of-Bounds

[,62.0.3202.62)
  • M
Improper Input Validation

[,59.0.3071.86)(59.0.3071.86,59.0.3071.92)
  • M
Cross-site Scripting (XSS)

[,56.0.2924.67)
  • M
Improper Data Handling

[,72.0.3626.96)
  • M
Improper Data Handling

[,71.0.3578.80)
  • M
Information Exposure

[,84.0.4147.89)
  • H
Out-of-bounds Write

[,84.0.4147.89)
  • M
Improper Input Validation

[,91.0.4472.77)
  • M
Resource Management Errors

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • M
Race Condition

[,27.0.1453.116)
  • H
Out-of-bounds Write

[,68.0.3440.75)
  • H
Denial of Service (DoS)

[,30.0.1599.101)
  • M
Access Restriction Bypass

[,87.0.4280.66)
  • M
Improper Input Validation

[,66.0.3359.117)
  • H
Improper Input Validation

[,77.0.3865.75)
  • H
Race Condition

[,48.0.2564.97)
  • H
Integer Overflow or Wraparound

[,62.0.3202.62)
  • H
Improper Input Validation

[,60.0.3112.78)
  • M
Improper Access Control

[,53.0.2785.103)
  • H
Code

[,48.0.2564.97)
  • H
Race Condition

[,27.0.1453.116)
  • M
Information Exposure

[,68.0.3440.75)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Out-of-Bounds

[,40.0.2214.109)
  • H
Use After Free

[,87.0.4280.88)
  • H
Denial of Service (DoS)

[,23.0.1271.97)
  • M
Resource Management Errors

[,30.0.1599.101)
  • H
Out-of-Bounds

[,62.0.3202.62)
  • H
Out-of-bounds Write

[,90.0.4430.93)
  • M
Cross-site Scripting (XSS)

[,19.0.1084.52)
  • M
Denial of Service (DoS)

[,20.0.1132.57)
  • C
Use After Free

[,83.0.4103.116)
  • H
Improper Input Validation

[,33.0.1750.154)
  • H
Denial of Service (DoS)

[,49.0.2623.87)
  • M
Access Restriction Bypass

[,49.0.2623.87)
  • M
Information Exposure

[,44.0.2403.89)
  • M
Security Features

[,53.0.2785.103)
  • M
Race Condition

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • H
Improper Input Validation

[,67.0.3396.62)
  • H
Resource Management Errors

[,20.0.1132.57)
  • H
Resource Management Errors

[,24.0.1312.56)
  • M
Improper Input Validation

[,27.0.1453.116)
  • H
Improper Input Validation

[,86.0.4240.75)
  • H
Use After Free

[,90.0.4430.212)
  • M
Denial of Service (DoS)

[,44.0.2403.89)
  • C
Use After Free

[,88.0.4324.96)
  • H
Out-of-bounds Write

[,87.0.4280.66)
  • H
Out-of-bounds Write

[,92.0.4515.107)
  • H
Use After Free

[,86.0.4240.75)
  • M
Out-of-bounds Read

[,76.0.3809.100)
  • H
Denial of Service (DoS)

[,19.0.1084.52)
  • M
Out-of-Bounds

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Out-of-Bounds

[,29.0.1547.57)
  • H
Privilege Escalation

[,78.0.3904.70)
  • H
Use After Free

[,91.0.4472.77)
  • H
Resource Management Errors

[,34.0.1847.137)
  • M
Access Restriction Bypass

[,79.0.3945.79)
  • H
Out-of-Bounds

[,60.0.3112.78)
  • M
Information Exposure

[,67.0.3396.62)
  • M
Cross-site Scripting (XSS)

[,70.0.3538.67)
  • C
Use After Free

[,85.0.4183.102)
  • M
Access Restriction Bypass

[,83.0.4103.61)
  • H
Denial of Service (DoS)

[,34.0.1847.130][34.0.1847.130,34.0.1847.137)
  • H
Access Restriction Bypass

[,48.0.2564.97)
  • H
Denial of Service (DoS)

[,34.0.1847.137)
  • C
Out-of-Bounds

[,48.0.2564.97)
  • H
Insufficient Verification of Data Authenticity

[,90.0.4430.93)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • M
Cross-site Scripting (XSS)

[,56.0.2924.67)
  • H
Use After Free

[,64.0.3282.119)
  • M
Race Condition

[,23.0.1271.97)
  • M
Improper Access Control

[,53.0.2785.103)
  • C
Use After Free

[,88.0.4324.146)
  • H
Race Condition

[,92.0.4515.159)
  • M
Insecure Default

[,74.0.3729.108)
  • H
Denial of Service (DoS)

[,36.0.1985.143)
  • M
Use After Free

[,56.0.2924.67)
  • M
Information Exposure

[,65.0.3325.146)
  • H
Denial of Service (DoS)

[,21.0.1180.89)
  • H
CVE-2016-1673

[,53.0.2785.103)
  • M
Information Exposure

[,75.0.3770.80)
  • M
Insecure Default

[,81.0.4044.92)
  • H
Use After Free

[,86.0.4240.75)
  • C
Denial of Service (DoS)

[,49.0.2623.87)
  • H
Use After Free

[,91.0.4472.77)
  • H
Use After Free

[,57.0.2987.132)
  • H
Out-of-bounds Write

[,92.0.4515.107)
  • M
Improper Access Control

[,53.0.2785.144)
  • H
Improper Validation of Array Index

[,70.0.3538.102)
  • M
Out-of-bounds Write

[,69.0.3497.81)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • M
Information Exposure

[,31.0.1650.63)
  • H
Use After Free

[,84.0.4147.125)
  • M
Insecure Default

[,77.0.3865.75)
  • H
Resource Management Errors

[,27.0.1453.116)
  • H
Out-of-bounds Write

[,86.0.4240.183)
  • M
Access Restriction Bypass

[,40.0.2214.109)
  • M
Out-of-bounds Write

[,77.0.3865.75)
  • C
Remote Code Execution (RCE)

[,38.0.2125.7][38.0.2125.7,40.0.2214.109)
  • M
Resource Management Errors

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • M
Information Exposure

[,94.0.4606.54)
  • M
Cross-site Scripting (XSS)

[,44.0.2403.89)
  • M
Improper Input Validation

[,57.0.2987.132)
  • H
Arbitrary Code Execution

[,80.0.3987.87)
  • H
Resource Management Errors

[,27.0.1453.116)
  • M
Authentication Bypass

[,79.0.3945.79)
  • M
Improper Input Validation

[,40.0.2214.109)
  • H
Use After Free

[,58.0.3029.81)
  • H
Denial of Service (DoS)

[,29.0.1547.57)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Information Exposure

[,19.0.1084.52)
  • H
Denial of Service (DoS)

[,34.0.1847.137)
  • H
Out-of-bounds Write

[,93.0.4577.82)
  • H
Out-of-Bounds

[,61.0.3163.100)
  • M
Cross-site Scripting (XSS)

[,54.0.2840.100)
  • H
Use After Free

[,23.0.1271.97)
  • H
Use After Free

[,81.0.4044.122)
  • H
Directory Traversal

[,24.0.1312.56)
  • H
Denial of Service (DoS)

[,33.0.1750.154)
  • M
Improper Input Validation

[,73.0.3683.75)
  • H
Denial of Service (DoS)

[,86.0.4240.75)
  • H
Out-of-bounds Write

[,77.0.3865.75)
  • M
Improper Input Validation

[,63.0.3239.84)
  • M
Out-of-bounds Write

[,86.0.4240.111)
  • M
Cross-site Scripting (XSS)

[,63.0.3239.84)
  • M
User Impersonation

[,89.0.4389.72)
  • H
Denial of Service (DoS)

[,23.0.1271.97)
  • H
Out-of-bounds Write

[,93.0.4577.82)
  • M
Information Exposure

[,79.0.3945.79)
  • H
Out-of-Bounds

[,89.0.4389.72)
  • H
Resource Management Errors

[,27.0.1453.116)
  • H
Use After Free

[,53.0.2785.144)
  • H
Use After Free

[,90.0.4430.93)
  • M
Improper Authorization

[,69.0.3497.81)
  • H
Use After Free

[,53.0.2785.144)
  • M
Improper Input Validation

[,63.0.3239.84)
  • H
Type Confusion

[,80.0.3987.87)
  • H
Use After Free

[,80.0.3987.162)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Cross-site Scripting (XSS)

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • H
Out-of-Bounds

[,27.0.1453.116)
  • M
Out-of-Bounds

[0,40.0.2214.91)
  • H
Denial of Service (DoS)

[,24.0.1312.56)
  • H
Race Condition

[,73.0.3683.75)
  • M
Improper Input Validation

[,59.0.3071.92)
  • M
Access Restriction Bypass

[0,40.0.2214.91)
  • C
Resource Management Errors

[,23.0.1271.97)
  • C
Denial of Service (DoS)

[,53.0.2785.103)
  • H
Out-of-bounds Write

[,71.0.3578.80)
  • M
Authentication Bypass

[,83.0.4103.61)
  • H
Denial of Service (DoS)

[,27.0.1453.116)
  • M
Out-of-Bounds

[,56.0.2924.67)
  • M
Improper Access Control

[,53.0.2785.103)
  • H
Out-of-bounds Write

[,65.0.3325.146)
  • M
Authentication Bypass

[,69.0.3497.92)
  • M
Out-of-bounds Read

[,69.0.3497.81)
  • M
Cryptographic Issues

[,72.0.3626.81)
  • M
Improper Input Validation

[,83.0.4103.61)
  • M
Security Features

[,64.0.3282.119)
  • M
Improper Input Validation

[,80.0.3987.149)
  • M
Insecure Default

[,83.0.4103.61)
  • M
Use of Uninitialized Resource

[,74.0.3729.108)
  • H
Improper Access Control

[,69.0.3497.81)
  • M
Information Exposure

[,77.0.3865.75)
  • H
Resource Management Errors

[,27.0.1453.116)
  • H
Use After Free

[0,)
  • H
Use After Free

[,92.0.4515.107)
  • M
Improper Input Validation

[,75.0.3770.80)
  • H
Out-of-Bounds

[,90.0.4430.85)
  • M
Out-of-Bounds

[,88.0.4324.96)
  • M
Improper Preservation of Permissions

[,85.0.4183.83)
  • H
Security Features

[,53.0.2785.103)
  • H
Out-of-bounds Write

[,65.0.3325.146)
  • M
Authentication Bypass

[,86.0.4240.75)
  • M
Improper Input Validation

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • H
Out-of-bounds Write

[,71.0.3578.80)
  • H
Resource Management Errors

[,27.0.1453.116)
  • M
Improper Data Handling

[,66.0.3359.117)
  • H
Use After Free

[,91.0.4472.101)
  • M
Access Restriction Bypass

[,48.0.2564.97)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • M
Information Exposure

[,49.0.2623.87)
  • H
Use After Free

[,91.0.4472.114)
  • H
Resource Management Errors

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • C
Improper Input Validation

[,85.0.4183.121)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,76.0.3809.87)
  • C
Use After Free

[,88.0.4324.146)
  • M
Use After Free

[,54.0.2840.100)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • H
Out-of-bounds Write

[,67.0.3396.62)
  • M
Improper Input Validation

[,66.0.3359.117)
  • M
Out-of-bounds Read

[,67.0.3396.62)
  • C
Resource Management Errors

[,19.0.1084.52)
  • M
Security Features

[,44.0.2403.89)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Information Exposure

[,81.0.4044.92)
  • C
Out-of-bounds Write

[,87.0.4280.66)
  • M
Improper Input Validation

[,86.0.4240.75)
  • H
Out-of-bounds Write

[,73.0.3683.75)
  • H
Out-of-bounds Write

[,79.0.3945.79)
  • H
Use After Free

[0,)
  • M
Cross-site Scripting (XSS)

[,54.0.2840.100)
  • M
Use After Free

[,92.0.4515.131)
  • M
Resource Management Errors

[,23.0.1271.97)
  • M
Authentication Bypass

[,70.0.3538.67)
  • H
Use After Free

[,40.0.2214.109)
  • M
Information Exposure

[,94.0.4606.71)
  • M
Improper Input Validation

[,75.0.3770.80)
  • M
Cross-site Scripting (XSS)

[,54.0.2840.100)
  • M
Authentication Bypass

[,77.0.3865.75)
  • H
Out-of-Bounds

[,53.0.2785.103)
  • M
Authentication Bypass

[,81.0.4044.92)
  • M
Improper Access Control

[,56.0.2924.67)
  • H
Use After Free

[,90.0.4430.212)
  • H
Denial of Service (DoS)

[,34.0.1847.137)
  • H
Improper Input Validation

[,80.0.3987.87)
  • M
Improper Input Validation

[,79.0.3945.79)
  • H
Integer Overflow or Wraparound

[,73.0.3683.75)
  • C
Denial of Service (DoS)

[,48.0.2564.97)
  • M
Type Confusion

[,80.0.3987.122)
  • M
Authentication Bypass

[,77.0.3865.75)
  • C
Use After Free

[,87.0.4280.141)
  • M
User Impersonation

[,89.0.4389.72)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Improper Input Validation

[,66.0.3359.117)
  • H
Incorrect Type Conversion or Cast

[,72.0.3626.81)
  • M
Insecure Default

[,83.0.4103.97)
  • H
User Impersonation

[,53.0.2785.103)
  • H
Use After Free

[,90.0.4430.72)
  • H
Out-of-bounds Write

[,72.0.3626.81)
  • H
Resource Management Errors

[,27.0.1453.116)
  • M
Out-of-bounds Write

[,76.0.3809.87)
  • M
Information Exposure

[,64.0.3282.119)
  • H
Incorrect Type Conversion or Cast

[,61.0.3163.79)
  • H
Out-of-bounds Write

[,91.0.4472.77)
  • M
Information Exposure

[,59.0.3071.86)(59.0.3071.86,59.0.3071.92)
  • H
Out-of-Bounds

[,48.0.2564.97)
  • H
Use After Free

[,87.0.4280.66)
  • M
Improper Input Validation

[,44.0.2403.89)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • M
Security Features

[,44.0.2403.89)
  • M
Cross-site Scripting (XSS)

[,69.0.3497.81)
  • H
Resource Management Errors

[,33.0.1750.154)
  • M
Resource Management Errors

[,30.0.1599.101)
  • M
Out-of-bounds Read

[,23.0.1271.97)
  • M
CVE-2012-2850

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • M
Information Exposure

[,72.0.3626.81)
  • M
Authentication Bypass

[,36.0.1985.143)
  • M
Access Restriction Bypass

[,71.0.3578.80)
  • M
Improper Input Validation

[,71.0.3578.80)
  • H
Out-of-bounds Read

[,84.0.4147.125)
  • H
Denial of Service (DoS)

[,19.0.1084.52)
  • H
Access Restriction Bypass

[,27.0.1453.116)
  • M
Incorrect Authorization

[,77.0.3865.75)
  • H
Improper Input Validation

[,64.0.3282.119)
  • H
Directory Traversal

[,33.0.1750.151][33.0.1750.151,33.0.1750.154)
  • C
Improper Restriction of Rendered UI Layers or Frames

[,87.0.4280.141)
  • M
Insecure Default

[,80.0.3987.87)
  • H
Resource Management Errors

[0,40.0.2214.91)
  • M
Denial of Service (DoS)

[,40.0.2214.109)
  • M
Information Exposure

[,60.0.3112.78)
  • H
Use After Free

[0,)
  • H
Out-of-bounds Write

[,84.0.4147.89)
  • H
Information Exposure

[,64.0.3282.119)
  • M
Authentication Bypass

[,79.0.3945.79)
  • H
Use After Free

[,86.0.4240.75)
  • M
Incorrect Authorization

[,91.0.4472.77)
  • M
Improper Input Validation

[,73.0.3683.75)
  • M
Access Restriction Bypass

[,81.0.4044.92)
  • M
Authentication Bypass

[,77.0.3865.75)
  • C
Use After Free

[,67.0.3396.62)
  • M
User Impersonation

[,89.0.4389.72)
  • M
Resource Management Errors

[,23.0.1271.97)
  • M
Information Exposure

[,68.0.3440.75)
  • M
Access Restriction Bypass

[,63.0.3239.84)
  • M
Incorrect Type Conversion or Cast

[,60.0.3112.78)
  • M
Authentication Bypass

[,71.0.3578.80)
  • M
Authentication Bypass

[,83.0.4103.61)
  • H
Integer Overflow or Wraparound

[,66.0.3359.117)
  • H
Out-of-Bounds

[,23.0.1271.97)
  • H
Out-of-bounds Write

[,86.0.4240.185)
  • C
Improper Input Validation

[,84.0.4147.89)
  • H
Use After Free

[,40.0.2214.109)
  • H
Resource Management Errors

[,34.0.1847.130][34.0.1847.130,34.0.1847.137)
  • M
Resource Management Errors

[,24.0.1312.56)
  • H
Use After Free

[,32.0.1700.77)
  • H
Out-of-Bounds

[,70.0.3538.67)
  • H
Out-of-bounds Write

[,80.0.3987.162)
  • H
Access Restriction Bypass

[,80.0.3987.87)
  • H
Type Confusion

[,84.0.4147.89)
  • H
Integer Overflow or Wraparound

[,44.0.2403.89)
  • M
Improper Input Validation

[,59.0.3071.86)(59.0.3071.86,59.0.3071.92)
  • M
Information Exposure

[,72.0.3626.81)
  • H
Use After Free

[,93.0.4577.82)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Type Confusion

[,92.0.4515.159)
  • M
Resource Management Errors

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • H
Integer Overflow or Wraparound

[,86.0.4240.75)
  • H
Improper Access Control

[,53.0.2785.103)
  • H
Race Condition

[,87.0.4280.66)
  • M
Out-of-Bounds

[,27.0.1453.116)
  • M
Information Exposure

[,77.0.3865.75)
  • H
Improper Access Control

[,48.0.2564.97)
  • H
Out-of-Bounds

[,40.0.2214.109)
  • H
Incorrect Authorization

[,92.0.4515.107)
  • H
Out-of-bounds Write

[,79.0.3945.79)
  • C
Improper Input Validation

[,87.0.4280.66)
  • H
Use After Free

[,62.0.3202.89)
  • H
Improper Input Validation

[,33.0.1750.151][33.0.1750.151,33.0.1750.154)
  • M
Out-of-Bounds

[,53.0.2785.103)
  • H
Improper Input Validation

[,67.0.3396.62)
  • M
Denial of Service (DoS)

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • H
Denial of Service (DoS)

[,31.0.1650.63)
  • H
Use After Free

[,91.0.4472.114)
  • H
Out-of-bounds Read

[,81.0.4044.92)
  • M
Cross-site Scripting (XSS)

[,65.0.3325.146)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • H
Out-of-bounds Write

[,72.0.3626.81)
  • H
Out-of-bounds Write

[,92.0.4515.131)
  • H
Incorrect Calculation

[,76.0.3809.87)
  • H
Integer Overflow or Wraparound

[,53.0.2785.103)
  • M
Authentication Bypass

[,30.0.1599.101)
  • H
Out-of-Bounds

[,89.0.4389.72)
  • M
Improper Input Validation

[,63.0.3239.84)
  • M
Cross-site Scripting (XSS)

[,50.0.2661.75)
  • H
CVE-2020-6413

[,80.0.3987.87)
  • M
Insecure Default

[,83.0.4103.61)
  • H
Out-of-Bounds

[,53.0.2785.103)
  • H
Use After Free

[,91.0.4472.77)
  • H
Type Confusion

[,81.0.4044.92)
  • M
CVE-2018-17476

[,70.0.3538.67)
  • C
Denial of Service (DoS)

[,44.0.2403.89)
  • C
Access Restriction Bypass

[,49.0.2623.87)
  • H
Use After Free

[,81.0.4044.92)
  • H
Out-of-Bounds

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • M
Authentication Bypass

[,84.0.4147.89)
  • H
Out-of-bounds Write

[,85.0.4183.121)
  • M
Information Exposure

[,53.0.2785.103)
  • H
Use After Free

[0,)
  • M
Authentication Bypass

[,89.0.4389.72)
  • H
Denial of Service (DoS)

[,50.0.2661.75)
  • H
Use After Free

[,40.0.2214.109)
  • M
Security Features

[,65.0.3325.146)
  • H
Access Restriction Bypass

[,80.0.3987.87)
  • H
Out-of-Bounds

[,48.0.2564.97)
  • H
Denial of Service (DoS)

[,29.0.1547.57)
  • H
Use After Free

[,86.0.4240.75)
  • H
Type Confusion

[,90.0.4430.85)
  • H
Use After Free

[,80.0.3987.162)
  • L
Information Exposure

[0,)
  • M
Incorrect Authorization

[,92.0.4515.107)
  • H
Incorrect Type Conversion or Cast

[,61.0.3163.79)(61.0.3163.79,61.0.3163.81)
  • H
Out-of-bounds Write

[,70.0.3538.67)
  • H
Out-of-bounds Read

[,58.0.3029.81)(58.0.3029.81,58.0.3029.83)
  • H
Out-of-bounds Write

[,57.0.2987.75][57.0.2987.75,57.0.2987.132)
  • M
Denial of Service (DoS)

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • H
Improper Input Validation

[,76.0.3809.87)
  • M
Incorrect Authorization

[,90.0.4430.93)
  • H
Race Condition

[,19.0.1084.52)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Out-of-bounds Write

[,84.0.4147.89)
  • C
Use After Free

[,23.0.1271.97)
  • H
Access Restriction Bypass

[,19.0.1084.52)
  • M
Out-of-bounds Read

[,67.0.3396.62)
  • M
Out-of-bounds Read

[,79.0.3945.79)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Resource Management Errors

[,40.0.2214.109)
  • H
Use After Free

[,84.0.4147.89)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • M
Access Restriction Bypass

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • M
Use After Free

[,54.0.2840.100)
  • M
Information Exposure

[,85.0.4183.121)
  • H
Improper Input Validation

[,60.0.3112.78)
  • M
Information Exposure

[,49.0.2623.87)
  • H
Use After Free

[,58.0.3029.81)(58.0.3029.81,58.0.3029.83)
  • H
Use After Free

[,94.0.4606.54)
  • H
Resource Management Errors

[,44.0.2403.89)
  • H
Information Exposure

[,77.0.3865.75)
  • M
Arbitrary Code Execution

[,44.0.2403.89)
  • M
Cross-site Scripting (XSS)

[,53.0.2785.144)
  • H
Use After Free

[,77.0.3865.120)
  • H
Out-of-Bounds

[,40.0.2214.109)
  • M
Out-of-bounds Read

[,69.0.3497.81)
  • M
Improper Input Validation

[,20.0.1132.57)
  • H
Out-of-bounds Read

[,57.0.2987.133)
  • H
Use After Free

[,40.0.2214.109)
  • H
Resource Management Errors

[,33.0.1750.154)
  • H
Use After Free

[,92.0.4515.159)
  • M
Information Exposure

[,54.0.2840.98)
  • M
Authentication Bypass

[,85.0.4183.83)
  • H
Use After Free

[,91.0.4472.164)
  • C
Use After Free

[,81.0.4044.129)
  • M
Improper Input Validation

[,89.0.4389.72)
  • M
Improper Data Handling

[,66.0.3359.117)
  • H
CVE-2015-1211

[0,40.0.2214.111)
  • H
Improper Input Validation

[,80.0.3987.87)
  • M
Improper Input Validation

[,71.0.3578.80)
  • M
Improper Data Handling

[,68.0.3440.75)
  • H
Use After Free

[,92.0.4515.107)
  • M
Improper Input Validation

[,85.0.4183.83)
  • H
Use After Free

[,92.0.4515.159)
  • M
Out-of-Bounds

[,21.0.1180.56][21.0.1180.56,21.0.1180.89)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • H
Resource Management Errors

[,29.0.1547.57)
  • H
Out-of-bounds Read

[,62.0.3202.62)
  • H
Out-of-bounds Write

[,66.0.3359.117)
  • M
Out-of-Bounds

[,64.0.3282.119)
  • H
Denial of Service (DoS)

[,53.0.2785.103)
  • H
CVE-2020-16022

[,87.0.4280.66)
  • H
Race Condition

[,65.0.3325.146)
  • H
Security Features

[,44.0.2403.89)
  • M
User Impersonation

[,89.0.4389.72)
  • H
Resource Management Errors

[,20.0.1132.57)
  • M
Out-of-Bounds

[,24.0.1312.56)
  • M
CVE-2013-2853

[,29.0.1547.57)
  • H
Out-of-bounds Write

[,84.0.4147.89)
  • H
Out-of-Bounds

[,44.0.2403.89)
  • M
Improper Authentication

[,88.0.4324.96)
  • H
Code

[,40.0.2214.109)
  • M
Improper Input Validation

[,88.0.4324.96)
  • M
Out-of-Bounds

[,23.0.1271.97)
  • H
CVE-2013-0908

[,27.0.1453.116)
  • M
Improper Input Validation

[,80.0.3987.87)
  • C
Denial of Service (DoS)

[,48.0.2564.97)
  • M
Access Restriction Bypass

[,44.0.2403.89)
  • H
Use After Free

[0,)
  • M
Improper Input Validation

[,72.0.3626.81)
  • H
Out-of-Bounds

[,80.0.3987.162)
  • H
Out-of-bounds Write

[,78.0.3904.87)
  • H
Improper Input Validation

[,34.0.1847.130][34.0.1847.130,34.0.1847.137)
  • H
Out-of-bounds Write

[,84.0.4147.125)
  • H
Out-of-bounds Write

[,74.0.3729.108)
  • M
Out-of-Bounds

[,31.0.1650.63)
  • H
Use After Free

[0,)
  • C
Information Exposure

[,54.0.2840.98)
  • H
Out-of-bounds Write

[,78.0.3904.87)
  • L
CVE-2021-37964

[,94.0.4606.54)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • H
Security Features

[,54.0.2840.98)
  • M
Security Features

[,44.0.2403.89)
  • M
Improper Input Validation

[,59.0.3071.86)
  • H
Use After Free

[,23.0.1271.97)
  • M
Code

[,44.0.2403.89)
  • M
Access Restriction Bypass

[,71.0.3578.80)
  • C
Remote Code Execution (RCE)

[,40.0.2214.109)
  • M
Information Exposure

[,68.0.3440.75)
  • H
Out-of-Bounds

[,23.0.1271.97)
  • M
Access Restriction Bypass

[,40.0.2214.109)
  • H
Use After Free

[,85.0.4183.83)
  • H
Use After Free

[,85.0.4183.102)
  • H
Use After Free

[,90.0.4430.212)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • H
Out-of-Bounds

[,61.0.3163.79)
  • M
Use After Free

[,57.0.2987.132)
  • H
Denial of Service (DoS)

[,25.0.1364.95][25.0.1364.95,27.0.1453.116)
  • C
Use After Free

[,83.0.4103.61)
  • M
Improper Input Validation

[,73.0.3683.75)
  • H
Access Restriction Bypass

[,23.0.1271.97)
  • M
Code

[,48.0.2564.97)
  • M
Information Exposure

[,56.0.2924.67)
  • M
Information Exposure

[,83.0.4103.61)
  • H
Out-of-bounds Write

[,90.0.4430.212)
  • H
Use After Free

[,84.0.4147.125)
  • H
Use After Free

[,80.0.3987.116)
  • H
Use After Free

[,91.0.4472.164)
  • H
Use After Free

[,89.0.4389.90)
  • M
Improper Input Validation

[,72.0.3626.81)
  • H
Use After Free

[,92.0.4515.107)
  • M
Information Exposure

[,27.0.1453.116)
  • C
Use After Free

[,77.0.3865.75)
  • M
Security Features

[,44.0.2403.89)
  • M
Authentication Bypass

[,71.0.3578.80)
  • M
Information Exposure

[,61.0.3163.79)(61.0.3163.79,61.0.3163.81)
  • M
Information Exposure

[,83.0.4103.61)
  • H
Use After Free

[,84.0.4147.125)
  • M
Improper Input Validation

[,36.0.1985.143)
  • M
Denial of Service (DoS)

[,44.0.2403.89)
  • M
NULL Pointer Dereference

[,56.0.2924.67)
  • H
Out-of-Bounds

[,40.0.2214.109)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • M
Race Condition

[,48.0.2564.97)
  • H
Buffer Overflow

[,25.0.1364.97)(25.0.1364.97,25.0.1364.99)
  • H
Cryptographic Issues

[,37.0.2062.103)[37.0.2062.103,40.0.2214.109)
  • H
Out-of-Bounds

[,44.0.2403.89)
  • C
Out-of-Bounds

[,23.0.1271.97)
  • H
Denial of Service (DoS)

[0,48.0.2564.82)
  • C
Denial of Service (DoS)

[,49.0.2623.87)
  • H
Denial of Service (DoS)

[,36.0.1985.143)
  • H
Out-of-Bounds

[,31.0.1650.63)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • C
Denial of Service (DoS)

[,33.0.1750.154)
  • H
Denial of Service (DoS)

[,40.0.2214.109)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Out-of-Bounds

[,53.0.2785.103)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Out-of-Bounds

[,23.0.1271.97)
  • H
Denial of Service (DoS)

[,33.0.1750.154)
  • M
Information Exposure

[,53.0.2785.103)
  • H
Out-of-Bounds

[,23.0.1271.97)
  • H
Denial of Service (DoS)

[,48.0.2564.97)
  • M
Resource Management Errors

[,24.0.1312.56)
  • C
Denial of Service (DoS)

[,48.0.2564.97)
  • H
Denial of Service (DoS)

[,50.0.2661.75)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • H
Out-of-Bounds

[,31.0.1650.63)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Denial of Service (DoS)

[,27.0.1453.116)
  • H
Denial of Service (DoS)

[,40.0.2214.110)
  • H
Denial of Service (DoS)

[,44.0.2403.89)
  • M
Out-of-Bounds

[,53.0.2785.103)
  • H
Security Features

[0,52.0.2743.82)
  • H
Out-of-Bounds

[,53.0.2785.103)
  • H
Out-of-Bounds

[,31.0.1650.63)
  • H
Use After Free

[,96.0.4664.93)
  • H
Heap-based Buffer Overflow

[,96.0.4664.93)
  • M
Integer Overflow or Wraparound

[,63.0.3239.84)
  • H
Code

[,40.0.2214.109)
  • M
Out-of-Bounds

[,62.0.3202.75)
  • H
Resource Management Errors

[,40.0.2214.109)
  • C
Out-of-Bounds

[,40.0.2214.109)
  • H
Integer Overflow or Wraparound

[,10.21.0)[80.0.0.122,80.0.3987.122)
  • H
Code

[,40.0.2214.109)
  • H
Integer Overflow or Wraparound

[,71.0.3578.80)