Use After Free | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Improper Verification of Cryptographic Signature | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Authentication Bypass | |
Use After Free | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
CVE-2021-29983 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Certificate Validation | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | [preview_release,1.5.0.1] |
Unsafe Dependency Resolution | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
Integer Overflow or Wraparound | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2005-2260 | |
Use After Free | [10.0,10.0.11)(10.0.11,17.0) |
Cross-site Scripting (XSS) | |
Improper Authentication | [2.0,2.0.0.18)[3.0,3.0.4) |
Denial of Service (DoS) | |
Out-of-Bounds | |
Type Confusion | |
Out-of-Bounds | |
Out-of-bounds Read | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Arbitrary Code Execution | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Information Exposure | |
Use After Free | |
Resource Management Errors | |
Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Denial of Service (DoS) | |
Improper Access Control | |
CVE-2005-0588 | |
Arbitrary Code Injection | |
Cross-site Request Forgery (CSRF) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Authentication Bypass | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Out-of-bounds Read | |
Resource Management Errors | |
Resource Management Errors | |
Unsafe Dependency Resolution | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Access Restriction Bypass | |
Resource Management Errors | [2.0,2.0.0.19)[3.0,3.0.5) |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Denial of Service (DoS) | |
Use After Free | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
Use of Uninitialized Resource | |
Out-of-Bounds | |
Access Restriction Bypass | [,31.5][31.5,31.5.3][31.5.3,37.0) |
Race Condition | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Information Exposure | |
Arbitrary Code Execution | |
CVE-2005-0145 | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Deserialization of Untrusted Data | |
Access Restriction Bypass | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Use After Free | |
Arbitrary Code Execution | |
Denial of Service (DoS) | [2.0,2.0.0.18)[3.0,3.0.4) |
CVE-2006-1727 | |
Out-of-Bounds | |
Improper Input Validation | |
Remote Code Execution (RCE) | |
Security Features | |
Security Features | |
Access Restriction Bypass | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2013-0797 | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Cryptographic Issues | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Resource Management Errors | |
Use of Uninitialized Resource | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Arbitrary Code Execution | |
Security Features | |
Resource Management Errors | |
Resource Management Errors | |
Arbitrary Code Execution | |
Release of Invalid Pointer or Reference | |
CVE-2008-5503 | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Resource Management Errors | [,31.6][31.6,37.0.2][37.0.2,38.0.1) |
Resource Management Errors | [2.0,2.0.0.18)[3.0,3.0.4) |
Denial of Service (DoS) | |
Out-of-Bounds | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Information Exposure | |
Buffer Overflow | |
Improper Input Validation | |
Argument Injection | |
Denial of Service (DoS) | |
CVE-2012-4206 | |
Denial of Service (DoS) | [,31.5][31.5,31.5.3][31.5.3,37.0) |
Out-of-Bounds | |
Cross-site Scripting (XSS) | [10.0,10.0.11)(10.0.11,17.0) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Use After Free | |
Security Features | |
Incorrect Calculation | |
Improper Input Validation | |
Resource Management Errors | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Handling of Exceptional Conditions | |
Out-of-Bounds | |
Information Exposure | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Improper Input Validation | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Access Restriction Bypass | |
Insufficiently Protected Credentials | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-bounds Write | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Resource Management Errors | |
Memory Leak | |
Security Features | |
Cross-site Scripting (XSS) | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-bounds Write | |
Directory Traversal | |
Incorrect Authorization | |
Resource Management Errors | [2.0,2.0.0.18)[3.0,3.0.4) |
Improper Input Validation | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
Arbitrary Code Injection | |
Information Exposure | |
CVE-2015-0833 | |
CVE-2005-2602 | |
Improper Input Validation | |
Information Exposure | |
CVE-2006-2786 | |
Arbitrary Code Injection | |
Information Exposure | |
Resource Management Errors | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Information Exposure | |
Use After Free | |
Access Restriction Bypass | [,31.5][31.5,31.5.3][31.5.3,37.0) |
CVE-2004-0909 | |
Type Confusion | |
User Impersonation | |
Denial of Service (DoS) | |
Buffer Overflow | |
Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2012-1943 | |
Information Exposure | |
Arbitrary Code Execution | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Information Exposure | [1.5,1.5.0.10)[2.0,2.0.0.2) |
Cross-site Scripting (XSS) | |
Use After Free | |
Improper Input Validation | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-Bounds | |
Remote Code Execution (RCE) | |
Resource Management Errors | |
Information Exposure | |
Resource Management Errors | |
Access Restriction Bypass | |
Use After Free | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Code | |
Information Exposure | |
CVE-2009-2471 | |
Remote Code Execution (RCE) | [,3.6.22][3.6.22,6.0][6.0,7.0) |
Use After Free | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Buffer Overflow | |
Privilege Escalation | |
Missing Initialization of Resource | |
Improper Input Validation | |
Arbitrary Code Execution | |
Insecure Default | |
Resource Management Errors | |
Access Restriction Bypass | [1.0,3.1.19][3.1.19,3.6.28)(4.0,5.0)(5.0,10.0.1) |
Out-of-Bounds | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Remote Code Execution (RCE) | |
Resource Management Errors | [2.0,2.0.0.19)[3.0,3.0.5) |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Privilege Escalation | |
Buffer Overflow | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Out-of-Bounds | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Resource Management Errors | [1.0,1.0.8)(1.0.8,1.5.0.1) |
Out-of-Bounds | |
Resources Downloaded over Insecure Protocol | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
Race Condition | |
Remote Code Execution (RCE) | [1.5,1.5.0.10)[2.0,2.0.0.2) |
Use After Free | |
Out-of-bounds Write | [,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0) |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Access Control | |
Security Features | |
Resource Management Errors | |
Out-of-Bounds | |
Information Exposure | |
Resource Management Errors | |
Code | |
Use After Free | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Access Control | |
Access Restriction Bypass | |
Access Restriction Bypass | |
User Enumeration | |
Denial of Service (DoS) | |
Resource Management Errors | [1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1) |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-bounds Read | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Use After Free | [,78.4.1)(78.4.1,78.4.2)(78.4.2,82.0.3) |
Out-of-bounds Read | |
Resource Management Errors | |
Arbitrary Code Execution | |
Authentication Bypass | |
CVE-2006-1942 | |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Information Exposure | |
Use After Free | |
Cross-site Scripting (XSS) | [10.0,10.0.11)(10.0.11,17.0) |
Use After Free | |
Resource Management Errors | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Security Features | |
Access Restriction Bypass | |
User Impersonation | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Authentication Bypass | |
Out-of-Bounds | |
Release of Invalid Pointer or Reference | |
Use After Free | |
Authentication Bypass | |
Use After Free | |
Information Exposure | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Remote Code Execution (RCE) | |
Improper Input Validation | |
User Impersonation | [,68.11)[78.0,78.1)(78.1,79.0) |
Improper Verification of Cryptographic Signature | |
CVE-2020-12412 | |
Denial of Service (DoS) | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2005-4685 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Out-of-Bounds | [52.0,52.1.0)(52.1.0,52.3)(52.3,55.0) |
Out-of-bounds Write | |
Security Features | |
Cross-site Scripting (XSS) | |
Use After Free | |
CVE-2018-12403 | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
User Impersonation | |
Arbitrary Code Execution | |
Cryptographic Issues | |
Insufficient Verification of Data Authenticity | |
Use After Free | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Access Restriction Bypass | |
Improper Access Control | |
Access Restriction Bypass | |
Use After Free | |
Cross-site Scripting (XSS) | [2.0,2.0.0.19)[3.0,3.0.5) |
Improper Preservation of Permissions | |
Out-of-bounds Write | |
Out-of-Bounds | |
Use After Free | |
Directory Traversal | |
CVE-2009-0253 | |
CVE-2009-3370 | |
Remote Code Execution (RCE) | |
Cross-site Request Forgery (CSRF) | |
Authentication Bypass | [0,firefox-1.5.0.12-4.fc6) |
Access Restriction Bypass | |
Out-of-bounds Write | |
Improper Restriction of Rendered UI Layers or Frames | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Remote Code Execution (RCE) | [1.5,1.5.0.9)[2.0,2.0.0.1) |
Cross-site Scripting (XSS) | |
Cryptographic Issues | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Use After Free | |
CVE-2021-23960 | |
Denial of Service (DoS) | |
Out-of-bounds Write | [10.0,10.0.7)(10.0.7,15.0) |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-Bounds | [,52.9)[53.0,60.1)(60.1,61.0) |
Information Exposure | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | [10.0,10.0.7)(10.0.7,15.0) |
Arbitrary Code Execution | |
User Impersonation | [10.0,10.0.9)(10.0.9,16.0.1) |
Out-of-Bounds | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | [10.0,10.0.11)(10.0.11,17.0) |
Use After Free | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Input Validation | |
Security Features | |
Improper Validation of Array Index | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Code | |
Arbitrary Code Execution | |
User Enumeration | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
Insecure Encryption | [,17.0.11)[24.1.0,24.1.1)(24.1.1,25.0.1) |
Improper Access Control | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Type Confusion | |
Use After Free | |
Arbitrary Code Execution | |
Improper Input Validation | [1.0,3.1.19][3.1.19,3.6.28)(4.0,5.0)(5.0,10.0.1) |
Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Information Exposure | |
User Impersonation | |
Cross-site Scripting (XSS) | [1.5,1.5.0.10)[2.0,2.0.0.2) |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Authentication Bypass | |
Remote Code Execution (RCE) | |
Untrusted Search Path | |
Out-of-Bounds | |
Open Redirect | |
Access Restriction Bypass | |
Resource Management Errors | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2019-11711 | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Incorrect Type Conversion or Cast | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
CVE-2021-29974 | |
Security Features | |
Use of Uninitialized Resource | |
Information Exposure | |
Improper Access Control | |
CVE-2004-1449 | |
Out-of-bounds Write | |
Information Exposure | |
Security Features | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Out-of-Bounds | [1.5,1.5.0.10)[2.0,2.0.0.2) |
Information Exposure | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Authentication Bypass | |
Denial of Service (DoS) | [,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0) |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
CVE-2021-23962 | |
Out-of-Bounds | |
Insecure Permissions | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
CVE-2020-26967 | |
CVE-2013-0774 | |
Information Exposure | |
Denial of Service (DoS) | |
CVE-2005-2263 | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | [,52.9)[53.0,60.1.0)(60.1.0,61.0) |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Authentication Bypass | |
Security Features | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Access Control | |
Integer Overflow or Wraparound | [,60.0)(60.0,60.1)(60.1,61.0) |
Denial of Service (DoS) | |
Authentication Bypass | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Use After Free | |
Improper Authentication | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Resource Management Errors | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Insufficiently Protected Credentials | |
Improper Input Validation | |
Access Restriction Bypass | |
Privilege Escalation | |
Access Restriction Bypass | |
Use After Free | |
Privilege Escalation | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
CVE-2007-3827 | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | [,2.0.0.20][2.0.0.20,3.0.7) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
Improper Access Control | |
Out-of-bounds Write | |
Remote Code Execution (RCE) | |
Use of a Risky Cryptographic Algorithm | |
Directory Traversal | |
Information Exposure | |
Security Features | |
Cross-site Scripting (XSS) | |
Use After Free | [10.0,10.0.11)(10.0.11,17.0) |
Improper Check for Unusual or Exceptional Conditions | |
Improper Input Validation | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Access Control | |
Cross-site Scripting (XSS) | |
Use After Free | |
Information Exposure | |
Arbitrary Code Execution | |
Resource Management Errors | |
Out-of-Bounds | |
Symlink Attack | |
Out-of-bounds Write | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-bounds Read | |