mozilla vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://ftp.mozilla.org|mozilla package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

[0,)
  • M
Cross-site Scripting (XSS)

[,3.1.5][3.1.5,3.6.24)
  • L
Cross-site Scripting (XSS)

[,1.5.0.7)
  • C
Out-of-Bounds

[,43.0)
  • M
Access Restriction Bypass

[,1.5.0.4)
  • C
Out-of-Bounds

[,8.0)
  • M
Information Exposure

[,2.0.0.17)
  • M
Improper Verification of Cryptographic Signature

[,78.9.1)
  • H
Out-of-Bounds

[,16.0)
  • H
Improper Input Validation

[,3.0.10][3.0.10,3.5.16)
  • H
Out-of-Bounds

[,60.0)
  • M
Improper Input Validation

[,31.2][31.2,33.0.1)
  • M
Information Exposure

[,52.9.0)
  • C
Out-of-Bounds

[,60.6.0)(60.6.0,66.0)
  • M
Information Exposure

[,88.0)
  • H
Out-of-Bounds

[,65.0)
  • M
Authentication Bypass

[0,)
  • C
Use After Free

[,52.2.0)(52.2.0,54.0)
  • C
Improper Input Validation

[,68.8.0)(68.8.0,76.0)
  • M
Cross-site Scripting (XSS)

[,3.0.6][3.0.6,3.5.12)
  • M
CVE-2021-29983

[,91.0)
  • M
Access Restriction Bypass

[,3.0.6)
  • C
Denial of Service (DoS)

[3.5.1,3.5.3]
  • C
Denial of Service (DoS)

[,30.0)
  • M
Improper Certificate Validation

[,17.0.3)(17.0.3,19.0)
  • M
Cross-site Scripting (XSS)

[4.0,12.0]
  • C
Denial of Service (DoS)

[,17.0.6][17.0.6,22.0)
  • M
Information Exposure

[,52.2.0)(52.2.0,54.0)
  • C
Out-of-Bounds

[,51.0)
  • M
Information Exposure

[,58)
  • C
Arbitrary Code Execution

[,38.0.1][38.0.1,38.1)
  • L
Access Restriction Bypass

[0.8,1.0]
  • L
Access Restriction Bypass

[,3.6.22][3.6.22,7.0)
  • M
Improper Input Validation

[,3.0.14)
  • H
Denial of Service (DoS)

[preview_release,1.5.0.1]
  • M
Unsafe Dependency Resolution

[,60.9.0)[68.0,68.1.0)(68.1.0,69.0)
  • H
Integer Overflow or Wraparound

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Access Restriction Bypass

[,17.0)
  • M
Cross-site Scripting (XSS)

[4.0,11.0]
  • C
Out-of-Bounds

[,14.0.1)
  • C
Out-of-Bounds

[,45.7.0)(45.7.0,51.0.1)
  • H
CVE-2005-2260

[0.8,1.0.4]
  • H
Use After Free

[10.0,10.0.11)(10.0.11,17.0)
  • M
Cross-site Scripting (XSS)

[,17.0.7][17.0.7,23.0)
  • H
Improper Authentication

[2.0,2.0.0.18)[3.0,3.0.4)
  • C
Denial of Service (DoS)

[,2.0.0.17)[3.0,3.0.2)
  • H
Out-of-Bounds

[,32.0.1)
  • H
Type Confusion

[,68.4.1)(68.4.1,72.0.1)
  • C
Out-of-Bounds

[,50.0)
  • C
Out-of-bounds Read

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Arbitrary Code Execution

[0.8,1.0]
  • M
Cross-site Scripting (XSS)

[4.0,9.0]
  • M
Out-of-Bounds

[,87.0)
  • H
Denial of Service (DoS)

[,3.0.6][3.0.6,3.5.12)
  • M
Information Exposure

[,3.5.19)
  • C
Use After Free

[,31.1)
  • H
Resource Management Errors

[,3.0.6][3.0.6,3.5.12)
  • H
Use After Free

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • C
Denial of Service (DoS)

[,17.0.5][17.0.5,21.0)
  • H
Improper Access Control

[,49.0)
  • M
CVE-2005-0588

[0.8,1.0]
  • M
Arbitrary Code Injection

[,68.0)
  • H
Cross-site Request Forgery (CSRF)

[,61.0)
  • C
Denial of Service (DoS)

[,3.0.12)
  • C
Out-of-Bounds

[,50.1)
  • M
Improper Input Validation

[,43.0)
  • M
Improper Input Validation

[,60.0)
  • M
Authentication Bypass

[,68.0)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • H
Out-of-bounds Read

[,78.11)(78.11,89.0)
  • C
Resource Management Errors

[,2.0.0.20)
  • H
Resource Management Errors

[,3.5.5]
  • H
Unsafe Dependency Resolution

[,71.0)
  • C
Out-of-Bounds

[,68.8.0)(68.8.0,76.0)
  • M
Cross-site Scripting (XSS)

[,60.0)
  • H
Denial of Service (DoS)

[1.5,1.5.0.4]
  • M
Cross-site Scripting (XSS)

[,1.5.0.4)
  • C
Remote Code Execution (RCE)

[24.0,24.2)(24.2,26.0)
  • M
Access Restriction Bypass

[,37.0)
  • M
Resource Management Errors

[2.0,2.0.0.19)[3.0,3.0.5)
  • M
Access Restriction Bypass

[,60.3)(60.3,63.0)
  • H
Out-of-Bounds

[,40.0)
  • C
Out-of-bounds Write

[,27.0)
  • H
Use After Free

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • H
Denial of Service (DoS)

[,56.0)
  • H
Use After Free

[,60.9.0)[68.0,68.1.0)(68.1.0,69.0)
  • M
Use of Uninitialized Resource

[,68.5.0)
  • M
Out-of-Bounds

[,43.0)
  • M
Access Restriction Bypass

[,31.5][31.5,31.5.3][31.5.3,37.0)
  • M
Race Condition

[,45.0)
  • M
Cross-site Scripting (XSS)

[,2.0]
  • H
Information Exposure

[,85.0)
  • M
Cross-site Scripting (XSS)

[4.0,4.0.1]
  • C
Denial of Service (DoS)

[,24.0][24.0,24.1)
  • M
Information Exposure

[,72.0)
  • M
Arbitrary Code Execution

[,1.5.0.9]
  • L
CVE-2005-0145

[0.8,1.0]
  • M
Out-of-Bounds

[,24.0][24.0,24.1)
  • H
Arbitrary Code Execution

[,43.0)
  • C
Deserialization of Untrusted Data

[,76.0)
  • M
Access Restriction Bypass

[,2.0.0.5)
  • H
Out-of-Bounds

[,42.0)
  • M
Cross-site Scripting (XSS)

[,2.0.0.12)
  • H
Out-of-bounds Write

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Use After Free

[,68.9.0)(68.9.0,77.0)
  • M
Arbitrary Code Execution

[,1.0]
  • C
Denial of Service (DoS)

[2.0,2.0.0.18)[3.0,3.0.4)
  • H
CVE-2006-1727

[1.0,1.0.8)[1.5,1.5.0.2)
  • H
Out-of-Bounds

[,24.0)
  • M
Improper Input Validation

[4.0,13.0]
  • H
Remote Code Execution (RCE)

[,3.0]
  • M
Security Features

[,42.0)
  • M
Security Features

[,41.0)
  • M
Access Restriction Bypass

[,3.1.10][3.1.10,3.6.18)
  • M
Information Exposure

[,78.8)(78.8,86.0)
  • C
Out-of-Bounds

[,52.8.0)(52.8.0,60.0)
  • H
Denial of Service (DoS)

[,25.0.1)
  • C
Use After Free

[,49.0.2)
  • M
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • M
Denial of Service (DoS)

[,2.0.0.19)
  • C
Integer Overflow or Wraparound

[,52.0.1)
  • H
Arbitrary Code Execution

[,78.9.1)
  • H
Denial of Service (DoS)

[,3.0.6][3.0.6,3.5.12)
  • C
Denial of Service (DoS)

[,3.6.22][3.6.22,7.0)
  • H
CVE-2013-0797

[,20.0)
  • C
Denial of Service (DoS)

[,20.0)
  • M
Out-of-bounds Read

[,49.0)
  • M
Cryptographic Issues

[,32.0.1)
  • M
Access Restriction Bypass

[,74.0)
  • H
Integer Overflow or Wraparound

[,47.0.2)
  • C
Denial of Service (DoS)

[4.0,8.0]
  • C
Out-of-Bounds

[,56.0)
  • M
Out-of-Bounds

[,3.1.10][3.1.10,3.6.18)
  • H
Out-of-Bounds

[,41.0)
  • M
NULL Pointer Dereference

[,68.5.0)
  • M
Resource Management Errors

[3.0.19,3.6]
  • H
Use of Uninitialized Resource

[,60.0)
  • C
Use After Free

[,17.0)
  • H
Improper Input Validation

[,3.1.5][3.1.5,3.6.24)
  • H
Improper Input Validation

[,17.0.6][17.0.6,22.0)
  • H
Arbitrary Code Execution

[,14.0.1)
  • M
Security Features

[,45.8.0)(45.8.0,52.0)
  • C
Resource Management Errors

[,3.6.7]
  • C
Resource Management Errors

[,3.5.19)
  • C
Arbitrary Code Execution

[0.6,0.9.3]
  • H
Release of Invalid Pointer or Reference

[,78.3)(78.3,81.0)
  • L
CVE-2008-5503

[,2.0.0.19)
  • H
Out-of-Bounds

[,58)
  • M
Cross-site Scripting (XSS)

[,69.0)
  • M
Improper Input Validation

[,3.5.2)
  • M
Cross-site Scripting (XSS)

[,88.0)
  • C
Resource Management Errors

[,31.6][31.6,37.0.2][37.0.2,38.0.1)
  • C
Resource Management Errors

[2.0,2.0.0.18)[3.0,3.0.4)
  • M
Denial of Service (DoS)

[,45.0)
  • C
Out-of-Bounds

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • M
Information Exposure

[,41.0)
  • H
Buffer Overflow

[,68.3)(68.3,71.0)
  • M
Improper Input Validation

[3.0,3.0.1]
  • H
Argument Injection

[,68.1.0)(68.1.0,69.0)
  • C
Denial of Service (DoS)

[,3.0.12)
  • H
CVE-2012-4206

[,17.0)
  • H
Denial of Service (DoS)

[,31.5][31.5,31.5.3][31.5.3,37.0)
  • C
Out-of-Bounds

[,64.0)
  • M
Cross-site Scripting (XSS)

[10.0,10.0.11)(10.0.11,17.0)
  • H
Denial of Service (DoS)

[,3.0.5)
  • M
Access Restriction Bypass

[4.0,4.0.1]
  • H
Use After Free

[,51.0)
  • M
Security Features

[,36.0)
  • M
Incorrect Calculation

[,78.10)(78.10,88.0)
  • C
Improper Input Validation

[,60.6.0)(60.6.0,66.0)
  • C
Resource Management Errors

[,3.0.12)
  • M
Improper Cross-boundary Removal of Sensitive Data

[,78.5)(78.5,83.0)
  • H
Improper Handling of Exceptional Conditions

[,60.7.0)(60.7.0,67.0)
  • H
Out-of-Bounds

[,20.0)
  • M
Information Exposure

[,8.0)
  • H
Resource Management Errors

[,3.0.8)
  • M
Access Restriction Bypass

[4.0,10.2]
  • H
Out-of-bounds Read

[,29.0)
  • M
Improper Input Validation

[,47.0.2)
  • M
Information Exposure

[,52.7.0)(52.7.0,59.0)
  • M
Cross-site Scripting (XSS)

[,52.1.0)(52.1.0,53.0)
  • M
Information Exposure

[,61.0)
  • H
Access Restriction Bypass

[,36.0.4)
  • M
Insufficiently Protected Credentials

[,68.5.0)
  • H
Out-of-Bounds

[4.0,13.0]
  • H
Denial of Service (DoS)

[,1.5.0.2)
  • M
Resource Management Errors

[,1.5.0.2]
  • H
Out-of-Bounds

[,47.0)
  • H
Out-of-bounds Write

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Resource Management Errors

[,3.0.3][3.0.3,3.0.18)
  • M
Memory Leak

[,91.0)
  • M
Security Features

[,52.6.0)(52.6.0,58.0)
  • M
Cross-site Scripting (XSS)

[1.5,1.5.0.4]
  • M
Arbitrary Code Execution

[0.8,0.9.3]
  • H
Denial of Service (DoS)

[,17.0.3)(17.0.3,19.0)
  • C
Use After Free

[,52.2.0)(52.2.0,54.0)
  • H
Out-of-bounds Write

[,90.0)
  • M
Directory Traversal

[,28.0)
  • H
Incorrect Authorization

[,60.3)(60.3,63.0)
  • H
Resource Management Errors

[2.0,2.0.0.18)[3.0,3.0.4)
  • H
Improper Input Validation

[,52.7.0)(52.7.0,59.0)
  • H
Denial of Service (DoS)

[0.8,2.0.0.9]
  • M
Resource Management Errors

[,2.0.0.13)
  • H
Use After Free

[,78.0)
  • H
Arbitrary Code Injection

[,68.6.0)(68.6.0,74.0)
  • M
Information Exposure

[,59.0)
  • H
CVE-2015-0833

[,31.4][31.4,36.0)
  • L
CVE-2005-2602

[1.0,1.0.6]
  • H
Improper Input Validation

[0,)
  • M
Information Exposure

[,47.0.2)
  • L
CVE-2006-2786

[,1.5.0.4)
  • M
Arbitrary Code Injection

[,52.5.2)
  • M
Information Exposure

[4.0,9.0]
  • H
Resource Management Errors

[,17.0.6][17.0.6,22.0)
  • M
Access Restriction Bypass

[,14.0.1)
  • C
Denial of Service (DoS)

[,40.0)
  • H
Improper Input Validation

[,60.2.1)(60.2.1,62.0.2)
  • H
Denial of Service (DoS)

[3.6,3.7]
  • C
Arbitrary Code Execution

[,24.0][24.0,24.1)
  • C
Arbitrary Code Execution

[,38.1)
  • H
Information Exposure

[,58)
  • C
Use After Free

[,52.2.0)(52.2.0,54.0)
  • H
Access Restriction Bypass

[,31.5][31.5,31.5.3][31.5.3,37.0)
  • M
CVE-2004-0909

[0.1,0.7.2]
  • H
Type Confusion

[,78.1)(78.1,79.0)
  • M
User Impersonation

[,74.0)
  • H
Denial of Service (DoS)

[,29.0)
  • H
Buffer Overflow

[,81.0)
  • C
Use After Free

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • C
Denial of Service (DoS)

[24.0,24.3)(24.3,27.0)
  • H
Denial of Service (DoS)

[3.0,3.6.6]
  • C
Out-of-bounds Read

[,52.2.0)(52.2.0,54.0)
  • C
Use After Free

[24.0,24.4)(24.4,28.0)
  • H
Out-of-Bounds

[,68.7.0)
  • M
Out-of-Bounds

[,36.0)
  • H
CVE-2012-1943

[,12.0]
  • M
Information Exposure

[,47.0.2)
  • H
Arbitrary Code Execution

[,38.6.0][38.6.0,45.0)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • M
Cross-site Scripting (XSS)

[,68.4)(68.4,72.0)
  • H
Out-of-Bounds

[,45.0)
  • M
Information Exposure

[1.5,1.5.0.10)[2.0,2.0.0.2)
  • M
Cross-site Scripting (XSS)

[,14.0.1)
  • H
Use After Free

[,68.6.0)(68.6.0,74.0)
  • M
Improper Input Validation

[,47.0.2)
  • M
Denial of Service (DoS)

[0.1,1.0]
  • H
Access Restriction Bypass

[,14.0.1)
  • H
Improper Input Validation

[,17.0.2)(17.0.2,18.0)
  • H
Denial of Service (DoS)

[,45.0)
  • M
Improper Input Validation

[,3.0.11)
  • M
Out-of-Bounds

[,60.6)(60.6,66.0)
  • H
Remote Code Execution (RCE)

[,68.3)(68.3,71.0)
  • M
Resource Management Errors

[,3.0.2)
  • M
Information Exposure

[,52.9.0)
  • H
Resource Management Errors

[,51.0)
  • M
Access Restriction Bypass

[,31.0)
  • C
Use After Free

[24.0,24.2)(24.2,26.0)
  • C
Out-of-Bounds

[,60.4.0)(60.4.0,64.0)
  • M
Improper Input Validation

[,3.5.17)
  • H
Out-of-Bounds

[,41.0)
  • M
Code

[,38.0)
  • M
Information Exposure

[,26.0)
  • C
CVE-2009-2471

[,3.0.12)
  • H
Remote Code Execution (RCE)

[,3.6.22][3.6.22,6.0][6.0,7.0)
  • C
Use After Free

[,52.8.0)(52.8.0,60.0)
  • M
Denial of Service (DoS)

[0.8,1.0.4]
  • C
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • H
Out-of-Bounds

[,42.0)
  • H
Buffer Overflow

[0,)
  • C
Privilege Escalation

[,75.0)
  • H
Missing Initialization of Resource

[,78.13.0)(78.13.0,91.0)
  • M
Improper Input Validation

[,31.2][31.2,33.0.1)
  • H
Arbitrary Code Execution

[0.1,1.5.0.3]
  • M
Insecure Default

[,78.0)
  • C
Resource Management Errors

[,1.0.7]
  • M
Access Restriction Bypass

[1.0,3.1.19][3.1.19,3.6.28)(4.0,5.0)(5.0,10.0.1)
  • M
Out-of-Bounds

[,38.6.0][38.6.0,45.0)
  • C
Out-of-bounds Write

[,26.0)
  • M
Cross-site Scripting (XSS)

[,3.0.9)
  • M
Cross-site Scripting (XSS)

[,24.0)
  • H
Use After Free

[,90.0)
  • C
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • H
Out-of-Bounds

[4.0,11.0]
  • M
Remote Code Execution (RCE)

[,2.0.0.13)
  • C
Resource Management Errors

[2.0,2.0.0.19)[3.0,3.0.5)
  • H
Out-of-Bounds

[,52.5.2)(52.5.2,57.0.2)
  • H
Out-of-Bounds

[,47.0.2)
  • M
Information Exposure

[,80.0)
  • H
Privilege Escalation

[,16.0)
  • C
Buffer Overflow

[,68.1.0)(68.1.0,69.0)
  • H
Improper Input Validation

[,1.0.8)
  • H
Access Restriction Bypass

[,60.0)
  • H
Out-of-bounds Write

[24.0,24.3)(24.3,27.0)
  • C
Denial of Service (DoS)

[,3.0.14)
  • C
Out-of-Bounds

[,60.9.0)[68.0,68.1.0)(68.1.0,69.0)
  • H
Resource Management Errors

[4.0,12.0]
  • H
Out-of-Bounds

[,41.0)
  • H
Out-of-Bounds

[,52.0)
  • H
Denial of Service (DoS)

[3.6,3.6.3]
  • M
Cross-site Scripting (XSS)

[,40.0)
  • H
Resource Management Errors

[1.0,1.0.8)(1.0.8,1.5.0.1)
  • H
Out-of-Bounds

[,60.8.0)(60.8.0,68.0)
  • M
Resources Downloaded over Insecure Protocol

[,60.9.0)[68.0,68.1.0)
  • H
Denial of Service (DoS)

[,2.0.0.22)
  • M
Denial of Service (DoS)

[,36.0)
  • M
Access Restriction Bypass

[,3.1.16][3.1.16,3.6.25)
  • L
Information Exposure

[,51.0)
  • H
Access Restriction Bypass

[,22.0)
  • M
Race Condition

[,40.0)
  • M
Remote Code Execution (RCE)

[1.5,1.5.0.10)[2.0,2.0.0.2)
  • C
Use After Free

[,52.8.0)(52.8.0,60.0)
  • H
Out-of-bounds Write

[,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0)
  • C
Denial of Service (DoS)

[3.6,3.6.22]
  • C
Out-of-Bounds

[,16.0)
  • M
Improper Access Control

[,63.0)
  • M
Security Features

[,42.0)
  • H
Resource Management Errors

[3.5,3.5.9]
  • C
Out-of-Bounds

[,52.3.0)(52.3.0,55.0)
  • L
Information Exposure

[,29.0)
  • H
Resource Management Errors

[,3.5.16)
  • H
Code

[,38.0.1][38.0.1,38.1)
  • C
Use After Free

[24.0,24.2)(24.2,26.0)
  • H
Out-of-bounds Write

[,17.0.2)(17.0.2,18.0)
  • H
Denial of Service (DoS)

[,1.0.7)
  • C
Out-of-Bounds

[,5.0.1)
  • M
Improper Access Control

[,47.0)
  • H
Access Restriction Bypass

[,19.0)
  • M
Access Restriction Bypass

[,29.0)
  • M
User Enumeration

[,68.9.0)(68.9.0,77.0)
  • C
Denial of Service (DoS)

[,21.0)
  • H
Resource Management Errors

[1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1)
  • M
Arbitrary Code Execution

[0.1,0.7.2]
  • M
Denial of Service (DoS)

[0,1.0.6-0.6.2.fc6)
  • C
Denial of Service (DoS)

[,3.1.7][3.1.7,3.5.17)
  • C
Out-of-bounds Read

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Use After Free

[,78.4.1)(78.4.1,78.4.2)(78.4.2,82.0.3)
  • C
Out-of-bounds Read

[,65.0)
  • C
Resource Management Errors

[4.0,13.0]
  • C
Arbitrary Code Execution

[,45.0)
  • M
Authentication Bypass

[,3.0.16)
  • M
CVE-2006-1942

[,1.5.0.2]
  • M
Cross-site Scripting (XSS)

[,26.0)
  • M
Remote Code Execution (RCE)

[3.1,3.6.6]
  • M
Information Exposure

[,77.0)
  • C
Use After Free

[,58)
  • M
Cross-site Scripting (XSS)

[10.0,10.0.11)(10.0.11,17.0)
  • C
Use After Free

[,49.0)
  • H
Resource Management Errors

[,2.0.0.12)
  • C
Out-of-Bounds

[,52.1.0)(52.1.0,53.0)
  • H
Denial of Service (DoS)

[,31.3.0][31.3.0,35.0)
  • H
Out-of-Bounds

[,47.0)
  • M
Information Exposure

[,40.0)
  • H
Out-of-Bounds

[,45.1.0)
  • M
Information Exposure

[4.0,13.0]
  • M
Out-of-Bounds

[,24.0][24.0,24.1)
  • M
Security Features

[,56.0)
  • M
Access Restriction Bypass

[,52.8.0)(52.8.0,60.0)
  • M
User Impersonation

[,87.0)
  • M
Out-of-Bounds

[,36.0)
  • H
Out-of-Bounds

[3.1,3.6.12]
  • M
Improper Input Validation

[,51.0)
  • C
Denial of Service (DoS)

[,24.7][24.7,31.0)
  • H
Out-of-Bounds

[,85.0)
  • M
Improper Input Validation

[,21.0)
  • H
Out-of-Bounds

[,2.1.0][2.1.0,40.0)
  • M
Arbitrary Code Execution

[,1.5.0.4)
  • M
Authentication Bypass

[,28.0)
  • H
Out-of-Bounds

[,41.0)
  • H
Release of Invalid Pointer or Reference

[,81.0)
  • H
Use After Free

[,58)
  • L
Authentication Bypass

[0.8,1.0]
  • C
Use After Free

[,49.0)
  • H
Information Exposure

[,52.5.2)(52.5.2,57.0.1)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • H
Remote Code Execution (RCE)

[,3.0.18)
  • M
Improper Input Validation

[,72.0)
  • M
User Impersonation

[,68.11)[78.0,78.1)(78.1,79.0)
  • M
Improper Verification of Cryptographic Signature

[,28.0)
  • M
CVE-2020-12412

[,70.0)
  • H
Denial of Service (DoS)

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Information Exposure

[,63.0)
  • M
Cross-site Scripting (XSS)

[0,)
  • M
Cross-site Scripting (XSS)

[,67.0)
  • M
CVE-2005-4685

[preview_release,1.5]
  • H
Access Restriction Bypass

[0,)
  • M
Denial of Service (DoS)

[,43.0)
  • H
Access Restriction Bypass

[24.0,24.3)(24.3,27.0)
  • C
Arbitrary Code Execution

[4.0,13.0]
  • C
Out-of-Bounds

[52.0,52.1.0)(52.1.0,52.3)(52.3,55.0)
  • H
Out-of-bounds Write

[,78.5.1)
  • H
Security Features

[,42.0)
  • M
Cross-site Scripting (XSS)

[,3.5.16)
  • H
Use After Free

[,47.0.2)
  • M
CVE-2018-12403

[,63.0)
  • L
Information Exposure

[,50.0)
  • C
Out-of-Bounds

[24.0,24.4)(24.4,28.0)
  • H
Denial of Service (DoS)

[3.0.1,3.6.6]
  • M
User Impersonation

[,60.4.0)(60.4.0,64.0)
  • M
Arbitrary Code Execution

[,2.0.0.12)
  • M
Cryptographic Issues

[3.5.10,4.0]
  • H
Insufficient Verification of Data Authenticity

[,68.9.0)(68.9.0,77.0)
  • C
Use After Free

[,52.2.0)(52.2.0,54.0)
  • M
Improper Input Validation

[,52.5.2)
  • C
Denial of Service (DoS)

[,3.1.10][3.1.10,3.6.18)
  • C
Out-of-Bounds

[,45.8.0)(45.8.0,52.0)
  • M
Information Exposure

[0.8,1.0.4]
  • H
Out-of-Bounds

[,38.0)
  • C
Access Restriction Bypass

[,20.0)
  • M
Improper Access Control

[,45.1.0)
  • M
Access Restriction Bypass

[,47.0.2)
  • H
Use After Free

[,10.0.8)(10.0.8,16.0)
  • M
Cross-site Scripting (XSS)

[2.0,2.0.0.19)[3.0,3.0.5)
  • M
Improper Preservation of Permissions

[,85.0)
  • H
Out-of-bounds Write

[,78.0)
  • C
Out-of-Bounds

[,3.5.17)
  • C
Use After Free

[,52.6.0)(52.6.0,58.0)
  • H
Directory Traversal

[,2.0.0.17)[3.0,3.0.2)
  • M
CVE-2009-0253

[,3.0.5]
  • M
CVE-2009-3370

[3.0,3.5.3]
  • H
Remote Code Execution (RCE)

[,1.0.6]
  • H
Cross-site Request Forgery (CSRF)

[,60.8.0)(60.8.0,68.0)
  • M
Authentication Bypass

[0,firefox-1.5.0.12-4.fc6)
  • M
Access Restriction Bypass

[,3.1.16][3.1.16,3.6.25)
  • H
Out-of-bounds Write

[,68.2)(68.2,70.0)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,25.0)
  • C
Use After Free

[,49.0)
  • C
Out-of-Bounds

[,60.5)(60.5,65.0)
  • M
Information Exposure

[,2.0.0.18)
  • H
Out-of-bounds Write

[,10.0.11)(10.0.11,17.0)
  • M
Access Restriction Bypass

[,45.1.0)
  • M
Denial of Service (DoS)

[,78.9.1)
  • H
Integer Overflow or Wraparound

[,26.0)
  • M
Improper Input Validation

[,52.4.0)(52.4.0,56.0)
  • H
Remote Code Execution (RCE)

[1.5,1.5.0.9)[2.0,2.0.0.1)
  • M
Cross-site Scripting (XSS)

[,42.0)
  • M
Cryptographic Issues

[,43.0.4]
  • M
Remote Code Execution (RCE)

[,2.0.0.5)
  • M
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • H
Use After Free

[24.0,24.5)(24.5,29.0)
  • H
CVE-2021-23960

[,78.7)(78.7,85.0)
  • H
Denial of Service (DoS)

[,3.0.2)
  • H
Out-of-bounds Write

[10.0,10.0.7)(10.0.7,15.0)
  • C
Out-of-Bounds

[,67.0)
  • H
Information Exposure

[,54.0)
  • H
Use After Free

[,17.0.3)(17.0.3,19.0)
  • H
Out-of-Bounds

[,60.6.1)(60.6.1,66.0.1)
  • H
Out-of-Bounds

[,45.1.0)
  • H
Resource Management Errors

[4.0,13.0]
  • H
Out-of-Bounds

[,52.9)[53.0,60.1)(60.1,61.0)
  • H
Information Exposure

[,60.0)
  • M
Improper Input Validation

[,3.0.3][3.0.3,3.5.8)
  • H
Out-of-Bounds

[,62.0)
  • C
Out-of-Bounds

[10.0,10.0.7)(10.0.7,15.0)
  • M
Arbitrary Code Execution

[1.5,1.5.0.4]
  • M
User Impersonation

[10.0,10.0.9)(10.0.9,16.0.1)
  • C
Out-of-Bounds

[,5.0.1)
  • H
Access Restriction Bypass

[,3.0.11)
  • M
Denial of Service (DoS)

[1.5,1.5.0.4]
  • M
Cross-site Scripting (XSS)

[10.0,10.0.11)(10.0.11,17.0)
  • H
Use After Free

[,50.0)
  • M
Improper Input Validation

[,45.5.0)(45.5.0,50.0)
  • H
Access Restriction Bypass

[,47.0.2)
  • M
Improper Input Validation

[,52.0)
  • H
Security Features

[,52.8.0)(52.8.0,60.0)
  • H
Improper Validation of Array Index

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Code

[,42.0)
  • M
Arbitrary Code Execution

[,31.2][31.2,33.0.1)
  • L
User Enumeration

[,60.9.0)[68.0,68.1.0)(68.1.0,69.0)
  • M
Insecure Encryption

[,17.0.11)[24.1.0,24.1.1)(24.1.1,25.0.1)
  • C
Improper Access Control

[,53.0)
  • H
Out-of-Bounds

[,78.13.0)(78.13.0,91.0)
  • H
Information Exposure

[,0.8]
  • M
Improper Input Validation

[,38.0]
  • M
Denial of Service (DoS)

[1.0,1.5]
  • H
Denial of Service (DoS)

[3.5.1,3.5.5]
  • H
Type Confusion

[,68.4)(68.4,72.0)
  • H
Use After Free

[,17.0.3)(17.0.3,19.0)
  • H
Arbitrary Code Execution

[0.8,1.0.4]
  • H
Improper Input Validation

[1.0,3.1.19][3.1.19,3.6.28)(4.0,5.0)(5.0,10.0.1)
  • M
Information Exposure

[,45.8.0)(45.8.0,52.0)
  • M
Cross-site Request Forgery (CSRF)

[,31.3.0][31.3.0,35.0)
  • H
Information Exposure

[1.5,1.5.0.4]
  • H
User Impersonation

[,55.0)
  • M
Cross-site Scripting (XSS)

[1.5,1.5.0.10)[2.0,2.0.0.2)
  • M
Cross-site Scripting (XSS)

[,3.0.9)
  • H
Access Restriction Bypass

[,2.0.0.19)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • M
Access Restriction Bypass

[,17.0.5][17.0.5,21.0)
  • H
Arbitrary Code Execution

[,78.0)
  • L
Authentication Bypass

[0.8,1.0]
  • H
Remote Code Execution (RCE)

[,52.8.0)(52.8.0,60.0)
  • H
Untrusted Search Path

[,52.2.0)(52.2.0,54.0)
  • C
Out-of-Bounds

[,60.7.1)
  • M
Open Redirect

[,86.0)
  • M
Access Restriction Bypass

[0.6,0.9]
  • L
Resource Management Errors

[3.0,3.0.5]
  • M
Improper Input Validation

[,53.0)
  • M
Improper Input Validation

[,55.0)
  • H
CVE-2019-11711

[,60.8.0)(60.8.0,68.0)
  • M
Cross-site Scripting (XSS)

[,3.0.2)
  • C
Out-of-Bounds

[,60.7.0)(60.7.0,67.0)
  • C
Out-of-Bounds

[2.0,3.0]
  • H
Resource Management Errors

[,2.0.0.12)
  • H
Access Restriction Bypass

[,3.5.19)
  • C
Use After Free

[24.0,24.2)(24.2,26.0)
  • C
Use After Free

[,52.4.0)(52.4.0,56.0)
  • H
Denial of Service (DoS)

[1.0,1.5]
  • H
Incorrect Type Conversion or Cast

[,47.0.2)
  • L
Cross-site Scripting (XSS)

[3.0,3.0.5]
  • M
Information Exposure

[,45.1.0)
  • C
Out-of-Bounds

[,51.0)
  • M
Cross-site Scripting (XSS)

[1.0,1.0.7]
  • C
Resource Management Errors

[,17.0.5][17.0.5,21.0)
  • M
Resource Management Errors

[,3.1)
  • M
Cross-site Scripting (XSS)

[,2.0]
  • M
Denial of Service (DoS)

[,1.5.0.1)
  • M
Out-of-Bounds

[,41.0)
  • M
CVE-2021-29974

[,90.0)
  • M
Security Features

[,47.0)
  • C
Use of Uninitialized Resource

[,66.0)
  • M
Information Exposure

[,59.0)
  • H
Improper Access Control

[,60.0)
  • L
CVE-2004-1449

[0.1,0.6]
  • C
Out-of-bounds Write

[,52.7.2)(52.7.2,59.0.1)
  • M
Information Exposure

[3.0,3.6.3]
  • H
Security Features

[,47.0)
  • H
Access Restriction Bypass

[,50.0)
  • H
Out-of-bounds Write

[,83.0)
  • M
Cross-site Scripting (XSS)

[,3.0.9)
  • H
Improper Input Validation

[,52.0)
  • H
Out-of-Bounds

[1.5,1.5.0.10)[2.0,2.0.0.2)
  • H
Information Exposure

[,74.0)
  • C
Use After Free

[24.0,24.5)(24.5,29.0)
  • L
Denial of Service (DoS)

[,1.5.0.3]
  • H
Out-of-Bounds

[,63.0)
  • M
Cross-site Scripting (XSS)

[,2.0.0.8)
  • C
Out-of-Bounds

[,52.8.0)
  • M
Authentication Bypass

[,0.7][0.7,0.9.1)
  • H
Denial of Service (DoS)

[,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0)
  • L
Access Restriction Bypass

[,28.0)
  • M
Cross-site Scripting (XSS)

[,3.6.24)[4.0,7.0.1)
  • H
CVE-2021-23962

[,85.0)
  • C
Out-of-Bounds

[,57.0)
  • H
Insecure Permissions

[,50.0)
  • M
Cross-site Scripting (XSS)

[0,)
  • M
Improper Input Validation

[,37.0)
  • C
Denial of Service (DoS)

[,7.0)
  • M
CVE-2020-26967

[,83.0)
  • M
CVE-2013-0774

[,17.0.3)(17.0.3,19.0)
  • M
Information Exposure

[1.0,1.8]
  • M
Denial of Service (DoS)

[,3.5.2]
  • M
CVE-2005-2263

[0.8,1.0.4]
  • M
Cross-site Scripting (XSS)

[17.0,17.0.10]
  • C
Out-of-Bounds

[,52.9)[53.0,60.1.0)(60.1.0,61.0)
  • H
Arbitrary Code Execution

[0.8,1.0.2]
  • H
Arbitrary Code Execution

[,1.5.0.4)
  • H
Out-of-Bounds

[,78.11)(78.11,89.0)
  • C
Out-of-bounds Write

[,60.4)(60.4,64.0)
  • C
Out-of-Bounds

[,40.0)
  • C
Out-of-Bounds

[,3.5.17)
  • M
Information Exposure

[,2.1.0][2.1.0,39.0.3)
  • M
Authentication Bypass

[0.9.1,0.9.2]
  • H
Security Features

[,51.0)
  • M
Improper Input Validation

[,70.0)
  • H
Denial of Service (DoS)

[3.5.1,3.5.3]
  • M
Improper Input Validation

[,43.0)
  • M
Access Restriction Bypass

[,45.8.0)(45.8.0,52.0)
  • M
Improper Access Control

[,47.0)
  • H
Integer Overflow or Wraparound

[,60.0)(60.0,60.1)(60.1,61.0)
  • C
Denial of Service (DoS)

[,3.1.10)
  • H
Authentication Bypass

[,1.0]
  • C
Resource Management Errors

[,3.0.12)
  • M
Access Restriction Bypass

[,3.0.18)
  • C
Out-of-Bounds

[,52.5.0)(52.5.0,57.0)
  • M
Access Restriction Bypass

[,17.0.7][17.0.7,23.0)
  • H
Out-of-Bounds

[,38.6.0][38.6.0,45.0)
  • C
Use After Free

[,52.4.0)(52.4.0,56.0)
  • M
Improper Authentication

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • C
Resource Management Errors

[,3.0.12)
  • C
Integer Overflow or Wraparound

[,52.6.0)(52.6.0,58.0)
  • H
Out-of-Bounds

[,3.6]
  • M
Insufficiently Protected Credentials

[78.8.1,78.10.2)
  • M
Improper Input Validation

[,86.0)
  • M
Access Restriction Bypass

[4.0,9.0]
  • H
Privilege Escalation

[24.0,24.5)(24.5,29.0)
  • M
Access Restriction Bypass

[,17.0.9][17.0.9,24.0)
  • C
Use After Free

[,45.7.0)(45.7.0,51.0)
  • C
Privilege Escalation

[24.0,24.4)(24.4,28.0)
  • M
Access Restriction Bypass

[,67.0.2)
  • H
Denial of Service (DoS)

[,38.6.0][38.6.0,45.0)
  • L
Access Restriction Bypass

[4.0,11.0]
  • M
CVE-2007-3827

[0,)
  • M
Remote Code Execution (RCE)

[1.0,1.5]
  • H
Out-of-Bounds

[,41.0)
  • M
Resource Management Errors

[,2.0.0.14]
  • C
Resource Management Errors

[,2.0.0.20][2.0.0.20,3.0.7)
  • H
Denial of Service (DoS)

[,35.0)
  • H
Access Restriction Bypass

[4.0,10.2]
  • H
Resource Management Errors

[,3.0.18)
  • H
Out-of-Bounds

[,3.0.6][3.0.6,3.5.12)
  • M
Denial of Service (DoS)

[,1.0.8)
  • C
Out-of-Bounds

[,43.0)
  • C
Out-of-Bounds

[,68.6.0)(68.6.0,74.0)
  • H
Resource Management Errors

[4.0,8.0]
  • H
Resource Management Errors

[4.0,8.0]
  • H
Improper Access Control

[,58)
  • H
Out-of-bounds Write

[,68.4)(68.4,72.0)
  • H
Remote Code Execution (RCE)

[,52.3.0)(52.3.0,55.0)
  • M
Use of a Risky Cryptographic Algorithm

[,78.9.1)
  • M
Directory Traversal

[2.0,2.0.0.3]
  • M
Information Exposure

[,49.0.2)
  • M
Security Features

[,45.0)
  • M
Cross-site Scripting (XSS)

[,2.0.0.15)
  • H
Use After Free

[10.0,10.0.11)(10.0.11,17.0)
  • M
Improper Check for Unusual or Exceptional Conditions

[,78.1)(78.1,79.0)
  • M
Improper Input Validation

[,50.0)
  • C
Out-of-bounds Write

[,58)
  • M
Denial of Service (DoS)

[1.0.6,1.0.7]
  • H
Denial of Service (DoS)

[3.0,3.6.6]
  • M
Improper Input Validation

[,53.0)
  • M
Cross-site Scripting (XSS)

[,16.0)
  • M
Cross-site Scripting (XSS)

[4.0,13.0]
  • M
Improper Access Control

[,41.0.2)
  • M
Cross-site Scripting (XSS)

[,52.4.0)(52.4.0,56.0)
  • H
Use After Free

[,68.10.0)(68.10.0,78.0)
  • M
Information Exposure

[,80.0)
  • M
Arbitrary Code Execution

[,1.5.0.9]
  • C
Resource Management Errors

[,2.0.0.15)
  • H
Out-of-Bounds

[,45.1.0)
  • M
Symlink Attack

[,2.0.0.13)
  • H
Out-of-bounds Write

[,68.7.0)(68.7.0,75.0)
  • C
Out-of-Bounds

[,45.5.0)(45.5.0,50.0)
  • H
Arbitrary Code Execution

[,1.0.7)
  • M
Improper Input Validation

[3.0,3.0.8]
  • C
Resource Management Errors

[4.0,13.0]
  • C
Out-of-bounds Read

[,52.3.0)(52.3.0,55.0)
  • H
Remote Code Execution (RCE)

[,3.0.16)
  • M
Information Exposure

[,68.6.0)(68.6.0,74.0)
  • C
Denial of Service (DoS)

[4.0,9.0]
  • M
Information Exposure

[,3.1.7][3.1.7,3.6.26)
  • M
Improper Access Control

[,33.0.1)
  • C
Out-of-Bounds

[,8.0)
  • M
Cross-site Scripting (XSS)

[,3.6]
  • H
Out-of-Bounds

[,3.1.5][3.1.5,3.6.24)
  • M
Information Exposure

[,38.0)
  • H
Out-of-bounds Write

[,78.6.0)(78.6.0,84.0)
  • H
Race Condition

[,68.8.0)(68.8.0,76.0)
  • H
Denial of Service (DoS)

[1.0,1.5]
  • M
Cross-site Scripting (XSS)

[2.0,2.0.0.18)[3.0,3.0.4)
  • H
Out-of-Bounds

[,68.10.0)(68.10.0,78.0)
  • C
Use After Free

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • M
Authentication Bypass

[,2.0.0.20][2.0.0.20,3.0.7)
  • C
Improper Input Validation

[,60.7.2)(60.7.2,67.0.4)
  • M
Information Exposure

[,51.0)
  • H
NULL Pointer Dereference

[,60.5.0)
  • H
Out-of-bounds Write

[,45.9.0)[52.0,52.1.0)(52.1.0,53.0)
  • C
Out-of-Bounds

[,38.0.1][38.0.1,38.1)
  • M
Information Exposure

[0,65.0.1)
  • M
Authentication Bypass

[0.8,1.0]
  • M
Cross-site Scripting (XSS)

[,51.0)
  • M
Information Exposure

[,57.0.1)
  • H
Remote Code Execution (RCE)

[,17.0)
  • H
CVE-2011-2980

[,3.6.20)
  • M
Authentication Bypass

[0.8,0.10.1]
  • H
Type Confusion

[,78.7)(78.7,85.0)
  • H
Out-of-Bounds

[,66.0)
  • C
Out-of-Bounds

[,17.0.5][17.0.5,21.0)
  • L
Improper Input Validation

[,2.0.0.16)
  • M
Access Restriction Bypass

[,36.0)
  • H
Arbitrary Code Execution

[,32.0.1)
  • M
Improper Input Validation

[,1.5.0.6]
  • H
Denial of Service (DoS)

[3.1,3.6.10]
  • H
Resource Management Errors

[4.0,10.2]
  • M
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • H
Buffer Overflow

[,10.0.11)(10.0.11,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Improper Input Validation

[3.0.2,3.0.10]
  • H
Denial of Service (DoS)

[,43.0.4]
  • H
Improper Input Validation

[2.0_.1,2.0.0.14]
  • M
Arbitrary Code Execution

[,1.0.4)
  • M
Security Features

[,50.0)
  • C
Denial of Service (DoS)

[,3.1.10)
  • M
Information Exposure

[1.0.4,1.0.5]
  • H
CVE-2010-3182

[,3.0.8][3.0.8,3.5.14)
  • M
CVE-2006-6077

[,1.5.0.9)
  • H
Cross-site Request Forgery (CSRF)

[,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0)
  • M
Improper Input Validation

[,3.0.11)
  • H
Type Confusion

[,60.7.1)
  • H
Arbitrary Code Execution

[0.8,1.0.2]
  • M
Cross-site Scripting (XSS)

[,59.0)
  • M
Access Restriction Bypass

[,3.0.5)
  • H
Improper Input Validation

[,44.0)
  • M
Remote Code Execution (RCE)

[0.8,0.10.1]
  • H
Denial of Service (DoS)

[,3.0.9)
  • C
Denial of Service (DoS)

[,3.1.10][3.1.10,3.6.18)
  • L
Cross-site Scripting (XSS)

[,2.0)
  • C
Out-of-Bounds

[,52.3.0)(52.3.0,55.0)
  • M
Access Restriction Bypass

[,20.0)
  • H
Remote Code Execution (RCE)

[,2.0.0.19][2.0.0.19,3.0.11)
  • M
Cross-site Scripting (XSS)

[,60.8.0)(60.8.0,68.0)
  • C
Use After Free

[,60.5)(60.5,65.0)
  • H
Out-of-Bounds

[,44.0)
  • M
Improper Authentication

[,3.0.10)
  • M
Improper Preservation of Permissions

[,68.1.0)(68.1.0,69.0)
  • M
Information Exposure

[,2.0.0.8)
  • M
Out-of-Bounds

[,31.4][31.4,36.0)
  • C
Out-of-Bounds

[,59.0)
  • C
Out-of-Bounds

[,74.0)
  • H
Resource Management Errors

[,2.0.0.20][2.0.0.20,3.0.7)
  • H
Integer Overflow or Wraparound

[,78.10)(78.10,88.0)
  • C
Use After Free

[,60.4.0)(60.4.0,64.0)
  • C
Denial of Service (DoS)

[,24.5][24.5,30.0)
  • H
Use After Free

[,45.5.1)(45.5.1,50.0.2)
  • H
Out-of-Bounds

[0,firefox-1.5.0.12-4.fc6)
  • M
CVE-2008-0594

[,2.0.0.12)
  • M
Cross-site Scripting (XSS)

[,1.5.0.4)
  • C
Out-of-Bounds

[3.5,3.5.5]
  • M
Improper Restriction of Rendered UI Layers or Frames

[,85.0)
  • M
Race Condition

[,3.1.16][3.1.16,3.6.25)
  • H
Arbitrary Code Execution

[,78.1)(78.1,79.0)
  • H
Out-of-bounds Write

[,68.11)[78.0,78.0.1][78.0.1,78.1.0)(78.1.0,79.0)
  • H
Arbitrary Code Execution

[,40.0)
  • L
Arbitrary Code Execution

[0.8,1.0]
  • L
Arbitrary Code Execution

[0.8,1.0.2]
  • C
Out-of-Bounds

[,52.6.0)(52.6.0,58.0)
  • H
Improper Access Control

[,60.3)(60.3,63.0)
  • C
Remote Code Execution (RCE)

[,3.6.20)
  • H
Out-of-Bounds

[,10.0.8)(10.0.8,16.0)
  • H
Access Restriction Bypass

[24.0,24.3)(24.3,27.0)
  • H
Denial of Service (DoS)

[,91.0)
  • M
Directory Traversal

[,2.0.0.12)
  • H
Information Exposure

[,60.3.0)(60.3.0,63.0)
  • H
Out-of-Bounds

[,41.0)
  • C
Integer Overflow or Wraparound

[,45.5.0)(45.5.0,50.0)
  • M
Access Restriction Bypass

[,3.0.16)
  • M
Information Exposure

[,42.0)
  • C
Improper Input Validation

[,60.6.0)(60.6.0,66.0)
  • H
Improper Input Validation

[,52.3.0)(52.3.0,55.0)
  • C
Arbitrary Code Execution

[,0.7.2][0.7.2,0.9.3)
  • H
Denial of Service (DoS)

[,1.5]
  • C
Denial of Service (DoS)

[,3.1.11][3.1.11,5.0)
  • M
Denial of Service (DoS)

[0,)
  • H
Out-of-Bounds

[,86.0)
  • M
User Impersonation

[,74.0)
  • H
Security Features

[,52.2.0)(52.2.0,54.0)
  • M
Improper Access Control

[,52.5.0)(52.5.0,57.0)
  • L
Authentication Bypass

[,1.0.8)
  • M
Access Restriction Bypass

[,2.0.0.15)
  • H
Out-of-Bounds

[,52.0)
  • M
Information Exposure

[,32.0.1)
  • M
Authentication Bypass

[,67.0)
  • H
Out-of-Bounds

[,45.1.1][45.1.1,47.0)
  • M
Improper Input Validation

[,60.0)
  • M
Access Restriction Bypass

[,22.0)
  • M
Race Condition

[,68.4)(68.4,72.0)
  • C
Arbitrary Code Injection

[,55.0)
  • M
Cross-site Scripting (XSS)

[24.0,24.5)(24.5,29.0)
  • M
Improper Input Validation

[,57.0)
  • H
Information Exposure

[24.0,24.4)(24.4,28.0)
  • M
Cross-site Scripting (XSS)

[,78.3)(78.3,81.0)
  • M
Improper Input Validation

[,2.0.0.9)
  • H
Out-of-bounds Write

[,84.0)
  • M
Information Exposure

[3.0,3.6.6]
  • H
CVE-2007-3845

[,2.0.0.5]
  • M
Improper Input Validation

[4.0,4.0.1]
  • H
Cryptographic Issues

[,3.0.8][3.0.8,3.5.14)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • M
Denial of Service (DoS)

[,33.0.1)
  • C
Resource Management Errors

[,3.5.17)
  • C
Out-of-Bounds

[,2.0.0.17)
  • H
Improper Access Control

[,60.0)
  • C
Denial of Service (DoS)

[,7.0]
  • C
Resource Management Errors

[,3.1.10][3.1.10,3.6.18)
  • C
Use After Free

[,52.3.0)(52.3.0,52.3)(52.3,55.0)
  • M
Cross-site Scripting (XSS)

[,10.0.11)(10.0.11,17.0)
  • H
Arbitrary Code Execution

[3.0,3.5.3]
  • M
Improper Restriction of Rendered UI Layers or Frames

[,78.0)(78.0,78.0.2)
  • M
Resource Management Errors

[,2.0.0.20)
  • L
Denial of Service (DoS)

[1.0,1.0.6]
  • M
Out-of-Bounds

[2.0,2.0.0.2]
  • M
Resource Management Errors

[,3.6.3]
  • H
Security Features

[,52.9)[53.0,60.1.0)(60.1.0,61.0)
  • M
Cross-site Scripting (XSS)

[,55.0)
  • M
Out-of-Bounds

[,37.0)
  • C
Denial of Service (DoS)

[,3.1.10][3.1.10,3.6.18)
  • M
Access Restriction Bypass

[,52.2.0)(52.2.0,54.0)
  • H
Resource Management Errors

[,17.0.6][17.0.6,22.0)
  • M
Cross-site Scripting (XSS)

[2.0,2.0.0.19)[3.0,3.0.5)
  • M
Arbitrary Code Injection

[10.0,10.0.10)(10.0.10,16.0.2)
  • M
Out-of-Bounds

[,36.0)
  • M
Improper Data Handling

[,59.0)
  • C
Out-of-Bounds

[,43.0)
  • C
Out-of-Bounds

[,45.6.0)(45.6.0,50.1)
  • M
Use After Free

[,50.0)
  • M
Insufficiently Protected Credentials

[4.0,5.0]
  • H
Improper Input Validation

[,49.0)
  • H
Resource Management Errors

[,17.0.3][17.0.3,19.0.2)
  • M
Improper Input Validation

[,3.0.9)
  • H
User Impersonation

[,68.0)
  • H
Access Restriction Bypass

[,0.9.2]
  • M
Arbitrary Code Execution

[,3.5.16)
  • H
Out-of-Bounds

[,17.0.7][17.0.7,23.0)
  • H
Out-of-Bounds

[,3.0.6][3.0.6,3.5.12)
  • M
Cross-site Scripting (XSS)

[,2.0.0.21][2.0.0.21,3.0.9)
  • M
Cross-site Scripting (XSS)

[,70.0)
  • M
CVE-2007-1762

[2.0.0.1,2.0.0.3]
  • H
Improper Input Validation

[2.0,2.0.0.18)[3.0,3.0.4)
  • H
Cross-site Scripting (XSS)

[1.5,1.5.0.4]
  • C
Denial of Service (DoS)

[,3.0.3][3.0.3,3.5.8)
  • C
Use After Free

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Denial of Service (DoS)

[,38.6.0][38.6.0,45.0)
  • H
Use After Free

[,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0)
  • C
Denial of Service (DoS)

[,3.0.14)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,78.5)(78.5,83.0)
  • H
Integer Overflow or Wraparound

[,52.7.0)
  • C
Use After Free

[,52.5.0)(52.5.0,57.0)
  • C
Use After Free

[,52.3.0)(52.3.0,55.0)
  • C
Denial of Service (DoS)

[,43.0)
  • C
Resource Management Errors

[,3.0.12)
  • C
Use After Free

[,52.6.0)(52.6.0,58.0)
  • H
Use After Free

[,17.0.3)(17.0.3,19.0)
  • H
Resource Management Errors

[,14.0.1)
  • H
Resource Management Errors

[1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1)
  • H
Improper Input Validation

[,49.0)
  • H
Race Condition

[,50.0)
  • M
Access Restriction Bypass

[3.5.1,3.6.6]
  • M
Access Restriction Bypass

[2.0,2.0.0.19)[3.0,3.0.5)
  • M
Information Exposure

[,45.0)
  • C
Out-of-Bounds

[,38.1)
  • C
Improper Access Control

[,52.1.0)(52.1.0,53.0)
  • C
Out-of-Bounds

[,52.0)
  • H
Out-of-Bounds

[,49.0)
  • M
CVE-2020-15665

[,80.0)
  • C
Denial of Service (DoS)

[,3.1.11)
  • M
Denial of Service (DoS)

[,31.5][31.5,31.5.3][31.5.3,37.0)
  • C
Resource Management Errors

[,17.0.5][17.0.5,21.0)
  • C
Out-of-Bounds

[,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0)
  • H
Out-of-Bounds

[,60.3.0)
  • M
Privilege Escalation

[,29.0)
  • H
Out-of-Bounds

[,30.0)
  • M
Arbitrary Code Injection

[,77.0)
  • H
Out-of-bounds Write

[,68.5.0)(68.5.0,73.0)
  • M
Arbitrary Code Execution

[0.1,1.0.1]
  • H
Access Restriction Bypass

[,1.5.0.1][1.5.0.1,1.5.0.4)
  • M
User Impersonation

[,60.2)(60.2,60.2.1)(60.2.1,62.0)
  • H
Resource Management Errors

[,3.5.2)
  • H
Denial of Service (DoS)

[1.0,1.0.8)[1.5,1.5.0.2)
  • M
Access Restriction Bypass

[,24.7][24.7,31.0)
  • H
Remote Code Execution (RCE)

[preview_release,1.5.3]
  • M
Information Exposure

[1.5,1.5.0.11)[2.0,2.0.0.3)
  • L
CVE-2005-1576

[0.10.1,1.0]
  • M
Information Exposure

[0.8,0.10.1]
  • M
Information Exposure

[,47.0.2)
  • C
Use After Free

[,60.7)(60.7,60.7.0)(60.7.0,67.0)
  • H
Out-of-bounds Read

[,68.6.0)(68.6.0,74.0)
  • H
Buffer Overflow

[,71.0)
  • M
Remote Code Execution (RCE)

[,3.6.22][3.6.22,7.0)
  • M
Information Exposure

[,49.0)
  • H
Out-of-Bounds

[,17.0.7][17.0.7,23.0)
  • M
Out-of-Bounds

[,38.0.1][38.0.1,38.1)
  • M
CVE-2020-15653

[,78.1)(78.1,79.0)
  • H
Out-of-Bounds

[,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0)
  • H
Out-of-bounds Write

[,68.5.0)(68.5.0,73.0)
  • M
Improper Input Validation

[0,firefox-1.5.0.12-4.fc6)
  • H
Race Condition

[,45.1.0)
  • C
Out-of-Bounds

[,60.7)(60.7,67.0)
  • M
Denial of Service (DoS)

[4.0,11.0]
  • M
Authentication Bypass

[0.1,1.0]
  • M
Cross-site Scripting (XSS)

[,47.0.2)
  • M
Improper Input Validation

[,52.2.0)(52.2.0,54.0)
  • M
Insufficiently Protected Credentials

[,68.10.0)
  • M
Authentication Bypass

[,3.0.16)
  • L
Improper Access Control

[,36.0)
  • M
Out-of-bounds Write

[24.0,24.5)(24.5,29.0)
  • H
Access Restriction Bypass

[,2.0.0.17)
  • L
Authentication Bypass

[,0.9.3]
  • M
Information Management Errors

[,33.0]
  • C
Command Injection

[,66.0)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,68.7.0)
  • H
Denial of Service (DoS)

[,30.0)
  • M
Access Restriction Bypass

[,37.0.1)
  • L
Authentication Bypass

[0.8,1.0.4]
  • H
Argument Injection

[,68.5.0)(68.5.0,73.0)
  • M
CVE-2020-15680

[,82.0)
  • M
Improper Data Handling

[43.0,43.0.4]
  • C
Arbitrary Code Execution

[,38.1)
  • M
Access Restriction Bypass

[,52.2.0)(52.2.0,54.0)
  • M
Information Exposure

[,58)
  • H
Arbitrary Code Execution

[1.5,1.5.0.4]
  • H
Insufficiently Protected Credentials

[,78.8.1)
  • M
CVE-2020-26961

[,78.5)(78.5,83.0)
  • H
Information Exposure

[,51.0)
  • H
Remote Code Execution (RCE)

[0.8,1.0.2]
  • M
Information Exposure

[,68.8.0)(68.8.0,76.0)
  • M
Access Restriction Bypass

[,43.0)
  • M
Code

[,43.0.4]
  • H
Security Features

[,41.0)
  • L
Denial of Service (DoS)

[1.5,1.5.0.4]
  • H
Race Condition

[,88.0.1)(88.0.1,88.1.3)
  • M
Improper Input Validation

[,24.0][24.0,24.1)
  • M
Improper Input Validation

[1.0,1.0.8)[1.5,1.5.0.2)
  • C
Use After Free

[,59.0)
  • H
Improper Access Control

[,49.0)
  • M
Arbitrary Code Injection

[,78.9)(78.9,87.0)
  • H
Information Exposure

[,2.0.0.12)
  • H
Resource Management Errors

[,3.1.10][3.1.10,3.6.18)
  • H
Cryptographic Issues

[,3.0.10)
  • M
Denial of Service (DoS)

[0.1,2.0]
  • M
Access Restriction Bypass

[,17.0.7][17.0.7,23.0)
  • M
Improper Input Validation

[,10.0.8)(10.0.8,16.0)
  • L
CVE-2005-0143

[0.8,1.0]
  • M
Out-of-Bounds

[,30.0)
  • C
Out-of-Bounds

[4.0,11.0]
  • M
Access Restriction Bypass

[,17.0.6][17.0.6,22.0)
  • H
Out-of-bounds Read

[,17.0.3)(17.0.3,19.0)
  • C
Resource Management Errors

[,3.0.18)
  • H
Channel and Path Errors

[,52.2.0)(52.2.0,54.0)
  • L
Denial of Service (DoS)

[,1.5.0.3]
  • C
Resource Management Errors

[4.0,13.0]
  • H
Denial of Service (DoS)

[,45.0)
  • M
Information Exposure

[,87.0)
  • C
Use After Free

[,52.6.0)(52.6.0,58.0)
  • H
Denial of Service (DoS)

[,47.0)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • M
Security Features

[,52.0)
  • C
Out-of-Bounds

[,60.0)
  • M
Improper Input Validation

[,50.0)
  • C
Out-of-Bounds

[,17.0.5][17.0.5,21.0)
  • C
Use After Free

[,52.0)
  • M
Out-of-Bounds

[,3.6]
  • M
Denial of Service (DoS)

[,23.0)
  • M
Access Restriction Bypass

[78.11.0,89.0)
  • H
Release of Invalid Pointer or Reference

[,78.2)(78.2,80.0)
  • M
Race Condition

[,35.0)
  • C
Out-of-Bounds

[4.0,11.0]
  • H
Out-of-Bounds

[,24.0][24.0,24.1)
  • H
Use After Free

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Information Exposure

[1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1)
  • H
Access Restriction Bypass

[0.8,1.0.3]
  • H
Denial of Service (DoS)

[,3.0.9)
  • C
Out-of-Bounds

[,3.0.13)
  • H
Denial of Service (DoS)

[,3.5.16)
  • M
Denial of Service (DoS)

[,24.7][24.7,31.0)
  • M
Code

[,36.0.3)
  • C
Denial of Service (DoS)

[,40.0)
  • M
Information Exposure

[,32.0.1)
  • L
CVE-2005-0232

[,1.0]
  • M
Access Restriction Bypass

[,17.0.2)
  • H
Access Restriction Bypass

[,24.0.1)
  • M
Cross-site Scripting (XSS)

[,44.0)
  • H
Access Restriction Bypass

[,37.0)
  • H
Use After Free

[,71.0)
  • C
Use After Free

[,52.6.0)(52.6.0,58.0)
  • M
Arbitrary Code Execution

[1.0.3,1.0.4]
  • H
Out-of-bounds Write

[10.0,10.0.11)(10.0.11,17.0)
  • M
Information Exposure

[,3.0.1]
  • C
Use After Free

[,52.6.0)(52.6.0,58.0)
  • H
Resource Management Errors

[,17.0.9][17.0.9,24.0)
  • H
Improper Input Validation

[,63.0)
  • C
Denial of Service (DoS)

[3.0,3.0.2)(3.0.2,3.0.18)[3.5,3.5.8)
  • C
Use After Free

[24.0,24.3)(24.3,27.0)
  • M
Cross-site Scripting (XSS)

[17.0,17.0.10]
  • C
Denial of Service (DoS)

[,3.1.10)
  • H
Out-of-Bounds

[,17.0.6][17.0.6,22.0)
  • C
Out-of-Bounds

[,49.0)
  • H
Out-of-Bounds

[,52.1)(52.1,52.1.0)(52.1.0,53.0)
  • M
Security Features

[,45.0)
  • M
Denial of Service (DoS)

[,86.0)
  • M
CVE-2009-3274

[2.0,3.6]
  • M
Access Restriction Bypass

[2.0,2.0.0.19)[3.0,3.0.5)
  • M
Cross-site Scripting (XSS)

[,2.0.0.10)
  • M
Improper Input Validation

[,57.0)
  • L
Access Restriction Bypass

[3.5.1,3.6.6]
  • H
Denial of Service (DoS)

[,38.6.0][38.6.0,45.0)
  • H
Out-of-Bounds

[,78.9)(78.9,87.0)
  • M
Denial of Service (DoS)

[,43.0)
  • M
Cross-site Scripting (XSS)

[,17.0)
  • H
Improper Input Validation

[,59.0)
  • M
Cross-site Scripting (XSS)

[,2.0.0.10)
  • M
Remote Code Execution (RCE)

[,3.1.10][3.1.10,3.6.18)
  • C
Out-of-Bounds

[,5.0.1)
  • C
Denial of Service (DoS)

[,3.1.10)
  • M
Authentication Bypass

[,20.0)
  • H
Security Features

[,52.3.0)(52.3.0,55.0)
  • M
Improper Input Validation

[,2.0.0.15)
  • M
Cryptographic Issues

[,35.0)
  • H
Denial of Service (DoS)

[,3.5.5]
  • M
Cross-site Scripting (XSS)

[3.0,3.5.7]
  • M
Information Exposure

[,45.8.0)(45.8.0,52.0)
  • H
Resource Management Errors

[,17.0.9][17.0.9,24.0)
  • M
Information Exposure

[0.8,0.9.3]
  • H
CVE-2013-1712

[,17.0.7][17.0.7,23.0)
  • H
Race Condition

[,60.7)(60.7,67.0)
  • M
Out-of-Bounds

[,1.5.0.4)
  • M
Information Exposure

[,14.0.1)
  • C
Out-of-Bounds

[,52.7.0)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • H
Resource Management Errors

[,2.0.0.12)
  • C
Out-of-Bounds

[,31.1)
  • M
Security Features

[1.5,1.5.0.9)[2.0,2.0.0.1)
  • C
Improper Input Validation

[,68.8.0)(68.8.0,76.0)
  • H
Resource Management Errors

[,3.0.7]
  • H
Out-of-Bounds

[,17.0.2)(17.0.2,18.0)
  • H
Privilege Escalation

[68.0,68.12)[78.0,78.2)(78.2,80.0)
  • M
Out-of-Bounds

[,31.1)
  • H
Resource Management Errors

[,3.0.9]
  • C
Resource Management Errors

[2.0,2.0.0.18)
  • M
Improper Input Validation

[,59.0)
  • M
Cryptographic Issues

[,22.0)
  • M
Race Condition

[,38.0)
  • M
Improper Input Validation

[,37.0.1)
  • H
Access Restriction Bypass

[,2.0.0.17)[3.0,3.0.2)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • M
Improper Input Validation

[,58)
  • C
Use After Free

[,60.6.0)(60.6.0,66.0)
  • H
Improper Input Validation

[,53.0)
  • M
CVE-2005-1575

[0.10.1,1.0]
  • C
Out-of-Bounds

[,7.0)
  • H
CVE-2005-1157

[0.8,1.0.2]
  • M
CVE-2008-1240

[,2.0.0.13)
  • H
Access Restriction Bypass

[,50.0)
  • M
Access Restriction Bypass

[4.0,13.0]
  • H
Denial of Service (DoS)

[1.5.0.9,2.0.0.1]
  • M
Security Features

[,55.0)
  • C
Out-of-Bounds

[,44.0)
  • H
Out-of-Bounds

[3.0.1,3.5.1]
  • H
Code

[,37.0)
  • M
CVE-2020-35111

[,78.6.0)(78.6.0,84.0)
  • M
Security Features

[,60.2.0)(60.2.0,62.0)
  • M
Information Exposure

[,3.0.11)
  • H
Improper Access Control

[,58)
  • M
Cross-site Scripting (XSS)

[,88.0.1)(88.0.1,88.1.3)
  • M
Resource Management Errors

[,3.0.10]
  • M
Denial of Service (DoS)

[1.5.0.7,2.0]
  • H
Use After Free

[,10.0.11)(10.0.11,17.0)
  • M
Access Restriction Bypass

[,4.0.1)
  • H
Denial of Service (DoS)

[,28.0)
  • M
Resource Management Errors

[,2.0.0.13)
  • M
Information Exposure

[,78.6.0)(78.6.0,84.0)
  • C
Improper Input Validation

[,60.7)(60.7,67.0)
  • M
User Impersonation

[,66.0)
  • M
Resource Management Errors

[,36.0)
  • H
Arbitrary Code Execution

[,47.0)
  • M
Out-of-bounds Read

[,68.10)(68.10,68.10.0)(68.10.0,78.0)
  • M
Cryptographic Issues

[,32.0.1)
  • H
Improper Input Validation

[,36.0)
  • M
Denial of Service (DoS)

[1.0,2.0.0.1]
  • M
Information Exposure

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Improper Authentication

[,2.0.0.19][2.0.0.19,3.0.11)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • C
Out-of-Bounds

[,38.0.1][38.0.1,38.1)
  • H
Use After Free

[,78.5)(78.5,83.0)
  • H
Buffer Overflow

[24.0,24.4)(24.4,28.0)
  • H
Access Restriction Bypass

[,58)
  • C
Denial of Service (DoS)

[3.1.1,4.0]
  • H
Resource Management Errors

[,3.6]
  • M
Access Restriction Bypass

[,45.1.0)
  • H
Use After Free

[,10.0.8)(10.0.8,16.0)
  • H
Arbitrary Code Execution

[1.0,1.5.0.7]
  • M
User Impersonation

[,28.0)
  • L
Access Restriction Bypass

[,1.0]
  • H
Authentication Bypass

[,0.7][0.7,0.9.1)
  • H
Out-of-Bounds

[,17.0)
  • M
Information Exposure

[,38.0)
  • C
Out-of-Bounds

[,60.3.0)(60.3.0,63.0)
  • C
Out-of-Bounds

[,40.0)
  • H
Out-of-Bounds

[,1.5.0.9][1.5.0.9,2.0.0.2)
  • H
Remote Code Execution (RCE)

[,2.0.0.19][2.0.0.19,3.0.11)
  • C
CVE-2010-4508

[,4.0]
  • L
CVE-2005-0144

[0.8,0.9.3]
  • H
Improper Input Validation

[,3.1.7][3.1.7,3.5.17)
  • L
CVE-2006-4570

[,1.5.0.7)
  • H
Out-of-Bounds

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Denial of Service (DoS)

[,32.0.1)
  • H
Access Restriction Bypass

[,2.0.0.17)
  • H
Information Exposure

[0.8,1.0.4]
  • H
Out-of-Bounds

[,77.0)
  • M
Information Exposure

[,52.0)
  • C
Use After Free

[,49.0)
  • C
Out-of-Bounds

[,31.1)
  • C
Remote Code Execution (RCE)

[3.5,3.5.2]
  • H
Out-of-Bounds

[,41.0)
  • C
Out-of-Bounds

[,5.0.1)
  • M
Arbitrary Code Execution

[,14.0.1)
  • M
Use of Uninitialized Resource

[,68.1.0)(68.1.0,69.0)
  • C
Resource Management Errors

[,14.0.1)
  • C
Denial of Service (DoS)

[,3.6.3]
  • C
Denial of Service (DoS)

[3.0.1,3.5.3]
  • M
Information Exposure

[0,)
  • C
Out-of-Bounds

[,5.0.1)
  • H
Access Restriction Bypass

[,10.0.8)(10.0.8,16.0)
  • H
Out-of-bounds Write

[,78.12)(78.12,90.0)
  • M
Information Exposure

[,64.0)
  • M
Improper Input Validation

[,67.0)
  • M
Denial of Service (DoS)

[,3.5.5)
  • H
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • M
Authentication Bypass

[,1.0.7)
  • M
Denial of Service (DoS)

[2.0,2.0.0.19)[3.0,3.0.5)
  • C
Resource Management Errors

[,14.0.1)
  • M
Open Redirect

[,84.0)
  • H
Out-of-Bounds

[4.0,12.0]
  • M
Cryptographic Issues

[,55.0)
  • H
Use After Free

[,50.0)
  • M
Denial of Service (DoS)

[,43.0)
  • M
Information Exposure

[,27.0)
  • M
Improper Input Validation

[,31.2][31.2,33.0.1)
  • M
Access Restriction Bypass

[,68.2)(68.2,70.0)
  • M
Out-of-bounds Read

[,52.0)
  • H
Arbitrary Code Execution

[,41.0)
  • H
Code

[,42.0)
  • M
Access Restriction Bypass

[3.0,3.5.3]
  • H
Access Restriction Bypass

[4.0,11.0]
  • H
Out-of-Bounds

[,87.0)
  • H
Use After Free

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • H
Use After Free

[,68.6.0)(68.6.0,74.0)
  • M
Cross-site Scripting (XSS)

[,78.5)(78.5,83.0)
  • H
Denial of Service (DoS)

[,3.0.16)
  • M
Improper Input Validation

[,2.0.0.9)
  • M
Cross-site Scripting (XSS)

[,68.2)(68.2,70.0)
  • M
Cross-site Scripting (XSS)

[,10.0.8)(10.0.8,16.0)
  • C
Resource Management Errors

[,2.0.0.20][2.0.0.20,3.0.7)
  • C
Denial of Service (DoS)

[,3.6.20)
  • H
Out-of-Bounds

[,41.0)
  • H
Access Restriction Bypass

[,17.0.9][17.0.9,24.0)
  • M
Symlink Attack

[0,)
  • C
Out-of-Bounds

[,45.8.0)(45.8.0,52.0)
  • H
Denial of Service (DoS)

[,38.1)
  • H
Information Exposure

[,45.7.0)(45.7.0,51.0)
  • M
Authentication Bypass

[,26.0)
  • M
Information Exposure

[,2.0]
  • H
Out-of-bounds Read

[,89.0.1)
  • H
Arbitrary Code Execution

[2.0,2.0.0.4]
  • C
Out-of-Bounds

[,60.7.1)
  • H
Improper Restriction of Rendered UI Layers or Frames

[,64.0)
  • M
Information Exposure

[,59.0)
  • H
Improper Input Validation

[,59.0)
  • H
Out-of-bounds Read

[,10.0.8)(10.0.8,16.0)
  • M
Arbitrary Code Execution

[0.1,0.7.3]
  • H
Improper Input Validation

[,54.0)
  • H
Remote Code Execution (RCE)

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • H
Out-of-Bounds

[,10.0.8)(10.0.8,16.0)
  • M
Cross-site Scripting (XSS)

[,3.0.14)
  • H
Out-of-Bounds

[,45.0)
  • C
Out-of-Bounds

[,52.4.0)(52.4.0,56.0)
  • H
Improper Input Validation

[,67.0)
  • M
Access Restriction Bypass

[,3.0.6)
  • M
Cross-site Scripting (XSS)

[,1.0.3]
  • H
Improper Input Validation

[,55.0)
  • M
Information Exposure

[,2.0.0.18)
  • M
Resource Management Errors

[,2.0.0.20)
  • H
CVE-2009-3076

[,3.0.14)
  • M
Insecure Default

[,78.0)
  • M
Cross-site Scripting (XSS)

[2.0.0.14,2.0.0.16]
  • M
Directory Traversal

[,2.0.0.17)[3.0,3.0.2)
  • C
Resource Management Errors

[3.5.1,3.5.4]
  • H
Out-of-Bounds

[,52.7.0)(52.7.0,59.0)
  • H
Information Exposure

[,52.3)(52.3,55.0)
  • M
Access of Uninitialized Pointer

[,31.1)
  • M
Information Exposure

[,3.5.8)
  • C
Use After Free

[,52.3.0)(52.3.0,55.0)
  • C
Denial of Service (DoS)

[,20.0)
  • H
Use After Free

[,47.0.2)
  • H
Code

[,38.0.1][38.0.1,38.1)
  • H
Out-of-bounds Write

[,52.7.0)(52.7.0,59.0)
  • M
Improper Access Control

[,63.0)
  • M
Authentication Bypass

[4.0,13.0]
  • M
Information Exposure

[,17.0)
  • M
Cross-site Request Forgery (CSRF)

[,31.5][31.5,37.0)
  • H
Out-of-Bounds

[,10.0.8)(10.0.8,16.0)
  • C
Out-of-Bounds

[,23.0)
  • M
Insufficient Verification of Data Authenticity

[,69.0)
  • H
Denial of Service (DoS)

[,3.0.5)
  • M
Information Exposure

[2.0,2.0.0.19)[3.0,3.0.5)
  • C
Out-of-Bounds

[,16.0.1)
  • C
Out-of-Bounds

[,3.5.17)
  • M
Information Exposure

[0.1,0.7.2]
  • H
Out-of-bounds Write

[,72.0)
  • M
Improper Input Validation

[0,1.1.10-1.fc9)
  • M
Access Restriction Bypass

[,35.0)
  • M
Information Exposure

[,37.0)
  • M
Cross-site Scripting (XSS)

[,68.5.0)(68.5.0,73.0)
  • H
Information Exposure

[,52.1.0)(52.1.0,53.0)
  • C
Denial of Service (DoS)

[3.6,3.6.22]
  • M
Improper Input Validation

[,3.5.2)
  • C
Denial of Service (DoS)

[,1.5.0.7)
  • H
Use After Free

[,68.3)(68.3,71.0)
  • M
Improper Input Validation

[,57.0)
  • C
Buffer Overflow

[,68.8.0)(68.8.0,76.0)
  • H
CVE-2011-2668

[,1.5.0.4)
  • M
CVE-2004-0762

[,0.7][0.7,0.9.1)
  • M
CVE-2021-23956

[,85.0)
  • H
Out-of-Bounds

[4.0,12.0]
  • C
Use After Free

[,65.0)
  • M
Resource Management Errors

[,3.5.2)
  • M
User Impersonation

[,78.9)(78.9,87.0)
  • M
Denial of Service (DoS)

[1.5,1.5.0.9)[2.0,2.0.0.1)
  • H
Out-of-Bounds

[,2.1.0][2.1.0,40.0)
  • C
Use After Free

[,52.6.0)
  • M
Resource Management Errors

[,3.0.3]
  • C
Denial of Service (DoS)

[,24.0][24.0,24.1)
  • H
Improper Access Control

[,59.0)
  • C
Use After Free

[,60.8.0)(60.8.0,68.0)
  • M
CVE-2012-5354

[,16.0)
  • M
Access Restriction Bypass

[,5.0)
  • H
Out-of-Bounds

[2.0,2.0.0.18)[3.0,3.0.4)
  • H
Out-of-Bounds

[,3.0.8][3.0.8,3.5.14)
  • H
Arbitrary Code Execution

[,3.0.6][3.0.6,3.5.12)
  • H
Remote Code Execution (RCE)

[,17.0.2)(17.0.2,18.0)
  • H
Arbitrary Code Execution

[1.5,1.5.0.4]
  • M
Remote Code Execution (RCE)

[,1.0.7)
  • M
Cross-site Scripting (XSS)

[3.5,3.6.3]
  • M
Information Exposure

[,20.0)
  • M
Cross-site Scripting (XSS)

[1.5.0.10,2.0.0.1]
  • H
Out-of-Bounds

[,42.0)
  • L
Authentication Bypass

[,1.0.3]
  • H
Denial of Service (DoS)

[4.0,13.0]
  • H
Denial of Service (DoS)

[4.0,10.2]
  • M
Cross-site Scripting (XSS)

[1.5,2.0.0.3]
  • M
Information Exposure

[,31.4][31.4,36.0)
  • H
Out-of-Bounds

[,41.0)
  • C
Denial of Service (DoS)

[,20.0)
  • M
Information Exposure

[0.8,1.0]
  • H
Use After Free

[,78.13.0)(78.13.0,91.0)
  • M
Information Exposure

[,32.0.1)
  • C
Out-of-Bounds

[,14.0.1)
  • M
Information Exposure

[,42.0)
  • H
Resource Management Errors

[,3.0.8][3.0.8,3.5.14)
  • H
Arbitrary Code Execution

[0.8,1.0.2]
  • H
Resource Management Errors

[4.0,8.0]
  • M
Arbitrary Code Execution

[,1.0.6]
  • M
Cross-site Scripting (XSS)

[,78.5)(78.5,83.0)
  • M
Access Restriction Bypass

[,17.0.6][17.0.6,22.0)
  • H
Directory Traversal

[,2.0.0.5)
  • M
Access Restriction Bypass

[1.5,1.5.0.9)[2.0,2.0.0.1)
  • H
Security Features

[,52.0)
  • C
Out-of-bounds Write

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Use After Free

[,10.0.8)(10.0.8,16.0)
  • M
Denial of Service (DoS)

[,83.0)
  • H
Arbitrary Code Execution

[,45.1.0)
  • H
Improper Input Validation

[,52.0.)
  • H
Out-of-bounds Write

[,78.6.0)(78.6.0,84.0)
  • H
Out-of-Bounds

[,3.0.10][3.0.10,3.5.16)
  • H
Out-of-Bounds

[,40.0)
  • H
Access Restriction Bypass

[4.0,5.0]
  • M
Improper Input Validation

[,54.0)
  • C
Remote Code Execution (RCE)

[,3.0.14)
  • C
Out-of-Bounds

[,66.0)
  • H
Resource Management Errors

[,66.0)
  • M
Information Exposure

[0,)
  • L
Access Restriction Bypass

[1.5,1.5.0.2)
  • H
Remote Code Execution (RCE)

[,2.0.0.19][2.0.0.19,3.0.11)
  • C
Out-of-Bounds

[,43.0)
  • M
Cross-site Scripting (XSS)

[0,1.1.10-1.fc9)
  • M
Remote Code Execution (RCE)

[,3.0.4)
  • H
Remote Code Execution (RCE)

[,22.0)
  • M
Access Restriction Bypass

[,38.0)
  • C
Use After Free

[,45.8.0)(45.8.0,52.0)
  • H
Security Features

[,42.0)
  • H
Out-of-Bounds

[38.0,38.7.1]
  • M
Cross-site Scripting (XSS)

[,2.0.0.12)
  • H
Out-of-Bounds

[3.0.1,3.6.11]
  • H
Out-of-Bounds

[,7.0)
  • H
Key Management Errors

[,55.0)
  • M
Information Exposure

[,78.1)(78.1,79.0)
  • H
Use After Free

[,10.0.11)(10.0.11,17.0)
  • M
Out-of-bounds Read

[,49.0)
  • M
Cross-site Scripting (XSS)

[,1.0.8)
  • C
Out-of-Bounds

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • M
Improper Input Validation

[,56.0)
  • H
Denial of Service (DoS)

[,1.5.0.2)
  • H
Improper Input Validation

[,76.0)
  • C
Denial of Service (DoS)

[,4.0]
  • M
Remote Code Execution (RCE)

[4.0,10.2]
  • C
Resource Management Errors

[,17.0.5][17.0.5,21.0)
  • H
Use After Free

[52.4.0,56.0]
  • C
Resource Management Errors

[,2.0.0.15)
  • M
Cross-site Scripting (XSS)

[,68.0)
  • M
Information Exposure

[,58)
  • M
Arbitrary Code Execution

[0.8,1.0]
  • M
Cross-site Scripting (XSS)

[1.0,1.5]
  • M
Cross-site Scripting (XSS)

[,44.0)
  • M
Arbitrary Code Execution

[,1.5.0.9)
  • M
Information Exposure

[,36.0)
  • H
Access Restriction Bypass

[preview_release,1.5.0.1]
  • M
Access Restriction Bypass

[2.0,3.0.3]
  • C
Use After Free

[,52.2.0)(52.2.0,54.0)
  • H
Remote Code Execution (RCE)

[4.0,7.0]
  • M
Information Exposure

[,47.0)
  • C
Denial of Service (DoS)

[3.1,3.6.13]
  • H
Arbitrary Code Execution

[0.1,1.5.0.9]
  • M
Resource Management Errors

[,2.0.0.21)
  • H
Access Restriction Bypass

[,1.5.0.10)
  • C
Denial of Service (DoS)

[,3.0.14)
  • H
Access Restriction Bypass

[,55.0)
  • M
Code

[,36.0.4]
  • H
Arbitrary Code Execution

[,27.0)
  • M
Improper Data Handling

[,36.0)
  • M
Code

[,44.0)
  • M
Incorrect Authorization

[,68.12)[78.0,78.2)(78.2,80.0)
  • M
Resource Management Errors

[,2.0.0.17][2.0.0.17,3.0.4)
  • M
Denial of Service (DoS)

[,28.0)
  • M
Out-of-Bounds

[,47.0.2)
  • M
Open Redirect

[,51.0)
  • H
Use After Free

[,68.3)(68.3,71.0)
  • C
Out-of-Bounds

[,60.0)(60.0,60.1.0)(60.1.0,61.0)
  • M
Cross-site Scripting (XSS)

[3.0.1,3.0.3]
  • M
Open Redirect

[,78.3)(78.3,81.0)
  • M
Cross-site Scripting (XSS)

[,23.0)
  • L
Arbitrary Code Execution

[0.8,1.0]
  • H
CVE-2005-0147

[0.8,0.9.3]
  • H
Cross-site Request Forgery (CSRF)

[,51.0)
  • M
CVE-2005-1160

[0.8,1.0.2]
  • M
Improper Input Validation

[,2.0.0.20][2.0.0.20,3.0.7)
  • M
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • H
Operation on a Resource after Expiration or Release

[,78.10)(78.10,88.0)
  • C
Denial of Service (DoS)

[,3.0.14)
  • C
Denial of Service (DoS)

[,23.0)
  • H
Denial of Service (DoS)

[,2.0.0.14][2.0.0.14,2.0.0.16)
  • L
CVE-2005-0141

[0.8,0.9.3]
  • C
Use After Free

[,84.0)
  • L
Authentication Bypass

[0.8,1.0]
  • H
Out-of-Bounds

[,68.8.0)(68.8.0,76.0)
  • M
Incorrect Resource Transfer Between Spheres

[78.11.0,89.0)
  • M
Open Redirect

[,78.8)(78.8,86.0)
  • H
NULL Pointer Dereference

[,52.0)
  • C
Code

[,38.0.1][38.0.1,38.1)
  • M
CVE-2019-11754

[,69.0.1)
  • M
Information Exposure

[,52.5.2)
  • M
Cross-site Scripting (XSS)

[,2.0.0.2)
  • H
Denial of Service (DoS)

[0.8,1.0.2]
  • C
Out-of-Bounds

[,2.0.0.17)
  • M
Information Exposure

[,78.7)(78.7,85.0)
  • H
CVE-2006-4561

[,1.5.0.6]
  • M
Denial of Service (DoS)

[,32.0.1)
  • H
Out-of-bounds Write

[,68.2)(68.2,70.0)
  • H
Denial of Service (DoS)

[,78.13.0)(78.13.0,91.0)
  • H
Access Restriction Bypass

[,38.6.0][38.6.0,45.0)
  • H
Out-of-Bounds

[,52.8.0)
  • M
Information Exposure

[,57.0)
  • M
Type Confusion

[,60.7)(60.7,67.0)
  • M
CVE-2005-2706

[,1.0.7)
  • M
Access Restriction Bypass

[,27.0)
  • H
Resource Management Errors

[3.5,3.6.3]
  • M
Access Restriction Bypass

[,17.0.7][17.0.7,23.0)
  • M
Information Exposure

[,43.0)
  • M
Information Exposure

[,32.0.1)
  • C
Out-of-Bounds

[,52.3.0)(52.3.0,55.0)
  • C
Remote Code Execution (RCE)

[3.0,3.5.7]
  • M
Cross-site Scripting (XSS)

[,3.0.6][3.0.6,3.5.12)
  • C
Out-of-Bounds

[,60.8.0)(60.8.0,68.0)
  • M
Improper Input Validation

[,3.1][3.1,3.6.7)
  • H
Out-of-Bounds

[,47.0)
  • M
Resource Management Errors

[3.0.6,3.5.4]
  • M
Denial of Service (DoS)

[,24.7][24.7,31.0)
  • H
Access Restriction Bypass

[,47.0)
  • H
Denial of Service (DoS)

[,40.0)
  • M
Denial of Service (DoS)

[1.5,1.5.0.7]
  • M
Information Exposure

[10.0,10.0.7)(10.0.7,15.0)
  • C
Denial of Service (DoS)

[3.5,3.5.3]
  • M
Information Exposure

[,2.0.0.12)
  • M
Cross-site Scripting (XSS)

[,2.0.0.17)[3.0,3.0.2)
  • H
Information Exposure

[,52.8.0)
  • H
Resource Management Errors

[3.5.1,3.6.6]
  • M
Information Exposure

[,43.0)
  • M
Out-of-Bounds

[,31.5][31.5,38.0)
  • L
Security Features

[,41.0)
  • M
Remote Code Execution (RCE)

[,3.0]
  • H
Information Exposure

[,17.0.3)(17.0.3,19.0)
  • M
Insecure Default

[,70.0)
  • M
Information Management Errors

[,31.2][31.2,33.0.1)
  • M
Arbitrary Code Execution

[preview_release,0.10]
  • C
Denial of Service (DoS)

[,24.0][24.0,24.1)
  • M
CVE-2010-0169

[,3.0.2)
  • H
Use After Free

[,10.0.11)(10.0.11,17.0)
  • C
Denial of Service (DoS)

[3.5.1,3.5.3]
  • H
Use After Free

[,40.0)
  • H
Access Restriction Bypass

[,50)
  • H
Denial of Service (DoS)

[,31.4][31.4,36.0)
  • L
Race Condition

[,78.10)
  • H
Security Features

[,50.0)
  • C
Access Restriction Bypass

[,51.0)
  • M
Insufficient Verification of Data Authenticity

[,78.10)(78.10,88.0)
  • M
CVE-2007-3511

[,2.0.0.8)
  • H
Open Redirect

[,3.5.16)
  • M
Out-of-Bounds

[,41.0)
  • H
Out-of-Bounds

[,10.0.8)(10.0.8,16.0)
  • M
Denial of Service (DoS)

[,2.0.0.3]
  • H
Access Restriction Bypass

[,45.7.0)(45.7.0,51.0)
  • C
Privilege Escalation

[24.0,24.4)(24.4,28.0)
  • H
Denial of Service (DoS)

[4.0,13.0]
  • C
Out-of-Bounds

[,49.0)
  • H
User Impersonation

[24.0,24.3)(24.3,27.0)
  • M
Information Exposure

[,12.0)
  • L
Information Exposure

[4.0,12.0]
  • H
Out-of-bounds Write

[,29.0)
  • H
Out-of-Bounds

[,38.6.0][38.6.0,45.0)
  • M
Access Restriction Bypass

[,2.0.0.15)
  • H
Insecure Permissions

[,50.0)
  • M
Access Restriction Bypass

[4.0,13.0]
  • C
User Impersonation

[,58)
  • C
Denial of Service (DoS)

[0.7,0.7.3]
  • H
CVE-2013-1715

[,23.0)
  • L
Information Exposure

[,1.5]
  • M
Out-of-Bounds

[,31.2][31.2,33.0.1)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,27.0)
  • M
Information Exposure

[,47.0.2)
  • H
Denial of Service (DoS)

[0.8,1.5]
  • C
Use After Free

[,45.9.0)[52.0,52.1.0)(52.1.0,53.0)
  • H
Improper Access Control

[,45.6.0)
  • M
Denial of Service (DoS)

[4.0,13.0]
  • C
Use After Free

[,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0)
  • C
Arbitrary Code Execution

[,24.0][24.0,24.1)
  • M
Denial of Service (DoS)

[31.0,31.7)(38.0,38.0.1)
  • M
Cross-site Scripting (XSS)

[,60.9)[68.0,68.1)(68.1,69.0)
  • H
Code

[,37.0)
  • H
Information Exposure

[,52.8.0)(52.8.0,60.0)
  • C
Use After Free

[,52.6.0)(52.6.0,58.0)
  • H
Access Restriction Bypass

[,14.0.1)
  • M
Incorrect Calculation

[,10.0.4)(10.0.4,12.0)
  • C
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • C
Denial of Service (DoS)

[,24.5][24.5,30.0)
  • M
Remote Code Execution (RCE)

[,2.0.0.12)
  • M
Cross-site Scripting (XSS)

[,50.1)
  • M
Out-of-Bounds

[,41.0)
  • M
Command Injection

[2.0.0.5,3.0]
  • C
Code

[,38.0.1][38.0.1,38.1)
  • H
Buffer Overflow

[,68.3)(68.3,71.0)
  • C
Out-of-bounds Write

[24.0,24.4)(24.4,28.0)
  • H
Use After Free

[,17.0.2)(17.0.2,18.0)
  • M
Cross-site Scripting (XSS)

[,3.0.14)
  • C
Denial of Service (DoS)

[3.5,3.5.2]
  • H
Out-of-Bounds

[,24.7][24.7,31.0)
  • H
Access Restriction Bypass

[,52.2.0)(52.2.0,54.0)
  • M
Improper Verification of Cryptographic Signature

[,60.5.1)
  • M
Improper Input Validation

[,3.5.19)
  • H
Security Features

[,40.0.3)
  • C
Use After Free

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Denial of Service (DoS)

[0.8,1.0]
  • C
Denial of Service (DoS)

[,4.0]
  • M
Improper Input Validation

[,2.0.0.6][2.0.0.6,2.0.0.8)
  • H
Remote Code Execution (RCE)

[,2.0.0.7)
  • C
Out-of-bounds Write

[,60.7.1)
  • M
Cross-site Scripting (XSS)

[,3.5.14)
  • H
Improper Input Validation

[,17.0.9][17.0.9,24.0)
  • M
Access Restriction Bypass

[0,)
  • H
Use After Free

[,58)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • C
Code

[,38.0.1][38.0.1,38.1)
  • M
Directory Traversal

[,3.1.9][3.1.9,3.5.19)
  • H
Out-of-bounds Write

[,78.5)(78.5,83.0)
  • H
Arbitrary Code Injection

[,68.8.0)(68.8.0,76.0)
  • H
Out-of-Bounds

[,42.0)
  • H
Information Exposure

[,52.0)
  • H
Use After Free

[,68.12)
  • H
Information Exposure

[,59.0)
  • M
Improper Input Validation

[3.0,3.6.6]
  • M
Access Restriction Bypass

[,1.0.8)
  • M
Improper Access Control

[,45.1.0)
  • M
CVE-2004-2226

[0.8,1.7.3]
  • H
Double Free

[,68.6.1)(68.6.1,68.7.0)(68.7.0,74.0.1)
  • H
Denial of Service (DoS)

[,3.0.16)
  • M
Code

[,43.0)
  • M
Resource Management Errors

[,3.0]
  • M
Cross-site Scripting (XSS)

[,60.8.0)(60.8.0,68.0)
  • H
Arbitrary Code Execution

[0.8,1.5]
  • H
Out-of-Bounds

[,31.5][31.5,38.0)
  • H
Denial of Service (DoS)

[3.5.1,3.6.6]
  • H
Access Restriction Bypass

[,32.0.1)
  • H
Out-of-bounds Write

[,78.6.0)(78.6.0,84.0)
  • M
Improper Input Validation

[,58)
  • C
Improper Input Validation

[,68.0)
  • H
Denial of Service (DoS)

[1.0,1.5.0.1]
  • M
Improper Input Validation

[,24.6][24.6,30.0)
  • H
Use After Free

[,68.3)(68.3,71.0)
  • C
Resource Management Errors

[,3.5.19)
  • H
Denial of Service (DoS)

[,17.0.3)(17.0.3,19.0)
  • C
Arbitrary Code Execution

[38.0,40.0.2]
  • H
Arbitrary Code Execution

[,31.1)
  • M
Cryptographic Issues

[3.5,3.6.3]
  • H
Out-of-Bounds

[,41.0)
  • C
Denial of Service (DoS)

[,17.0.7][17.0.7,23.0)
  • M
Improper Input Validation

[,45.7.0)(45.7.0,51.0)
  • H
Out-of-Bounds

[,42.0)
  • M
Resource Management Errors

[,2.0.0.9]
  • M
Information Exposure

[,52.9.0)
  • M
Access Restriction Bypass

[,16.0]
  • H
Arbitrary Code Execution

[,1.0.7)
  • M
Denial of Service (DoS)

[,8.0.1)
  • H
Improper Input Validation

[,68.0)
  • H
Race Condition

[,68.1.0)(68.1.0,69.0)
  • M
Information Exposure

[,60.0)
  • C
Improper Access Control

[,56.0)
  • C
Denial of Service (DoS)

[3.5.1,3.5.3]
  • C
Out-of-Bounds

[,45.7.0)(45.7.0,51.0)
  • H
Use After Free

[,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0)
  • H
Denial of Service (DoS)

[,45.0)
  • H
Integer Overflow or Wraparound

[,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0)
  • H
Access Restriction Bypass

[,44.0.2)
  • H
Denial of Service (DoS)

[,14.0.1)
  • M
CVE-2021-29957

[,78.10.2)
  • M
Out-of-Bounds

[3.0.1,3.5.3]
  • H
Out-of-Bounds

[,47.0.2)
  • H
Use After Free

[,55.0)
  • C
Use After Free

[,60.7.0)(60.7.0,67.0)
  • M
Denial of Service (DoS)

[preview_release,0.10.1]
  • M
Cross-site Scripting (XSS)

[,10.0.8)(10.0.8,16.0)
  • H
Information Exposure

[,51.0)
  • C
Out-of-Bounds

[,49.0)
  • C
Out-of-Bounds

[,43.0.4]
  • M
Information Exposure

[,2.0.0.8)
  • H
Use After Free

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • H
Open Redirect

[,86.0)
  • H
CVE-2005-2261

[0.1,1.0.4]
  • H
Privilege Escalation

[,78.10)(78.10,88.0)
  • C
Out-of-bounds Write

[10.0,10.0.7)(10.0.7,15.0)
  • M
Cross-site Scripting (XSS)

[,3.6.2)
  • H
Remote Code Execution (RCE)

[,1.5.0.4)
  • M
Access Restriction Bypass

[,42.0)
  • M
Improper Input Validation

[2.0,2.0.0.19)[3.0,3.0.5)
  • M
Denial of Service (DoS)

[,1.5.0.7)
  • C
Improper Input Validation

[,17.0.7][17.0.7,23.0)
  • M
Denial of Service (DoS)

[,1.5]
  • H
Information Exposure

[,45.6.0)(45.6.0,51.0)
  • M
Improper Input Validation

[,52.3.0)(52.3.0,55.0)
  • M
Improper Input Validation

[,60.0)
  • C
Denial of Service (DoS)

[,24.6][24.6,31.0)
  • C
Out-of-Bounds

[,52.4.0)(52.4.0,56.0)
  • M
Out-of-bounds Read

[,78.0)
  • H
CVE-2006-2787

[preview_release,1.5.0.1]
  • H
Use After Free

[,78.12)(78.12,90.0)
  • M
CVE-2006-6506

[,2.0]
  • H
Out-of-Bounds

[,3.0.10][3.0.10,3.5.16)
  • C
Out-of-Bounds

[,44.0)
  • H
Out-of-Bounds

[1.0,1.5]
  • H
Use After Free

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Information Exposure

[,78.10.1)(78.10.1,87.0)
  • C
Denial of Service (DoS)

[,78.4)(78.4,82.0)
  • M
Denial of Service (DoS)

[,43.0)
  • H
Out-of-Bounds

[,78.7)(78.7,85.0)
  • H
Out-of-Bounds

[,3.0.8][3.0.8,3.5.14)
  • C
Denial of Service (DoS)

[,24.0.1)
  • C
Out-of-Bounds

[,60.4.0)(60.4.0,64.0)
  • M
Out-of-Bounds

[,17.0.5][17.0.5,21.0)
  • M
Improper Certificate Validation

[,45.5.0)(45.5.0,50.0)
  • C
Use After Free

[,52.3.0)(52.3.0,55.0)
  • H
CVE-2020-15681

[,82.0)
  • H
Denial of Service (DoS)

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Cross-site Scripting (XSS)

[,3.0.9)
  • M
Improper Input Validation

[,52.0)
  • H
Denial of Service (DoS)

[,36.0)
  • C
Arbitrary Code Execution

[,0.7][0.7,0.9.1)
  • H
User Impersonation

[,45.6.0)(45.6.0,50.1)
  • H
Denial of Service (DoS)

[,2.0.0.3]
  • C
Improper Input Validation

[,60.9)[61.0,68.1)(68.1,69.0)
  • H
Access Restriction Bypass

[,17.0.5][17.0.5,21.0)
  • H
Use After Free

[,78.5)(78.5,83.0)
  • M
Denial of Service (DoS)

[,64.0)
  • H
Out-of-Bounds

[10.0,10.0.4]
  • M
Information Exposure

[,3.6]
  • C
Arbitrary Code Execution

[,40.0)
  • M
Information Exposure

[3.0.1,3.6.6]
  • H
Denial of Service (DoS)

[24.0,24.5)(24.5,29.0)
  • H
Improper Input Validation

[,72.0)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,27.0)
  • H
Denial of Service (DoS)

[,13.0)
  • C
Remote Code Execution (RCE)

[,3.6.20)
  • C
Remote Code Execution (RCE)

[3.6,3.6.2]
  • M
Improper Input Validation

[,58)
  • C
Use After Free

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • C
Out-of-Bounds

[,45.8.0)(45.8.0,52.0)
  • M
Improper Input Validation

[,1.5.0.4)
  • M
Information Exposure

[,55.0)
  • H
Resource Management Errors

[3.5.1,3.5.5]
  • M
Information Exposure

[,44.0)
  • C
Denial of Service (DoS)

[,3.1.10)
  • H
Use After Free

[,47.0.2)
  • C
Use After Free

[,49.0)
  • M
CVE-2005-1158

[0.8,1.0.2]
  • M
Authentication Bypass

[4.0,11.0]
  • H
Use After Free

[,10.0.11)(10.0.11,17.0)
  • C
Resource Management Errors

[,17.0.6][17.0.6,22.0)
  • M
Information Exposure

[,43.0)
  • M
Information Exposure

[,68.0)
  • C
Improper Input Validation

[2.0,2.0.0.18)[3.0,3.0.2)
  • M
Arbitrary Code Execution

[,1.5]
  • H
Resource Management Errors

[3.5.1,3.6.6]
  • M
Improper Certificate Validation

[,3.6)
  • M
Access Restriction Bypass

[,40.0)
  • H
Denial of Service (DoS)

[preview_release,1.5.0.1]
  • C
Use After Free

[,60.6][60.6,66.0.1)
  • M
Improper Input Validation

[2.0,2.0.0.19)[3.0,3.0.5)
  • H
Arbitrary Code Injection

[,60.8)(60.8,68.0)
  • H
Use After Free

[,17.0.3)(17.0.3,19.0)
  • H
Denial of Service (DoS)

[1.5,1.5.0.4]
  • M
Out-of-bounds Read

[,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0)
  • H
Information Exposure

[,3.0.16)
  • C
Integer Overflow or Wraparound

[,10.0.11)(10.0.11,17.0)
  • H
Out-of-Bounds

[4.0,12.0]
  • M
Improper Input Validation

[,2.0.0.1]
  • C
Use After Free

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
User Enumeration

[,60.7)(60.7,67.0)
  • M
Arbitrary Code Execution

[,3.5.1]
  • H
Improper Input Validation

[,52.4.0)(52.4.0,56.0)
  • H
Use After Free

[,78.3)(78.3,81.0)
  • M
Information Exposure

[,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0)
  • M
User Impersonation

[,60.7)(60.7,67.0)
  • M
Cross-site Scripting (XSS)

[,2.0.0.5]
  • M
Authentication Bypass

[,16.0)
  • M
Cross-site Scripting (XSS)

[,57.0)
  • C
Use After Free

[,17.0)
  • M
Cryptographic Issues

[24.0,24.2)(24.2,26.0)
  • M
Improper Access Control

[,33.0.1)
  • M
Improper Input Validation

[,2.0.0.12)
  • M
Improper Input Validation

[,60.0)
  • M
Denial of Service (DoS)

[,24.7][24.7,31.0)
  • H
Remote Code Execution (RCE)

[,14.0.1)
  • H
Out-of-bounds Write

[24.0,24.4)(24.4,28.0)
  • C
Use After Free

[,45.6.0)(45.6.0,50.1.0)
  • C
Use After Free

[,45.9.0)[52.0,52.1.0)(52.1.0,53.0)
  • C
Use After Free

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Incorrect Type Conversion or Cast

[,60.2.2)(60.2.2,62.0.3)
  • M
Information Exposure

[,42.0)
  • L
Access Restriction Bypass

[1.0.5,1.0.7]
  • H
Resource Management Errors

[,2.0.0.18)
  • M
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • H
Access Restriction Bypass

[,2.0.0.18)
  • M
Denial of Service (DoS)

[,31.5][31.5,38.0)
  • H
Arbitrary Code Execution

[,2.0.0.13)
  • H
Denial of Service (DoS)

[1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1)
  • H
Denial of Service (DoS)

[,3.5.16)
  • C
Resource Management Errors

[,3.5.17)
  • M
Information Exposure

[,3.1.16][3.1.16,3.6.25)
  • M
Arbitrary Code Execution

[17.0,17.0.5)(17.0.5,20.0)
  • H
Out-of-Bounds

[,2.0.0.10)
  • M
Access Restriction Bypass

[4.0,9.0]
  • M
Use of a Risky Cryptographic Algorithm

[,80.0)
  • M
Improper Input Validation

[,60.7.0)(60.7.0,67.0)
  • C
Out-of-bounds Read

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • M
Cross-site Scripting (XSS)

[,3.6)
  • C
Integer Overflow or Wraparound

[,52.8.0)(52.8.0,60.0)
  • M
Cross-site Scripting (XSS)

[,10.0.10)(10.0.10,16.0.2)
  • H
Use After Free

[,10.0.8)(10.0.8,16.0)
  • M
Denial of Service (DoS)

[0,firefox-1.5.0.12-4.fc6)
  • M
Improper Certificate Validation

[,68.10.0)(68.10.0,78.0)
  • H
Insecure Encryption

[,17.0.3)(17.0.3,19.0)
  • H
Denial of Service (DoS)

[2.0,2.0.0.4]
  • H
Out-of-bounds Write

[,60.3)(60.3,63.0)
  • M
Authentication Bypass

[0.8,2.0.0.1]
  • H
Use After Free

[,60.9.0)[68.0,68.1.0)(68.1.0,69.0)
  • M
Information Exposure

[,78.5)(78.5,83.0)
  • H
Out-of-Bounds

[,45.1.0)
  • M
Authentication Bypass

[,2.0.0.7)
  • C
CVE-2013-5615

[24.0,24.2)(24.2,26.0)
  • M
Information Exposure

[3.0,3.0.5]
  • C
Resource Management Errors

[,14.0.1)
  • H
CVE-2020-35112

[,78.6.0)(78.6.0,84.0)
  • M
Cross-site Scripting (XSS)

[,2.0]
  • C
Remote Code Execution (RCE)

[,3.6.20)
  • H
Use After Free

[,50.1.0)
  • C
Buffer Overflow

[24.0,24.5)(24.5,29.0)
  • M
Authentication Bypass

[,1.0.7)
  • H
Resource Management Errors

[,3.0.6][3.0.6,3.5.12)
  • M
Security Features

[,52.3.0)(52.3.0,55.0)
  • H
Access Restriction Bypass

[,1.0.8)
  • M
Cross-site Scripting (XSS)

[,53.0)
  • M
Cross-site Scripting (XSS)

[,1.5.0.7)
  • M
Information Exposure

[4.0,4.0.1]
  • C
Out-of-Bounds

[3.0,3.5.3]
  • L
Information Exposure

[,7.0]
  • H
Buffer Overflow

[,68.2)(68.2,70.0)
  • H
Argument Injection

[,78.10)(78.10,88.0)
  • C
Use After Free

[,52.7.3)(52.7.3,59.0.2)
  • H
Denial of Service (DoS)

[,36.0.4]
  • H
Out-of-Bounds

[,7.0)
  • H
Remote Code Execution (RCE)

[,2.0.0.19][2.0.0.19,3.0.11)
  • H
Denial of Service (DoS)

[,10.0.11)(10.0.11,17.0)
  • M
Cross-site Scripting (XSS)

[,3.0.9)
  • C
Arbitrary Code Execution

[,27.0)
  • C
Out-of-Bounds

[,43.0)
  • H
Insecure Encryption

[,52.8.0)
  • H
Denial of Service (DoS)

[,38.0)
  • C
Use After Free

[,45.7.0)(45.7.0,51.0)
  • M
Denial of Service (DoS)

[,41.0)
  • L
Arbitrary Code Execution

[,1.5.0.7)
  • H
Access Restriction Bypass

[,2.0.0.15)
  • H
Out-of-Bounds

[,45.0)
  • M
Improper Input Validation

[,20.0)
  • H
Out-of-Bounds

[,47.0.2)
  • M
CVE-2021-29975

[,90.0)
  • H
Access Restriction Bypass

[,41.0)
  • H
Out-of-Bounds

[preview_release,1.5.0.3]
  • M
Information Exposure

[,2.0.0.15)
  • M
Arbitrary File Upload

[,68.11)
  • M
Race Condition

[,52.0)
  • M
Cross-site Scripting (XSS)

[,3.0.6][3.0.6,3.5.12)
  • C
Access Restriction Bypass

[4.0,4.0.1]
  • M
Denial of Service (DoS)

[,68.0)
  • C
Out-of-Bounds

[,28.0]
  • M
Authentication Bypass

[,1.5.0.1]
  • C
Resource Management Errors

[,2.0.0.15)
  • H
CVE-2005-1531

[0.8,1.0.3]
  • H
Resource Management Errors

[,17.0.5][17.0.5,21.0)
  • M
Resource Management Errors

[,45.0)
  • M
Access Restriction Bypass

[,45.1.0)
  • H
Improper Input Validation

[,50.0)
  • H
User Impersonation

[,66.0)
  • M
Cross-site Request Forgery (CSRF)

[,17.0)
  • M
Access Restriction Bypass

[4.0,13.0]
  • M
Improper Input Validation

[,50.0)
  • M
Access Restriction Bypass

[,7.0.1)
  • H
Denial of Service (DoS)

[,47.0.2)
  • C
Use After Free

[,52.2.0)(52.2.0,54.0)
  • H
Out-of-Bounds

[,88.0)
  • M
Timing Attack

[,1.5.0.9]
  • C
Resource Management Errors

[,3.0.2)
  • M
User Impersonation

[,66.0)
  • H
Out-of-Bounds

[,41.0)
  • M
Access Restriction Bypass

[,9.0)
  • M
Improper Input Validation

[0.8,1.5]
  • C
Out-of-Bounds

[,61.0)
  • H
Out-of-Bounds

[,3.0.11)
  • L
Improper Input Validation

[,76.0)
  • M
Directory Traversal

[0.8,2.0.0.9]
  • M
Authentication Bypass

[,29.0)
  • C
Improper Input Validation

[,45.6.0)(45.6.0,50.1)
  • H
Remote Code Execution (RCE)

[,2.0.0.20)
  • M
User Impersonation

[,58)
  • M
Improper Initialization

[,68.1.0)(68.1.0,69.0)
  • C
Out-of-Bounds

[,17.0.5][17.0.5,21.0)
  • H
Out-of-Bounds

[,45.1.0)
  • H
Access Restriction Bypass

[,2.0.0.8)
  • M
Unauthorized File Access

[,78.12)
  • C
Improper Authentication

[,68.0.2)
  • M
Incorrect Authorization

[,68.0)
  • M
Cross-site Scripting (XSS)

[4.0,11.0]
  • M
Improper Authentication

[,63.0)
  • H
Access Restriction Bypass

[,17.0.6][17.0.6,22.0)
  • M
User Impersonation

[,68.2)(68.2,70.0)
  • H
Out-of-bounds Read

[,52.2.0)(52.2.0,54.0)
  • M
Improper Input Validation

[,45.5.0)(45.5.0,50.0)
  • H
Use After Free

[,67.0)
  • C
Improper Input Validation

[,60.2.2)(60.2.2,62.0.3)
  • C
Denial of Service (DoS)

[,3.1.11)
  • H
Remote Code Execution (RCE)

[,3.0.6][3.0.6,3.5.12)
  • H
XML External Entity (XXE) Injection

[2.0,2.0.0.18)[3.0,3.0.4)
  • H
Out-of-Bounds

[,58)
  • M
Privilege Escalation

[24.0,24.4)(24.4,28.0)
  • H
Access Restriction Bypass

[0.8,1.5.0.6]
  • H
Security Features

[,52.3.0)(52.3.0,55.0)
  • H
Out-of-Bounds

[,52.7.0)(52.7.0,59.0)
  • C
Use After Free

[,52.3.0)(52.3.0,55.0)
  • H
Improper Input Validation

[,2.0.0.9)
  • H
Out-of-Bounds

[,64.0)
  • C
Integer Overflow or Wraparound

[,50)
  • H
Race Condition

[,78.13.0)(78.13.0,91.0)
  • H
Cross-site Scripting (XSS)

[3.0,3.5.3]
  • H
Resource Management Errors

[4.0,13.0]
  • M
Improper Input Validation

[,66.0)
  • H
Out-of-bounds Read

[,60.8.0)(60.8.0,68.0)
  • C
Out-of-Bounds

[,55.0)
  • M
Authentication Bypass

[4.0,13.0]
  • C
Use After Free

[,60.7)(60.7,67.0)
  • M
Cross-site Scripting (XSS)

[,42.0)
  • M
Improper Authentication

[,72.0)
  • H
Improper Input Validation

[,78.6.0)(78.6.0,84.0)
  • H
Arbitrary Code Execution

[0.8,1.0.4]
  • H
Improper Verification of Cryptographic Signature

[,68.1.1)
  • M
Information Exposure

[0,)
  • H
Arbitrary Code Execution

[,24.6][24.6,31.0)
  • H
Out-of-Bounds

[,32.0.1)
  • C
Improper Input Validation

[,3.5.19)
  • M
Denial of Service (DoS)

[,38.0)
  • H
Out-of-bounds Read

[24.0,24.4)(24.4,28.0)
  • M
Denial of Service (DoS)

[,1.0.4]
  • M
Information Exposure

[,3.6.20)
  • C
Out-of-Bounds

[,44.0)
  • M
Information Exposure

[,2.0.0.20][2.0.0.20,3.0.7)
  • M
Improper Input Validation

[,60.0)(60.0,60.1.0)(60.1.0,61.0)
  • M
Out-of-Bounds

[,36.0)
  • H
Access Restriction Bypass

[,37.0)
  • M
Improper Certificate Validation

[,68.0)
  • H
Arbitrary Code Execution

[1.0,1.5.0.7]
  • M
Improper Input Validation

[,2.0.0.6][2.0.0.6,2.0.0.8)
  • H
Arbitrary Code Execution

[,35.0)
  • H
Resource Management Errors

[,10.0]
  • M
Cross-site Scripting (XSS)

[,3.0.12)
  • H
Denial of Service (DoS)

[,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • H
Denial of Service (DoS)

[4.0,12.0]
  • H
Out-of-Bounds

[,10.0.11)(10.0.11,17.0)
  • H
Out-of-Bounds

[,45.0)
  • M
Race Condition

[,37.0.2)
  • M
Out-of-Bounds

[1.5,1.5.0.9)[2.0,2.0.0.1)
  • H
Denial of Service (DoS)

[,43.0)
  • H
Remote Code Execution (RCE)

[,3.5]
  • M
Access Restriction Bypass

[,86.0)
  • H
Denial of Service (DoS)

[,10.0.8)(10.0.8,16.0)
  • C
Resource Management Errors

[,3.1.10][3.1.10,3.6.18)
  • H
Arbitrary File Upload

[,80.0)
  • C
CVE-2004-0764

[,0.7][0.7,0.9.1)
  • M
Access Restriction Bypass

[,31.1.0)
  • M
Security Features

[,41.0)
  • H
Out-of-bounds Write

[,73.0)
  • L
Session Fixation

[,75.0)
  • M
User Impersonation

[,68.8.0)
  • C
Out-of-Bounds

[,52.0)
  • M
Denial of Service (DoS)

[,31.4][31.4,36.0)
  • M
Incorrect Authorization

[78.11.0,89.0)
  • H
Access Restriction Bypass

[,52.1.0)(52.1.0,53.0)
  • H
Out-of-Bounds

[,10.0.8)(10.0.8,16.0)
  • C
Type Confusion

[,60.6)(60.6,66.0)
  • H
Resource Management Errors

[,2.0.0.14)
  • H
Resource Management Errors

[4.0,12.0]
  • M
Arbitrary Code Execution

[,1.0.8)
  • H
Access Restriction Bypass

[,2.0.0.17)
  • M
Improper Input Validation

[4.0,6.0]
  • M
Information Exposure

[,1.5]
  • M
CVE-2020-15650

[,68.11)
  • H
Use After Free

[,47.0.2)
  • M
Access Restriction Bypass

[,28.0)
  • M
Buffer Overflow

[1.0.1,1.0.2]
  • H
Denial of Service (DoS)

[1.5,1.5.0.4]
  • M
Improper Input Validation

[,52.0)
  • M
Resource Management Errors

[,2.0.0.14]
  • H
Remote Code Execution (RCE)

[,35.0)
  • H
Out-of-bounds Write

[,17.0.3)(17.0.3,19.0)
  • H
CVE-2008-3837

[,2.0.0.17)[3.0,3.0.2)
  • H
Access Restriction Bypass

[3.0,3.5.3]
  • M
Improper Data Handling

[,56.0)
  • M
Improper Input Validation

[,60.6)(60.6,66.0)
  • M
User Impersonation

[,82.0)
  • M
Authentication Bypass

[3.5,3.6.4]
  • M
Cross-site Scripting (XSS)

[,60.0)
  • M
Improper Input Validation

[,1.5]
  • M
Improper Input Validation

[,2.0.0.7]
  • C
Out-of-Bounds

[,2.0.0.8)
  • C
Denial of Service (DoS)

[,3.1.10)
  • M
Out-of-Bounds

[,19.0)
  • M
Race Condition

[0,)
  • H
Out-of-Bounds

[,78.0)
  • H
Arbitrary Code Execution

[1.0,1.0.8)[1.5,1.5.0.2)
  • H
Use After Free

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Resource Management Errors

[,3.6.3]
  • H
Race Condition

[3.0,3.0.10]
  • C
Access Restriction Bypass

[,45.7.0)(45.7.0,51.0)
  • H
CVE-2020-12409

[,77.0)
  • M
Improper Input Validation

[,57.0)
  • M
Arbitrary Code Execution

[0.8,1.0]
  • C
Out-of-Bounds

[,76.0)
  • H
CVE-2004-0866

[,0.9.2]
  • C
Resource Management Errors

[,2.0.0.20)
  • C
Use After Free

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • M
Out-of-Bounds

[,40.0)
  • M
Denial of Service (DoS)

[,78.1)(78.1,79.0)
  • H
Denial of Service (DoS)

[,78.8)(78.8,86.0)
  • M
Information Exposure

[,58)
  • H
Resource Management Errors

[preview_release,1.5.0.1]
  • M
Information Exposure

[,42.0)
  • M
Arbitrary Code Execution

[,1.0]
  • M
Authentication Bypass

[preview_release,1.0.1]
  • H
Out-of-bounds Write

[,10.0.11)(10.0.11,17.0)
  • M
Resource Management Errors

[,2.0.0.24)
  • L
Information Exposure

[,24.0)
  • M
Improper Input Validation

[,45.5.0)(45.5.0,50.0)
  • C
Resource Management Errors

[,60.3.0)(60.3.0,63.0)
  • C
Use After Free

[,45.8.0)(45.8.0,52.0)
  • H
Out-of-bounds Write

[,52.7.0)(52.7.0,52.7.2)(52.7.2,59.0.1)
  • H
Denial of Service (DoS)

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • H
Code

[,38.1)
  • M
Denial of Service (DoS)

[,3.5]
  • H
Out-of-Bounds

[,45.5.0)(45.5.0,50.0)
  • M
Cross-site Scripting (XSS)

[4.0,13.0]
  • H
Resource Management Errors

[,23.0)
  • M
Code

[,37.0)
  • H
Out-of-Bounds

[,38.6.0][38.6.0,45.0)
  • H
Use After Free

[10.0,10.0.11)(10.0.11,17.0)
  • H
Type Confusion

[,60.7.1)(60.7.1,60.7.2)(60.7.2,60.7.3)
  • M
Resource Management Errors

[,3.0.4]
  • M
Information Exposure

[0.6,0.8]
  • C
Out-of-Bounds

[,51.0)
  • C
Out-of-Bounds

[,40.0)
  • M
Information Exposure

[4.0,7.0.1]
  • C
Use After Free

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • C
Buffer Overflow

[,69.0)
  • M
Code

[,42.0)
  • M
Access Restriction Bypass

[3.1,3.6.8]
  • C
Out-of-Bounds

[,38.0.1][38.0.1,38.1)
  • M
CVE-2010-3773

[,3.5.16)
  • M
Cross-site Scripting (XSS)

[1.5,2.0.0.1]
  • M
Insecure Encryption

[,78.9)(78.9,87.0)
  • M
Improper Input Validation

[,24.0)
  • M
Information Exposure

[2.0,2.0.0.4]
  • C
Use After Free

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Resources Downloaded over Insecure Protocol

[,68.9.0)
  • H
Out-of-Bounds

[,49.0)
  • H
Use After Free

[,68.10)(68.10,68.10.0)(68.10.0,78.0)
  • M
Access Restriction Bypass

[,16.0)
  • H
Denial of Service (DoS)

[,3.0.5)
  • M
Improper Input Validation

[,3.0.5]
  • C
Access Restriction Bypass

[,51.0.3)
  • M
Authentication Bypass

[,67.0)
  • M
Brute Force

[,91.0)
  • H
Improper Validation

[,60.9.0)[68.0,68.1.0)(68.1.0,69.0)
  • H
Remote Code Execution (RCE)

[,3.0.14)
  • M
CVE-2019-11730

[,60.8)(60.8,68.0)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,26.0)
  • M
Improper Input Validation

[,28.0)
  • H
Denial of Service (DoS)

[,38.0)
  • M
Arbitrary Code Execution

[,2.0.0.5)
  • H
Denial of Service (DoS)

[,10.0.11)(10.0.11,17.0)
  • M
Use of Uninitialized Resource

[,68.5.0)
  • M
Cross-site Scripting (XSS)

[2.0,2.0.0.4]
  • M
Cryptographic Issues

[3.5.10,4.0]
  • M
Improper Input Validation

[,3.1.11][3.1.11,5.0)
  • C
Denial of Service (DoS)

[,3.0.12)
  • M
Information Exposure

[,60.2.1)(60.2.1,62.0)
  • H
Out-of-Bounds

[,3.1.8)
  • M
Cross-site Scripting (XSS)

[10.0,10.0.10)(10.0.10,16.0.2)
  • H
Resource Management Errors

[,2.0.0.20][2.0.0.20,3.0.7)
  • H
Out-of-Bounds

[78.11.0,89.0)
  • H
Use After Free

[,10.0.8)(10.0.8,16.0)
  • H
Resource Management Errors

[,3.0.3][3.0.3,3.5.8)
  • C
Out-of-Bounds

[,24.0][24.0,24.1)
  • M
Access Restriction Bypass

[,31.3.0][31.3.0,35.0)
  • C
Out-of-Bounds

[,58)
  • M
Cross-site Request Forgery (CSRF)

[,27.0.1)
  • M
Information Exposure

[,2.0.0.12)
  • M
Improper Input Validation

[,47.0.2)
  • C
Access Restriction Bypass

[,60.1.0)(60.1.0,61.0)
  • H
Out-of-bounds Read

[,60.0)
  • H
Arbitrary Code Execution

[1.5,1.5.0.4]
  • H
Untrusted Search Path

[,66.0)
  • M
Remote Code Execution (RCE)

[,2.0.0.8)
  • C
Resource Management Errors

[,3.0.12)
  • C
Out-of-Bounds

[,52.2.0)(52.2.0,54.0)
  • M
Improper Input Validation

[,3.5.8)
  • H
Access Restriction Bypass

[3.6,3.6.1]
  • C
Use After Free

[,52.4.0)(52.4.0,56.0)
  • M
Information Exposure

[,41.0)
  • M
Resource Management Errors

[,2.0.0.20)
  • C
Use After Free

[,45.7.0)(45.7.0,51.0)
  • H
Out-of-bounds Read

[,17.0.3)(17.0.3,19.0)
  • M
Denial of Service (DoS)

[,2.0]
  • C
Out-of-Bounds

[,54.0)
  • H
Privilege Escalation

[24.0,24.5)(24.5,29.0)
  • M
Information Exposure

[,57.0)
  • H
Denial of Service (DoS)

[,31.5][31.5,38.0)
  • M
Denial of Service (DoS)

[,80.0)
  • H
Open Redirect

[49.0,50.0]
  • H
Use After Free

[,68.6.1)(68.6.1,68.7.0)(68.7.0,74.0.1)
  • C
Out-of-Bounds

[,68.0)
  • H
Resource Management Errors

[,8.0]
  • M
Access Restriction Bypass

[,3.0.8][3.0.8,3.5.14)
  • M
Improper Access Control

[,33.0.1)
  • M
CVE-2007-4879

[,2.0.0.13)
  • H
Use After Free

[,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0)
  • H
Use After Free

[,52.2.0)(52.2.0,54.0)
  • M
Remote Code Execution (RCE)

[,3.0.3][3.0.3,3.0.18)
  • C
Denial of Service (DoS)

[3.0.1,3.0.14]
  • M
Cross-site Scripting (XSS)

[,57.0)
  • C
Denial of Service (DoS)

[,22.0)
  • H
Out-of-bounds Write

[,68.3)(68.3,68.3.0)(68.3.0,71.0)
  • M
Information Exposure

[,58)
  • H
Information Exposure

[,59.0)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,83.0)
  • M
Information Exposure

[1.5.0.1,1.5.0.3]
  • H
Access Restriction Bypass

[,57.0)
  • H
Arbitrary Code Injection

[,52.5.2)
  • H
Use After Free

[,17.0.2)(17.0.2,18.0)
  • H
Out-of-Bounds

[,68.7.0)(68.7.0,75.0)
  • C
Out-of-bounds Read

[24.0,24.4)(24.4,28.0)
  • M
Improper Input Validation

[0,)
  • M
Cross-site Scripting (XSS)

[,10.0.8)(10.0.8,16.0)
  • M
Improper Input Validation

[,68.1.0)(68.1.0,69.0)
  • H
Out-of-Bounds

[,41.0)
  • M
Improper Input Validation

[,3.5.16)
  • M
Denial of Service (DoS)

[,2.0.0.12)
  • M
Access Restriction Bypass

[,3.6.22][3.6.22,5.0.1)
  • H
Use After Free

[,52.0)
  • C
Out-of-Bounds

[,68.7.0)(68.7.0,75.0)
  • H
Denial of Service (DoS)

[,3.0.3][3.0.3,3.5.8)
  • M
Cross-site Scripting (XSS)

[,78.5)(78.5,83.0)
  • H
CVE-2007-1736

[,2.0.0.3]
  • H
Out-of-Bounds

[,45.6)(45.6,45.6.0)(45.6.0,50.1)
  • M
Cross-site Scripting (XSS)

[4.0,11.0]
  • C
Arbitrary Code Execution

[0.7,0.7.3]
  • M
Cross-site Scripting (XSS)

[,3.1.19][3.1.19,3.6.28)
  • H
Integer Overflow or Wraparound

[,60.0)(60.0,60.1.0)(60.1.0,61.0)
  • C
Denial of Service (DoS)

[,24.0][24.0,24.1)
  • C
Arbitrary Code Execution

[0,)
  • M
Out-of-Bounds

[,41.0)
  • C
Denial of Service (DoS)

[3.5,3.5.2]
  • M
Improper Input Validation

[,52.2.0)(52.2.0,54.0)
  • C
Arbitrary Code Execution

[,24.6][24.6,31.0)
  • H
Out-of-Bounds

[,10.0.11)(10.0.11,17.0)
  • M
Information Exposure

[,56.0)
  • H
Interpretation Conflict

[,78.13.0)(78.13.0,91.0)
  • H
Out-of-Bounds

[,3.0.6][3.0.6,3.5.12)
  • H
Denial of Service (DoS)

[,14.0.1)
  • M
CVE-2018-18497

[,64.0)
  • H
Out-of-Bounds

[,1.5.0.7)
  • M
Cross-site Scripting (XSS)

[,20.0)
  • M
Out-of-Bounds

[,42.0)
  • M
Cross-site Scripting (XSS)

[,2.0.0.13)
  • C
Access Restriction Bypass

[,60.5.0)(60.5.0,65.0)
  • C
Use After Free

[,47.0.2)
  • M
Access Restriction Bypass

[,3.0.6][3.0.6,3.5.12)
  • M
Information Exposure

[,45.0)
  • H
Buffer Overflow

[,68.4)(68.4,72.0)
  • M
Cross-site Request Forgery (CSRF)

[,3.5.17)
  • M
CVE-2018-18506

[,65.0)
  • C
Resource Management Errors

[4.0,11.0]
  • C
Improper Input Validation

[,52.9.0)[52.9.1,60.0)(60.0,60.1.0)(60.1.0,61.0)
  • H
Access Restriction Bypass

[,17.0.6][17.0.6,22.0)
  • H
Use After Free

[,60.0)
  • C
Out-of-Bounds

[,65.0)
  • M
Symlink Attack

[,3.0.6)
  • M
Denial of Service (DoS)

[0.1,2.0]
  • M
Access Restriction Bypass

[,3.1][3.1,3.6.7)
  • M
Access Restriction Bypass

[,22.0)
  • C
Error Handling

[,45.8.0)(45.8.0,52.0)
  • M
Information Exposure

[,78.8)(78.8,86.0)
  • H
Remote Code Execution (RCE)

[1.5,2.0.0.3]
  • C
Out-of-Bounds

[,60.6.0)(60.6.0,66.0)
  • H
Out-of-Bounds

[3.1,3.6.6]
  • H
Out-of-Bounds

[,45.5.0)(45.5.0,50.0)
  • C
Denial of Service (DoS)

[,82.0)
  • M
Improper Input Validation

[,52.1.0)(52.1.0,53.0)
  • C
Denial of Service (DoS)

[4.0,11.0]
  • M
Security Features

[,45.6.0)(45.6.0,50.1)
  • M
CVE-2020-26976

[,84.0)
  • H
Information Exposure

[,66.0)
  • M
CVE-2006-6585

[2.0,3.0]
  • M
Authentication Bypass

[,2.0]
  • H
Arbitrary Code Execution

[1.5,1.5.0.4]
  • C
Denial of Service (DoS)

[,24.7][24.7,31.0)
  • M
Denial of Service (DoS)

[,44.0)
  • H
Arbitrary Code Execution

[0.8,1.0.4]
  • C
Out-of-Bounds

[,38.0.1][38.0.1,38.1)
  • C
Resource Management Errors

[,3.1.10][3.1.10,3.6.18)
  • H
Denial of Service (DoS)

[2.0.0.0,2.0.0.4]
  • H
Information Exposure

[,68.10.1)
  • M
Cryptographic Issues

[,38.1)
  • H
Use After Free

[,10.0.8)(10.0.8,16.0)
  • M
Improper Input Validation

[,60.0)
  • H
Information Exposure

[,60.0)
  • C
Access Restriction Bypass

[,50.0)
  • C
Denial of Service (DoS)

[24.0,24.2)(24.2,26.0)
  • M
Cross-site Scripting (XSS)

[,58.0.1)
  • C
Out-of-Bounds

[,52.1.0)(52.1.0,53.0)
  • M
Denial of Service (DoS)

[,2.0.0.3]
  • H
Access Restriction Bypass

[,12.0]
  • H
Remote Code Execution (RCE)

[,24.6][24.6,31.0)
  • M
Improper Input Validation

[,68.5.0)(68.5.0,73.0)
  • M
Information Exposure

[,43.0)
  • H
Out-of-Bounds

[,68.2)(68.2,69.0)
  • H
Out-of-Bounds

[,3.0.6][3.0.6,3.5.12)
  • C
Out-of-Bounds

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • M
Security Features

[,41.0)
  • M
Improper Input Validation

[,52.8.0)(52.8.0,52.8)
  • M
Information Exposure

[,85.0)
  • M
Information Exposure

[,52.8.0)
  • M
Access Restriction Bypass

[,3.0.11)
  • C
Denial of Service (DoS)

[,3.0.14)
  • C
Out-of-Bounds

[,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0)
  • M
Improper Authentication

[,2.0.0.13)
  • H
Out-of-Bounds

[,50.1)
  • M
Access Restriction Bypass

[,2.0.0.1]
  • H
Out-of-Bounds

[,3.0.2)
  • H
Access Restriction Bypass

[,17.0)
  • H
Denial of Service (DoS)

[,3.0.5)
  • M
Access Restriction Bypass

[,67.0)
  • M
User Enumeration

[,78.0)
  • C
Resource Management Errors

[,2.0.0.17)[3.0,3.0.2)
  • M
Race Condition

[,41.0)
  • H
Out-of-Bounds

[,91.0)
  • H
Type Confusion

[,60.6.1)(60.6.1,66.0.1)
  • M
Cross-site Scripting (XSS)

[1.0,1.0.8)
  • C
Denial of Service (DoS)

[,30.0)
  • H
Denial of Service (DoS)

[,88.0)
  • C
Denial of Service (DoS)

[,30.0)
  • M
Security Features

[,47.0.2)
  • L
CVE-2006-3812

[0,1.0.4)
  • C
Denial of Service (DoS)

[,3.1.10)
  • M
Improper Input Validation

[,52.8.0)
  • M
Information Exposure

[,3.0.9)
  • M
Symlink Attack

[,58)
  • H
Improper Authentication

[,2.0.0.15)
  • H
Out-of-bounds Write

[,83.0)
  • C
Denial of Service (DoS)

[,5.0.1)
  • M
Information Exposure

[,41.0)
  • M
Information Exposure

[,38.1)
  • H
Missing Initialization of Resource

[,78.10)(78.10,88.0)
  • H
Improper Access Control

[,57.0)
  • H
Resource Management Errors

[,66.0)
  • M
Cross-site Scripting (XSS)

[,3.0.14)
  • M
Out-of-Bounds

[,40.0)
  • H
Arbitrary Code Execution

[2.0,2.0.0.4]
  • M
CVE-2005-0142

[0.6,0.9]
  • H
Cross-site Scripting (XSS)

[0.8,1.0.2]
  • C
Resource Management Errors

[,2.0.0.20][2.0.0.20,3.0.7)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • M
Insecure Default

[,68.1.0)(68.1.0,69.0)
  • H
Out-of-Bounds

[,78.9)(78.9,87.0)
  • H
Improper Input Validation

[,52.1.0)(52.1.0,53.0)
  • H
Resource Management Errors

[,17.0.9][17.0.9,24.0)
  • M
Access Restriction Bypass

[,22.0)
  • M
Cross-site Scripting (XSS)

[,57.0)
  • M
Improper Input Validation

[,53.0)
  • M
Improper Access Control

[,47.0)
  • C
Out-of-Bounds

[,30.0)
  • M
Denial of Service (DoS)

[,2.0.0.24)
  • H
Access Restriction Bypass

[,21.0)
  • M
Improper Input Validation

[,17.0.2)(17.0.2,18.0)
  • C
Denial of Service (DoS)

[,3.1.10)
  • H
Remote Code Execution (RCE)

[,24.6][24.6,31.0)
  • M
Information Exposure

[,5.0.1)
  • L
Information Exposure

[,88.0)
  • M
Resource Management Errors

[,3.5.7)
  • C
Denial of Service (DoS)

[,24.0][24.0,24.1)
  • C
Denial of Service (DoS)

[,20.0)
  • M
Information Exposure

[10.0,10.0.7)(10.0.7,15.0)
  • M
Cross-site Scripting (XSS)

[1.5,1.5.0.4]
  • H
CVE-2010-3181

[,3.0.8][3.0.8,3.5.14)
  • M
Authentication Bypass

[,88.0)
  • C
Use After Free

[,52.6.0)(52.6.0,58.0)
  • L
Denial of Service (DoS)

[,1.5]
  • M
Cross-site Scripting (XSS)

[,68.4)(68.4,72.0)
  • M
Information Exposure

[,80.0)
  • M
Information Exposure

[,56.0)
  • M
Information Exposure

[,45.5.0)(45.5.0,50.0)
  • C
Out-of-Bounds

[,31.1)
  • H
Use After Free

[,68.2)(68.2,70.0)
  • M
Information Exposure

[,35.0)
  • C
Use After Free

[,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0)
  • H
Cross-site Scripting (XSS)

[,3.6.20)
  • C
Out-of-Bounds

[,75.0)
  • H
Denial of Service (DoS)

[,3.0.5)
  • H
Security Features

[,45.6.0)(45.6.0,50.1)
  • M
Denial of Service (DoS)

[,1.5.0.9)
  • L
CVE-2006-1736

[,1.0.8)
  • M
Cryptographic Issues

[,3.0.8][3.0.8,3.5.14)
  • M
Information Exposure

[,49.0)
  • M
Access Restriction Bypass

[,7.0)
  • M
Improper Input Validation

[,56.0)
  • H
Out-of-bounds Write

[,16.0.1)
  • H
Cryptographic Issues

[0,)
  • M
Information Exposure

[,83.0)
  • L
Cryptographic Issues

[0,)
  • L
Cryptographic Issues

[0,)
  • M
Improper Input Validation

[0,)
  • M
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[,3.1]
  • H
Out-of-Bounds

[,3.1]
  • M
Resource Management Errors

[,3.1]
  • M
Authentication Bypass

[,1.0]
  • C
Out-of-Bounds

[,48.0)
  • M
Out-of-Bounds

[4.0,12.0]
  • H
Denial of Service (DoS)

[,44.0)
  • H
Race Condition

[,24.3)(24.3,24.3.0)(24.3.0,27.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Out-of-Bounds

[,42.0)
  • M
Cryptographic Issues

[,44.0)
  • M
Improper Input Validation

[,2.0.0.22)[2.0.0.22,3.3)
  • M
Insecure Encryption

[,24.3)(24.3,24.3.0)(24.3.0,27.0)
  • C
Arbitrary Code Execution

[0,31.0)
  • H
Denial of Service (DoS)

[,45.0)
  • M
CVE-2006-5462

[1.5,1.5.0.7]
  • M
Improper Input Validation

[,1.5.0.7)
  • H
Out-of-Bounds

[,42.0)
  • H
Denial of Service (DoS)

[,47.0)
  • M
Out-of-Bounds

[,20.0)
  • M
Out-of-Bounds

[1.5,1.5.0.10)[2.0,2.0.0.2)
  • M
Denial of Service (DoS)

[,1.5.0.10)
  • M
Denial of Service (DoS)

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Cryptographic Issues

[,24.8.0)[24.8.0,32.0.1)
  • C
Out-of-Bounds

[,42.0)
  • H
Out-of-Bounds

[,54.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Improper Data Handling

[,45.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Improper Data Handling

[,45.0)
  • H
Out-of-Bounds

[,38.5.2)
  • C
Out-of-bounds Read

[,54.0)
  • H
Out-of-bounds Read

[,54.0)
  • H
Out-of-Bounds

[,54.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Out-of-Bounds

[,45.0)
  • C
Out-of-Bounds

[,52.2.0)(52.2.0,54.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Out-of-Bounds

[,38.5.1][38.5.1,43.0)
  • H
Out-of-Bounds

[,45.0)
  • H
Out-of-bounds Read

[,54.0)
  • H
Out-of-Bounds

[,54.0)
  • M
Denial of Service (DoS)

[,38.5.2)
  • H
Out-of-Bounds

[,45.0)
  • H
Out-of-Bounds

[,38.5.2)
  • C
Buffer Overflow

[,3.0.6)[3.0.7,3.1.1)(3.1.1,3.5.11)[3.5.12,3.6.7)
  • M
Cryptographic Issues

[0,)
  • L
Cryptographic Issues

[,39.0]