| Use After Free | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Verification of Cryptographic Signature | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Authentication Bypass | |
| Use After Free | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| CVE-2021-29983 | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Certificate Validation | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Denial of Service (DoS) | [preview_release,1.5.0.1] |
| Unsafe Dependency Resolution | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
| Integer Overflow or Wraparound | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2005-2260 | |
| Use After Free | [10.0,10.0.11)(10.0.11,17.0) |
| Cross-site Scripting (XSS) | |
| Improper Authentication | [2.0,2.0.0.18)[3.0,3.0.4) |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Type Confusion | |
| Out-of-Bounds | |
| Out-of-bounds Read | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Use After Free | |
| Resource Management Errors | |
| Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Denial of Service (DoS) | |
| Improper Access Control | |
| CVE-2005-0588 | |
| Arbitrary Code Injection | |
| Cross-site Request Forgery (CSRF) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Authentication Bypass | |
| Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Resource Management Errors | |
| Unsafe Dependency Resolution | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Remote Code Execution (RCE) | |
| Access Restriction Bypass | |
| Resource Management Errors | [2.0,2.0.0.19)[3.0,3.0.5) |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Denial of Service (DoS) | |
| Use After Free | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
| Use of Uninitialized Resource | |
| Out-of-Bounds | |
| Access Restriction Bypass | [,31.5][31.5,31.5.3][31.5.3,37.0) |
| Race Condition | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Arbitrary Code Execution | |
| CVE-2005-0145 | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Deserialization of Untrusted Data | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Write | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Use After Free | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | [2.0,2.0.0.18)[3.0,3.0.4) |
| CVE-2006-1727 | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Remote Code Execution (RCE) | |
| Security Features | |
| Security Features | |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| CVE-2013-0797 | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Cryptographic Issues | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Resource Management Errors | |
| Use of Uninitialized Resource | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Security Features | |
| Resource Management Errors | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Release of Invalid Pointer or Reference | |
| CVE-2008-5503 | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | [,31.6][31.6,37.0.2][37.0.2,38.0.1) |
| Resource Management Errors | [2.0,2.0.0.18)[3.0,3.0.4) |
| Denial of Service (DoS) | |
| Out-of-Bounds | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Information Exposure | |
| Buffer Overflow | |
| Improper Input Validation | |
| Argument Injection | |
| Denial of Service (DoS) | |
| CVE-2012-4206 | |
| Denial of Service (DoS) | [,31.5][31.5,31.5.3][31.5.3,37.0) |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | [10.0,10.0.11)(10.0.11,17.0) |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Security Features | |
| Incorrect Calculation | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Handling of Exceptional Conditions | |
| Out-of-Bounds | |
| Information Exposure | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Access Restriction Bypass | |
| Insufficiently Protected Credentials | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-bounds Write | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Resource Management Errors | |
| Memory Leak | |
| Security Features | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-bounds Write | |
| Directory Traversal | |
| Incorrect Authorization | |
| Resource Management Errors | [2.0,2.0.0.18)[3.0,3.0.4) |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| Arbitrary Code Injection | |
| Information Exposure | |
| CVE-2015-0833 | |
| CVE-2005-2602 | |
| Improper Input Validation | |
| Information Exposure | |
| CVE-2006-2786 | |
| Arbitrary Code Injection | |
| Information Exposure | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Information Exposure | |
| Use After Free | |
| Access Restriction Bypass | [,31.5][31.5,31.5.3][31.5.3,37.0) |
| CVE-2004-0909 | |
| Type Confusion | |
| User Impersonation | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2012-1943 | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Information Exposure | [1.5,1.5.0.10)[2.0,2.0.0.2) |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Remote Code Execution (RCE) | |
| Resource Management Errors | |
| Information Exposure | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Code | |
| Information Exposure | |
| CVE-2009-2471 | |
| Remote Code Execution (RCE) | [,3.6.22][3.6.22,6.0][6.0,7.0) |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Buffer Overflow | |
| Privilege Escalation | |
| Missing Initialization of Resource | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Insecure Default | |
| Resource Management Errors | |
| Access Restriction Bypass | [1.0,3.1.19][3.1.19,3.6.28)(4.0,5.0)(5.0,10.0.1) |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Remote Code Execution (RCE) | |
| Resource Management Errors | [2.0,2.0.0.19)[3.0,3.0.5) |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Privilege Escalation | |
| Buffer Overflow | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Out-of-Bounds | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | [1.0,1.0.8)(1.0.8,1.5.0.1) |
| Out-of-Bounds | |
| Resources Downloaded over Insecure Protocol | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Information Exposure | |
| Access Restriction Bypass | |
| Race Condition | |
| Remote Code Execution (RCE) | [1.5,1.5.0.10)[2.0,2.0.0.2) |
| Use After Free | |
| Out-of-bounds Write | [,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0) |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Improper Access Control | |
| Security Features | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Information Exposure | |
| Resource Management Errors | |
| Code | |
| Use After Free | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| User Enumeration | |
| Denial of Service (DoS) | |
| Resource Management Errors | [1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1) |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Use After Free | [,78.4.1)(78.4.1,78.4.2)(78.4.2,82.0.3) |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Authentication Bypass | |
| CVE-2006-1942 | |
| Cross-site Scripting (XSS) | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| Use After Free | |
| Cross-site Scripting (XSS) | [10.0,10.0.11)(10.0.11,17.0) |
| Use After Free | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Security Features | |
| Access Restriction Bypass | |
| User Impersonation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Authentication Bypass | |
| Out-of-Bounds | |
| Release of Invalid Pointer or Reference | |
| Use After Free | |
| Authentication Bypass | |
| Use After Free | |
| Information Exposure | |
| Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
| Remote Code Execution (RCE) | |
| Improper Input Validation | |
| User Impersonation | [,68.11)[78.0,78.1)(78.1,79.0) |
| Improper Verification of Cryptographic Signature | |
| CVE-2020-12412 | |
| Denial of Service (DoS) | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| CVE-2005-4685 | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Out-of-Bounds | [52.0,52.1.0)(52.1.0,52.3)(52.3,55.0) |
| Out-of-bounds Write | |
| Security Features | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| CVE-2018-12403 | |
| Information Exposure | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| User Impersonation | |
| Arbitrary Code Execution | |
| Cryptographic Issues | |
| Insufficient Verification of Data Authenticity | |
| Use After Free | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Use After Free | |
| Cross-site Scripting (XSS) | [2.0,2.0.0.19)[3.0,3.0.5) |
| Improper Preservation of Permissions | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Use After Free | |
| Directory Traversal | |
| CVE-2009-0253 | |
| CVE-2009-3370 | |
| Remote Code Execution (RCE) | |
| Cross-site Request Forgery (CSRF) | |
| Authentication Bypass | [0,firefox-1.5.0.12-4.fc6) |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| Remote Code Execution (RCE) | [1.5,1.5.0.9)[2.0,2.0.0.1) |
| Cross-site Scripting (XSS) | |
| Cryptographic Issues | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Use After Free | |
| CVE-2021-23960 | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | [10.0,10.0.7)(10.0.7,15.0) |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Out-of-Bounds | [,52.9)[53.0,60.1)(60.1,61.0) |
| Information Exposure | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | [10.0,10.0.7)(10.0.7,15.0) |
| Arbitrary Code Execution | |
| User Impersonation | [10.0,10.0.9)(10.0.9,16.0.1) |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | [10.0,10.0.11)(10.0.11,17.0) |
| Use After Free | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Security Features | |
| Improper Validation of Array Index | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Code | |
| Arbitrary Code Execution | |
| User Enumeration | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
| Insecure Encryption | [,17.0.11)[24.1.0,24.1.1)(24.1.1,25.0.1) |
| Improper Access Control | |
| Out-of-Bounds | |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Type Confusion | |
| Use After Free | |
| Arbitrary Code Execution | |
| Improper Input Validation | [1.0,3.1.19][3.1.19,3.6.28)(4.0,5.0)(5.0,10.0.1) |
| Information Exposure | |
| Cross-site Request Forgery (CSRF) | |
| Information Exposure | |
| User Impersonation | |
| Cross-site Scripting (XSS) | [1.5,1.5.0.10)[2.0,2.0.0.2) |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Authentication Bypass | |
| Remote Code Execution (RCE) | |
| Untrusted Search Path | |
| Out-of-Bounds | |
| Open Redirect | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2019-11711 | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Incorrect Type Conversion or Cast | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| CVE-2021-29974 | |
| Security Features | |
| Use of Uninitialized Resource | |
| Information Exposure | |
| Improper Access Control | |
| CVE-2004-1449 | |
| Out-of-bounds Write | |
| Information Exposure | |
| Security Features | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Out-of-Bounds | [1.5,1.5.0.10)[2.0,2.0.0.2) |
| Information Exposure | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Authentication Bypass | |
| Denial of Service (DoS) | [,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0) |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| CVE-2021-23962 | |
| Out-of-Bounds | |
| Insecure Permissions | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| CVE-2020-26967 | |
| CVE-2013-0774 | |
| Information Exposure | |
| Denial of Service (DoS) | |
| CVE-2005-2263 | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | [,52.9)[53.0,60.1.0)(60.1.0,61.0) |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Authentication Bypass | |
| Security Features | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Integer Overflow or Wraparound | [,60.0)(60.0,60.1)(60.1,61.0) |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Authentication | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Resource Management Errors | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Insufficiently Protected Credentials | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Privilege Escalation | |
| Access Restriction Bypass | |
| Use After Free | |
| Privilege Escalation | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| CVE-2007-3827 | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | [,2.0.0.20][2.0.0.20,3.0.7) |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Access Control | |
| Out-of-bounds Write | |
| Remote Code Execution (RCE) | |
| Use of a Risky Cryptographic Algorithm | |
| Directory Traversal | |
| Information Exposure | |
| Security Features | |
| Cross-site Scripting (XSS) | |
| Use After Free | [10.0,10.0.11)(10.0.11,17.0) |
| Improper Check for Unusual or Exceptional Conditions | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Access Control | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Symlink Attack | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Resource Management Errors | |
| Out-of-bounds Read | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Access Control | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-bounds Write | |
| Race Condition | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | [2.0,2.0.0.18)[3.0,3.0.4) |
| Out-of-Bounds | |
| Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Authentication Bypass | [,2.0.0.20][2.0.0.20,3.0.7) |
| Improper Input Validation | |
| Information Exposure | |
| NULL Pointer Dereference | |
| Out-of-bounds Write | [,45.9.0)[52.0,52.1.0)(52.1.0,53.0) |
| Out-of-Bounds | |
| Information Exposure | |
| Authentication Bypass | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Remote Code Execution (RCE) | |
| CVE-2011-2980 | |
| Authentication Bypass | |
| Type Confusion | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Buffer Overflow | [,10.0.11)(10.0.11,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Security Features | |
| Denial of Service (DoS) | |
| Information Exposure | |
| CVE-2010-3182 | |
| CVE-2006-6077 | |
| Cross-site Request Forgery (CSRF) | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
| Improper Input Validation | |
| Type Confusion | |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Remote Code Execution (RCE) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Remote Code Execution (RCE) | [,2.0.0.19][2.0.0.19,3.0.11) |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Authentication | |
| Improper Preservation of Permissions | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | [,2.0.0.20][2.0.0.20,3.0.7) |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-Bounds | [0,firefox-1.5.0.12-4.fc6) |
| CVE-2008-0594 | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Race Condition | |
| Arbitrary Code Execution | |
| Out-of-bounds Write | [,68.11)[78.0,78.0.1][78.0.1,78.1.0)(78.1.0,79.0) |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Improper Access Control | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Directory Traversal | |
| Information Exposure | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Access Restriction Bypass | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| User Impersonation | |
| Security Features | |
| Improper Access Control | |
| Authentication Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Authentication Bypass | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Race Condition | |
| Arbitrary Code Injection | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Information Exposure | |
| CVE-2007-3845 | |
| Improper Input Validation | |
| Cryptographic Issues | |
| Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | [,52.3.0)(52.3.0,52.3)(52.3,55.0) |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Security Features | [,52.9)[53.0,60.1.0)(60.1.0,61.0) |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | [2.0,2.0.0.19)[3.0,3.0.5) |
| Arbitrary Code Injection | [10.0,10.0.10)(10.0.10,16.0.2) |
| Out-of-Bounds | |
| Improper Data Handling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Insufficiently Protected Credentials | |
| Improper Input Validation | |
| Resource Management Errors | |
| Improper Input Validation | |
| User Impersonation | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | [,2.0.0.21][2.0.0.21,3.0.9) |
| Cross-site Scripting (XSS) | |
| CVE-2007-1762 | |
| Improper Input Validation | [2.0,2.0.0.18)[3.0,3.0.4) |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Denial of Service (DoS) | |
| Use After Free | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
| Denial of Service (DoS) | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Use After Free | |
| Use After Free | |
| Resource Management Errors | |
| Resource Management Errors | [1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1) |
| Improper Input Validation | |
| Race Condition | |
| Access Restriction Bypass | |
| Access Restriction Bypass | [2.0,2.0.0.19)[3.0,3.0.5) |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Access Control | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2020-15665 | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | [,31.5][31.5,31.5.3][31.5.3,37.0) |
| Resource Management Errors | |
| Out-of-Bounds | [,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0) |
| Out-of-Bounds | |
| Privilege Escalation | |
| Out-of-Bounds | |
| Arbitrary Code Injection | |
| Out-of-bounds Write | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | [,1.5.0.1][1.5.0.1,1.5.0.4) |
| User Impersonation | [,60.2)(60.2,60.2.1)(60.2.1,62.0) |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Remote Code Execution (RCE) | |
| Information Exposure | [1.5,1.5.0.11)[2.0,2.0.0.3) |
| CVE-2005-1576 | |
| Information Exposure | |
| Information Exposure | |
| Use After Free | [,60.7)(60.7,60.7.0)(60.7.0,67.0) |
| Out-of-bounds Read | |
| Buffer Overflow | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2020-15653 | |
| Out-of-Bounds | [,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0) |
| Out-of-bounds Write | |
| Improper Input Validation | [0,firefox-1.5.0.12-4.fc6) |
| Race Condition | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Insufficiently Protected Credentials | |
| Authentication Bypass | |
| Improper Access Control | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| Authentication Bypass | |
| Information Management Errors | |
| Command Injection | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Authentication Bypass | |
| Argument Injection | |
| CVE-2020-15680 | |
| Improper Data Handling | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Insufficiently Protected Credentials | |
| CVE-2020-26961 | |
| Information Exposure | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| Access Restriction Bypass | |
| Code | |
| Security Features | |
| Denial of Service (DoS) | |
| Race Condition | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Improper Access Control | |
| Arbitrary Code Injection | |
| Information Exposure | |
| Resource Management Errors | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| CVE-2005-0143 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Resource Management Errors | |
| Channel and Path Errors | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
| Security Features | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Release of Invalid Pointer or Reference | |
| Race Condition | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Information Exposure | [1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1) |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Code | |
| Denial of Service (DoS) | |
| Information Exposure | |
| CVE-2005-0232 | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | |
| Arbitrary Code Execution | |
| Out-of-bounds Write | [10.0,10.0.11)(10.0.11,17.0) |
| Information Exposure | |
| Use After Free | |
| Resource Management Errors | |
| Improper Input Validation | |
| Denial of Service (DoS) | [3.0,3.0.2)(3.0.2,3.0.18)[3.5,3.5.8) |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | [,52.1)(52.1,52.1.0)(52.1.0,53.0) |
| Security Features | |
| Denial of Service (DoS) | |
| CVE-2009-3274 | |
| Access Restriction Bypass | [2.0,2.0.0.19)[3.0,3.0.5) |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Authentication Bypass | |
| Security Features | |
| Improper Input Validation | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Resource Management Errors | |
| Information Exposure | |
| CVE-2013-1712 | |
| Race Condition | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
| Resource Management Errors | |
| Out-of-Bounds | |
| Security Features | [1.5,1.5.0.9)[2.0,2.0.0.1) |
| Improper Input Validation | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Privilege Escalation | [68.0,68.12)[78.0,78.2)(78.2,80.0) |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Input Validation | |
| Cryptographic Issues | |
| Race Condition | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| CVE-2005-1575 | |
| Out-of-Bounds | |
| CVE-2005-1157 | |
| CVE-2008-1240 | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Security Features | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Code | |
| CVE-2020-35111 | |
| Security Features | |
| Information Exposure | |
| Improper Access Control | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Use After Free | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Information Exposure | |
| Improper Input Validation | |
| User Impersonation | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Out-of-bounds Read | [,68.10)(68.10,68.10.0)(68.10.0,78.0) |
| Cryptographic Issues | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Information Exposure | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Improper Authentication | [,2.0.0.19][2.0.0.19,3.0.11) |
| Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
| Out-of-Bounds | |
| Use After Free | |
| Buffer Overflow | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Use After Free | |
| Arbitrary Code Execution | |
| User Impersonation | |
| Access Restriction Bypass | |
| Authentication Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | [,1.5.0.9][1.5.0.9,2.0.0.2) |
| Remote Code Execution (RCE) | [,2.0.0.19][2.0.0.19,3.0.11) |
| CVE-2010-4508 | |
| CVE-2005-0144 | |
| Improper Input Validation | |
| CVE-2006-4570 | |
| Out-of-Bounds | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Information Exposure | |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | |
| Out-of-Bounds | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Use of Uninitialized Resource | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Information Exposure | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Authentication Bypass | |
| Denial of Service (DoS) | [2.0,2.0.0.19)[3.0,3.0.5) |
| Resource Management Errors | |
| Open Redirect | |
| Out-of-Bounds | |
| Cryptographic Issues | |
| Use After Free | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Arbitrary Code Execution | |
| Code | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | [,2.0.0.20][2.0.0.20,3.0.7) |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Symlink Attack | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Authentication Bypass | |
| Information Exposure | |
| Out-of-bounds Read | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Information Exposure | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Remote Code Execution (RCE) | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Information Exposure | |
| Resource Management Errors | |
| CVE-2009-3076 | |
| Insecure Default | |
| Cross-site Scripting (XSS) | |
| Directory Traversal | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Information Exposure | |
| Access of Uninitialized Pointer | |
| Information Exposure | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Code | |
| Out-of-bounds Write | |
| Improper Access Control | |
| Authentication Bypass | |
| Information Exposure | |
| Cross-site Request Forgery (CSRF) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Insufficient Verification of Data Authenticity | |
| Denial of Service (DoS) | |
| Information Exposure | [2.0,2.0.0.19)[3.0,3.0.5) |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Use After Free | |
| Improper Input Validation | |
| Buffer Overflow | |
| CVE-2011-2668 | |
| CVE-2004-0762 | |
| CVE-2021-23956 | |
| Out-of-Bounds | |
| Use After Free | |
| Resource Management Errors | |
| User Impersonation | |
| Denial of Service (DoS) | [1.5,1.5.0.9)[2.0,2.0.0.1) |
| Out-of-Bounds | |
| Use After Free | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Improper Access Control | |
| Use After Free | |
| CVE-2012-5354 | |
| Access Restriction Bypass | |
| Out-of-Bounds | [2.0,2.0.0.18)[3.0,3.0.4) |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Remote Code Execution (RCE) | |
| Arbitrary Code Execution | |
| Remote Code Execution (RCE) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Authentication Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Out-of-Bounds | |
| Information Exposure | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Access Restriction Bypass | [1.5,1.5.0.9)[2.0,2.0.0.1) |
| Security Features | |
| Out-of-bounds Write | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Use After Free | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Information Exposure | |
| Access Restriction Bypass | |
| Remote Code Execution (RCE) | [,2.0.0.19][2.0.0.19,3.0.11) |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Remote Code Execution (RCE) | |
| Remote Code Execution (RCE) | |
| Access Restriction Bypass | |
| Use After Free | |
| Security Features | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Key Management Errors | |
| Information Exposure | |
| Use After Free | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Resource Management Errors | |
| Use After Free | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Information Exposure | |
| Access Restriction Bypass | [preview_release,1.5.0.1] |
| Access Restriction Bypass | |
| Use After Free | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Code | |
| Arbitrary Code Execution | |
| Improper Data Handling | |
| Code | |
| Incorrect Authorization | [,68.12)[78.0,78.2)(78.2,80.0) |
| Resource Management Errors | [,2.0.0.17][2.0.0.17,3.0.4) |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Open Redirect | |
| Use After Free | |
| Out-of-Bounds | [,60.0)(60.0,60.1.0)(60.1.0,61.0) |
| Cross-site Scripting (XSS) | |
| Open Redirect | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| CVE-2005-0147 | |
| Cross-site Request Forgery (CSRF) | |
| CVE-2005-1160 | |
| Improper Input Validation | [,2.0.0.20][2.0.0.20,3.0.7) |
| Out-of-Bounds | |
| Operation on a Resource after Expiration or Release | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | [,2.0.0.14][2.0.0.14,2.0.0.16) |
| CVE-2005-0141 | |
| Use After Free | |
| Authentication Bypass | |
| Out-of-Bounds | |
| Incorrect Resource Transfer Between Spheres | |
| Open Redirect | |
| NULL Pointer Dereference | |
| Code | |
| CVE-2019-11754 | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Information Exposure | |
| CVE-2006-4561 | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Information Exposure | |
| Type Confusion | |
| CVE-2005-2706 | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Information Exposure | |
| Information Exposure | |
| Out-of-Bounds | |
| Remote Code Execution (RCE) | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | [10.0,10.0.7)(10.0.7,15.0) |
| Denial of Service (DoS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Resource Management Errors | |
| Information Exposure | |
| Out-of-Bounds | |
| Security Features | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| Insecure Default | |
| Information Management Errors | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| CVE-2010-0169 | |
| Use After Free | |
| Denial of Service (DoS) | |
| Use After Free | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Race Condition | |
| Security Features | |
| Access Restriction Bypass | |
| Insufficient Verification of Data Authenticity | |
| CVE-2007-3511 | |
| Open Redirect | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Privilege Escalation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| User Impersonation | |
| Information Exposure | |
| Information Exposure | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Insecure Permissions | |
| Access Restriction Bypass | |
| User Impersonation | |
| Denial of Service (DoS) | |
| CVE-2013-1715 | |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Use After Free | [,45.9.0)[52.0,52.1.0)(52.1.0,53.0) |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Use After Free | [,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0) |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | [,60.9)[68.0,68.1)(68.1,69.0) |
| Code | |
| Information Exposure | |
| Use After Free | |
| Access Restriction Bypass | |
| Incorrect Calculation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Command Injection | |
| Code | |
| Buffer Overflow | |
| Out-of-bounds Write | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Improper Verification of Cryptographic Signature | |
| Improper Input Validation | |
| Security Features | |
| Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Improper Input Validation | [,2.0.0.6][2.0.0.6,2.0.0.8) |
| Remote Code Execution (RCE) | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Use After Free | |
| Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
| Code | |
| Directory Traversal | |
| Out-of-bounds Write | |
| Arbitrary Code Injection | |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | |
| Information Exposure | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Access Control | |
| CVE-2004-2226 | |
| Double Free | [,68.6.1)(68.6.1,68.7.0)(68.7.0,74.0.1) |
| Denial of Service (DoS) | |
| Code | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Use After Free | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Cryptographic Issues | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Information Exposure | |
| Access Restriction Bypass | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Race Condition | |
| Information Exposure | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Use After Free | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| CVE-2021-29957 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Open Redirect | |
| CVE-2005-2261 | |
| Privilege Escalation | |
| Out-of-bounds Write | [10.0,10.0.7)(10.0.7,15.0) |
| Cross-site Scripting (XSS) | |
| Remote Code Execution (RCE) | |
| Access Restriction Bypass | |
| Improper Input Validation | [2.0,2.0.0.19)[3.0,3.0.5) |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| CVE-2006-2787 | [preview_release,1.5.0.1] |
| Use After Free | |
| CVE-2006-6506 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Certificate Validation | |
| Use After Free | |
| CVE-2020-15681 | |
| Denial of Service (DoS) | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| User Impersonation | |
| Denial of Service (DoS) | |
| Improper Input Validation | [,60.9)[61.0,68.1)(68.1,69.0) |
| Access Restriction Bypass | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Remote Code Execution (RCE) | |
| Improper Input Validation | |
| Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Out-of-Bounds | |
| Improper Input Validation | |
| Information Exposure | |
| Resource Management Errors | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| CVE-2005-1158 | |
| Authentication Bypass | |
| Use After Free | |
| Resource Management Errors | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | [2.0,2.0.0.18)[3.0,3.0.2) |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Improper Certificate Validation | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | [preview_release,1.5.0.1] |
| Use After Free | |
| Improper Input Validation | [2.0,2.0.0.19)[3.0,3.0.5) |
| Arbitrary Code Injection | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| User Enumeration | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Use After Free | |
| Information Exposure | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
| User Impersonation | |
| Cross-site Scripting (XSS) | |
| Authentication Bypass | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Cryptographic Issues | |
| Improper Access Control | |
| Improper Input Validation | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | [,45.9.0)[52.0,52.1.0)(52.1.0,53.0) |
| Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Incorrect Type Conversion or Cast | |
| Information Exposure | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | [1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1) |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Information Exposure | |
| Arbitrary Code Execution | [17.0,17.0.5)(17.0.5,20.0) |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Use of a Risky Cryptographic Algorithm | |
| Improper Input Validation | |
| Out-of-bounds Read | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Cross-site Scripting (XSS) | |
| Integer Overflow or Wraparound | |
| Cross-site Scripting (XSS) | [,10.0.10)(10.0.10,16.0.2) |
| Use After Free | |
| Denial of Service (DoS) | [0,firefox-1.5.0.12-4.fc6) |
| Improper Certificate Validation | |
| Insecure Encryption | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | |
| Authentication Bypass | |
| Use After Free | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
| Information Exposure | |
| Out-of-Bounds | |
| Authentication Bypass | |
| CVE-2013-5615 | |
| Information Exposure | |
| Resource Management Errors | |
| CVE-2020-35112 | |
| Cross-site Scripting (XSS) | |
| Remote Code Execution (RCE) | |
| Use After Free | |
| Buffer Overflow | |
| Authentication Bypass | |
| Resource Management Errors | |
| Security Features | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Information Exposure | |
| Buffer Overflow | |
| Argument Injection | |
| Use After Free | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Remote Code Execution (RCE) | [,2.0.0.19][2.0.0.19,3.0.11) |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Insecure Encryption | |
| Denial of Service (DoS) | |
| Use After Free | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| CVE-2021-29975 | |
| Access Restriction Bypass | |
| Out-of-Bounds | [preview_release,1.5.0.3] |
| Information Exposure | |
| Arbitrary File Upload | |
| Race Condition | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Authentication Bypass | |
| Resource Management Errors | |
| CVE-2005-1531 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| User Impersonation | |
| Cross-site Request Forgery (CSRF) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Use After Free | |
| Out-of-Bounds | |
| Timing Attack | |
| Resource Management Errors | |
| User Impersonation | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Directory Traversal | |
| Authentication Bypass | |
| Improper Input Validation | |
| Remote Code Execution (RCE) | |
| User Impersonation | |
| Improper Initialization | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Unauthorized File Access | |
| Improper Authentication | |
| Incorrect Authorization | |
| Cross-site Scripting (XSS) | |
| Improper Authentication | |
| Access Restriction Bypass | |
| User Impersonation | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Use After Free | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| XML External Entity (XXE) Injection | [2.0,2.0.0.18)[3.0,3.0.4) |
| Out-of-Bounds | |
| Privilege Escalation | |
| Access Restriction Bypass | |
| Security Features | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Race Condition | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Authentication Bypass | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Improper Authentication | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Improper Verification of Cryptographic Signature | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Information Exposure | [,2.0.0.20][2.0.0.20,3.0.7) |
| Improper Input Validation | [,60.0)(60.0,60.1.0)(60.1.0,61.0) |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Improper Certificate Validation | |
| Arbitrary Code Execution | |
| Improper Input Validation | [,2.0.0.6][2.0.0.6,2.0.0.8) |
| Arbitrary Code Execution | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | [,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Race Condition | |
| Out-of-Bounds | [1.5,1.5.0.9)[2.0,2.0.0.1) |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Arbitrary File Upload | |
| CVE-2004-0764 | |
| Access Restriction Bypass | |
| Security Features | |
| Out-of-bounds Write | |
| Session Fixation | |
| User Impersonation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Incorrect Authorization | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Type Confusion | |
| Resource Management Errors | |
| Resource Management Errors | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Information Exposure | |
| CVE-2020-15650 | |
| Use After Free | |
| Access Restriction Bypass | |
| Buffer Overflow | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Resource Management Errors | |
| Remote Code Execution (RCE) | |
| Out-of-bounds Write | |
| CVE-2008-3837 | |
| Access Restriction Bypass | |
| Improper Data Handling | |
| Improper Input Validation | |
| User Impersonation | |
| Authentication Bypass | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Race Condition | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Resource Management Errors | |
| Race Condition | |
| Access Restriction Bypass | |
| CVE-2020-12409 | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| CVE-2004-0866 | |
| Resource Management Errors | |
| Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Resource Management Errors | [preview_release,1.5.0.1] |
| Information Exposure | |
| Arbitrary Code Execution | |
| Authentication Bypass | |
| Out-of-bounds Write | |
| Resource Management Errors | |
| Information Exposure | |
| Improper Input Validation | |
| Resource Management Errors | |
| Use After Free | |
| Out-of-bounds Write | [,52.7.0)(52.7.0,52.7.2)(52.7.2,59.0.1) |
| Denial of Service (DoS) | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
| Code | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Code | |
| Out-of-Bounds | |
| Use After Free | [10.0,10.0.11)(10.0.11,17.0) |
| Type Confusion | [,60.7.1)(60.7.1,60.7.2)(60.7.2,60.7.3) |
| Resource Management Errors | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Buffer Overflow | |
| Code | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| CVE-2010-3773 | |
| Cross-site Scripting (XSS) | |
| Insecure Encryption | |
| Improper Input Validation | |
| Information Exposure | |
| Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Resources Downloaded over Insecure Protocol | |
| Out-of-Bounds | |
| Use After Free | [,68.10)(68.10,68.10.0)(68.10.0,78.0) |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Authentication Bypass | |
| Brute Force | |
| Improper Validation | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
| Remote Code Execution (RCE) | |
| CVE-2019-11730 | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Use of Uninitialized Resource | |
| Cross-site Scripting (XSS) | |
| Cryptographic Issues | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | [10.0,10.0.10)(10.0.10,16.0.2) |
| Resource Management Errors | [,2.0.0.20][2.0.0.20,3.0.7) |
| Out-of-Bounds | |
| Use After Free | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Cross-site Request Forgery (CSRF) | |
| Information Exposure | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Out-of-bounds Read | |
| Arbitrary Code Execution | |
| Untrusted Search Path | |
| Remote Code Execution (RCE) | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Use After Free | |
| Information Exposure | |
| Resource Management Errors | |
| Use After Free | |
| Out-of-bounds Read | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Privilege Escalation | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Open Redirect | |
| Use After Free | [,68.6.1)(68.6.1,68.7.0)(68.7.0,74.0.1) |
| Out-of-Bounds | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Improper Access Control | |
| CVE-2007-4879 | |
| Use After Free | [,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0) |
| Use After Free | |
| Remote Code Execution (RCE) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Out-of-bounds Write | [,68.3)(68.3,68.3.0)(68.3.0,71.0) |
| Information Exposure | |
| Information Exposure | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Information Exposure | |
| Access Restriction Bypass | |
| Arbitrary Code Injection | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| CVE-2007-1736 | |
| Out-of-Bounds | [,45.6)(45.6,45.6.0)(45.6.0,50.1) |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Integer Overflow or Wraparound | [,60.0)(60.0,60.1.0)(60.1.0,61.0) |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Information Exposure | |
| Interpretation Conflict | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| CVE-2018-18497 | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Use After Free | |
| Access Restriction Bypass | |
| Information Exposure | |
| Buffer Overflow | |
| Cross-site Request Forgery (CSRF) | |
| CVE-2018-18506 | |
| Resource Management Errors | |
| Improper Input Validation | [,52.9.0)[52.9.1,60.0)(60.0,60.1.0)(60.1.0,61.0) |
| Access Restriction Bypass | |
| Use After Free | |
| Out-of-Bounds | |
| Symlink Attack | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Error Handling | |
| Information Exposure | |
| Remote Code Execution (RCE) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Security Features | |
| CVE-2020-26976 | |
| Information Exposure | |
| CVE-2006-6585 | |
| Authentication Bypass | |
| Arbitrary Code Execution | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Cryptographic Issues | |
| Use After Free | |
| Improper Input Validation | |
| Information Exposure | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Remote Code Execution (RCE) | |
| Improper Input Validation | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Security Features | |
| Improper Input Validation | |
| Information Exposure | |
| Information Exposure | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Out-of-Bounds | [,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0) |
| Improper Authentication | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| User Enumeration | |
| Resource Management Errors | |
| Race Condition | |
| Out-of-Bounds | |
| Type Confusion | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Security Features | |
| CVE-2006-3812 | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Information Exposure | |
| Symlink Attack | |
| Improper Authentication | |
| Out-of-bounds Write | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Information Exposure | |
| Missing Initialization of Resource | |
| Improper Access Control | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| CVE-2005-0142 | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | [,2.0.0.20][2.0.0.20,3.0.7) |
| Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
| Insecure Default | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Access Control | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| Information Exposure | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | [10.0,10.0.7)(10.0.7,15.0) |
| Cross-site Scripting (XSS) | |
| CVE-2010-3181 | |
| Authentication Bypass | |
| Use After Free | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Use After Free | [,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0) |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Security Features | |
| Denial of Service (DoS) | |
| CVE-2006-1736 | |
| Cryptographic Issues | |
| Information Exposure | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Cryptographic Issues | |
| Information Exposure | |
| Missing Cryptographic Step | |
| Observable Discrepancy | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Authentication Bypass | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Cryptographic Issues | |
| Race Condition | [,24.3)(24.3,24.3.0)(24.3.0,27.0) |
| Out-of-Bounds | |
| Improper Input Validation | [,2.0.0.22)[2.0.0.22,3.3) |
| Improper Input Validation | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Insecure Encryption | [,24.3)(24.3,24.3.0)(24.3.0,27.0) |
| CVE-2006-5462 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Cryptographic Issues | |
| Denial of Service (DoS) | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
| Denial of Service (DoS) | |
| Out-of-Bounds | [1.5,1.5.0.10)[2.0,2.0.0.2) |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Data Handling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Data Handling | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Out-of-Bounds | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Buffer Overflow | [,3.0.6)[3.0.7,3.1.1)(3.1.1,3.5.11)[3.5.12,3.6.7) |
| Cryptographic Issues | |