Use After Free | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Improper Verification of Cryptographic Signature | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Authentication Bypass | |
Use After Free | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
CVE-2021-29983 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Certificate Validation | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | [preview_release,1.5.0.1] |
Unsafe Dependency Resolution | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
Integer Overflow or Wraparound | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2005-2260 | |
Use After Free | [10.0,10.0.11)(10.0.11,17.0) |
Cross-site Scripting (XSS) | |
Improper Authentication | [2.0,2.0.0.18)[3.0,3.0.4) |
Denial of Service (DoS) | |
Out-of-Bounds | |
Type Confusion | |
Out-of-Bounds | |
Out-of-bounds Read | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Arbitrary Code Execution | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Information Exposure | |
Use After Free | |
Resource Management Errors | |
Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Denial of Service (DoS) | |
Improper Access Control | |
CVE-2005-0588 | |
Arbitrary Code Injection | |
Cross-site Request Forgery (CSRF) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Authentication Bypass | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Out-of-bounds Read | |
Resource Management Errors | |
Resource Management Errors | |
Unsafe Dependency Resolution | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Access Restriction Bypass | |
Resource Management Errors | [2.0,2.0.0.19)[3.0,3.0.5) |
Access Restriction Bypass | |
Out-of-Bounds | |
Out-of-bounds Write | |
Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Denial of Service (DoS) | |
Use After Free | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
Use of Uninitialized Resource | |
Out-of-Bounds | |
Access Restriction Bypass | [,31.5][31.5,31.5.3][31.5.3,37.0) |
Race Condition | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Information Exposure | |
Arbitrary Code Execution | |
CVE-2005-0145 | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Deserialization of Untrusted Data | |
Access Restriction Bypass | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Use After Free | |
Arbitrary Code Execution | |
Denial of Service (DoS) | [2.0,2.0.0.18)[3.0,3.0.4) |
CVE-2006-1727 | |
Out-of-Bounds | |
Improper Input Validation | |
Remote Code Execution (RCE) | |
Security Features | |
Security Features | |
Access Restriction Bypass | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
CVE-2013-0797 | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Cryptographic Issues | |
Access Restriction Bypass | |
Integer Overflow or Wraparound | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Resource Management Errors | |
Use of Uninitialized Resource | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Arbitrary Code Execution | |
Security Features | |
Resource Management Errors | |
Resource Management Errors | |
Arbitrary Code Execution | |
Release of Invalid Pointer or Reference | |
CVE-2008-5503 | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Resource Management Errors | [,31.6][31.6,37.0.2][37.0.2,38.0.1) |
Resource Management Errors | [2.0,2.0.0.18)[3.0,3.0.4) |
Denial of Service (DoS) | |
Out-of-Bounds | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Information Exposure | |
Buffer Overflow | |
Improper Input Validation | |
Argument Injection | |
Denial of Service (DoS) | |
CVE-2012-4206 | |
Denial of Service (DoS) | [,31.5][31.5,31.5.3][31.5.3,37.0) |
Out-of-Bounds | |
Cross-site Scripting (XSS) | [10.0,10.0.11)(10.0.11,17.0) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Use After Free | |
Security Features | |
Incorrect Calculation | |
Improper Input Validation | |
Resource Management Errors | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Handling of Exceptional Conditions | |
Out-of-Bounds | |
Information Exposure | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Improper Input Validation | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Access Restriction Bypass | |
Insufficiently Protected Credentials | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-bounds Write | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Resource Management Errors | |
Memory Leak | |
Security Features | |
Cross-site Scripting (XSS) | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-bounds Write | |
Directory Traversal | |
Incorrect Authorization | |
Resource Management Errors | [2.0,2.0.0.18)[3.0,3.0.4) |
Improper Input Validation | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
Arbitrary Code Injection | |
Information Exposure | |
CVE-2015-0833 | |
CVE-2005-2602 | |
Improper Input Validation | |
Information Exposure | |
CVE-2006-2786 | |
Arbitrary Code Injection | |
Information Exposure | |
Resource Management Errors | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Information Exposure | |
Use After Free | |
Access Restriction Bypass | [,31.5][31.5,31.5.3][31.5.3,37.0) |
CVE-2004-0909 | |
Type Confusion | |
User Impersonation | |
Denial of Service (DoS) | |
Buffer Overflow | |
Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2012-1943 | |
Information Exposure | |
Arbitrary Code Execution | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Information Exposure | [1.5,1.5.0.10)[2.0,2.0.0.2) |
Cross-site Scripting (XSS) | |
Use After Free | |
Improper Input Validation | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-Bounds | |
Remote Code Execution (RCE) | |
Resource Management Errors | |
Information Exposure | |
Resource Management Errors | |
Access Restriction Bypass | |
Use After Free | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Code | |
Information Exposure | |
CVE-2009-2471 | |
Remote Code Execution (RCE) | [,3.6.22][3.6.22,6.0][6.0,7.0) |
Use After Free | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Buffer Overflow | |
Privilege Escalation | |
Missing Initialization of Resource | |
Improper Input Validation | |
Arbitrary Code Execution | |
Insecure Default | |
Resource Management Errors | |
Access Restriction Bypass | [1.0,3.1.19][3.1.19,3.6.28)(4.0,5.0)(5.0,10.0.1) |
Out-of-Bounds | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Remote Code Execution (RCE) | |
Resource Management Errors | [2.0,2.0.0.19)[3.0,3.0.5) |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Privilege Escalation | |
Buffer Overflow | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Out-of-Bounds | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
Resource Management Errors | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Resource Management Errors | [1.0,1.0.8)(1.0.8,1.5.0.1) |
Out-of-Bounds | |
Resources Downloaded over Insecure Protocol | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Access Restriction Bypass | |
Race Condition | |
Remote Code Execution (RCE) | [1.5,1.5.0.10)[2.0,2.0.0.2) |
Use After Free | |
Out-of-bounds Write | [,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0) |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Access Control | |
Security Features | |
Resource Management Errors | |
Out-of-Bounds | |
Information Exposure | |
Resource Management Errors | |
Code | |
Use After Free | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Access Control | |
Access Restriction Bypass | |
Access Restriction Bypass | |
User Enumeration | |
Denial of Service (DoS) | |
Resource Management Errors | [1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1) |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-bounds Read | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Use After Free | [,78.4.1)(78.4.1,78.4.2)(78.4.2,82.0.3) |
Out-of-bounds Read | |
Resource Management Errors | |
Arbitrary Code Execution | |
Authentication Bypass | |
CVE-2006-1942 | |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Information Exposure | |
Use After Free | |
Cross-site Scripting (XSS) | [10.0,10.0.11)(10.0.11,17.0) |
Use After Free | |
Resource Management Errors | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Security Features | |
Access Restriction Bypass | |
User Impersonation | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Authentication Bypass | |
Out-of-Bounds | |
Release of Invalid Pointer or Reference | |
Use After Free | |
Authentication Bypass | |
Use After Free | |
Information Exposure | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Remote Code Execution (RCE) | |
Improper Input Validation | |
User Impersonation | [,68.11)[78.0,78.1)(78.1,79.0) |
Improper Verification of Cryptographic Signature | |
CVE-2020-12412 | |
Denial of Service (DoS) | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2005-4685 | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Out-of-Bounds | [52.0,52.1.0)(52.1.0,52.3)(52.3,55.0) |
Out-of-bounds Write | |
Security Features | |
Cross-site Scripting (XSS) | |
Use After Free | |
CVE-2018-12403 | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
User Impersonation | |
Arbitrary Code Execution | |
Cryptographic Issues | |
Insufficient Verification of Data Authenticity | |
Use After Free | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Access Restriction Bypass | |
Improper Access Control | |
Access Restriction Bypass | |
Use After Free | |
Cross-site Scripting (XSS) | [2.0,2.0.0.19)[3.0,3.0.5) |
Improper Preservation of Permissions | |
Out-of-bounds Write | |
Out-of-Bounds | |
Use After Free | |
Directory Traversal | |
CVE-2009-0253 | |
CVE-2009-3370 | |
Remote Code Execution (RCE) | |
Cross-site Request Forgery (CSRF) | |
Authentication Bypass | [0,firefox-1.5.0.12-4.fc6) |
Access Restriction Bypass | |
Out-of-bounds Write | |
Improper Restriction of Rendered UI Layers or Frames | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Remote Code Execution (RCE) | [1.5,1.5.0.9)[2.0,2.0.0.1) |
Cross-site Scripting (XSS) | |
Cryptographic Issues | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Use After Free | |
CVE-2021-23960 | |
Denial of Service (DoS) | |
Out-of-bounds Write | [10.0,10.0.7)(10.0.7,15.0) |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-Bounds | [,52.9)[53.0,60.1)(60.1,61.0) |
Information Exposure | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | [10.0,10.0.7)(10.0.7,15.0) |
Arbitrary Code Execution | |
User Impersonation | [10.0,10.0.9)(10.0.9,16.0.1) |
Out-of-Bounds | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | [10.0,10.0.11)(10.0.11,17.0) |
Use After Free | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Input Validation | |
Security Features | |
Improper Validation of Array Index | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Code | |
Arbitrary Code Execution | |
User Enumeration | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
Insecure Encryption | [,17.0.11)[24.1.0,24.1.1)(24.1.1,25.0.1) |
Improper Access Control | |
Out-of-Bounds | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Type Confusion | |
Use After Free | |
Arbitrary Code Execution | |
Improper Input Validation | [1.0,3.1.19][3.1.19,3.6.28)(4.0,5.0)(5.0,10.0.1) |
Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Information Exposure | |
User Impersonation | |
Cross-site Scripting (XSS) | [1.5,1.5.0.10)[2.0,2.0.0.2) |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Authentication Bypass | |
Remote Code Execution (RCE) | |
Untrusted Search Path | |
Out-of-Bounds | |
Open Redirect | |
Access Restriction Bypass | |
Resource Management Errors | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2019-11711 | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Incorrect Type Conversion or Cast | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
CVE-2021-29974 | |
Security Features | |
Use of Uninitialized Resource | |
Information Exposure | |
Improper Access Control | |
CVE-2004-1449 | |
Out-of-bounds Write | |
Information Exposure | |
Security Features | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Out-of-Bounds | [1.5,1.5.0.10)[2.0,2.0.0.2) |
Information Exposure | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Authentication Bypass | |
Denial of Service (DoS) | [,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0) |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
CVE-2021-23962 | |
Out-of-Bounds | |
Insecure Permissions | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
CVE-2020-26967 | |
CVE-2013-0774 | |
Information Exposure | |
Denial of Service (DoS) | |
CVE-2005-2263 | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | [,52.9)[53.0,60.1.0)(60.1.0,61.0) |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Authentication Bypass | |
Security Features | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Access Control | |
Integer Overflow or Wraparound | [,60.0)(60.0,60.1)(60.1,61.0) |
Denial of Service (DoS) | |
Authentication Bypass | |
Resource Management Errors | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Use After Free | |
Improper Authentication | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Resource Management Errors | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Insufficiently Protected Credentials | |
Improper Input Validation | |
Access Restriction Bypass | |
Privilege Escalation | |
Access Restriction Bypass | |
Use After Free | |
Privilege Escalation | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
CVE-2007-3827 | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | [,2.0.0.20][2.0.0.20,3.0.7) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
Improper Access Control | |
Out-of-bounds Write | |
Remote Code Execution (RCE) | |
Use of a Risky Cryptographic Algorithm | |
Directory Traversal | |
Information Exposure | |
Security Features | |
Cross-site Scripting (XSS) | |
Use After Free | [10.0,10.0.11)(10.0.11,17.0) |
Improper Check for Unusual or Exceptional Conditions | |
Improper Input Validation | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Access Control | |
Cross-site Scripting (XSS) | |
Use After Free | |
Information Exposure | |
Arbitrary Code Execution | |
Resource Management Errors | |
Out-of-Bounds | |
Symlink Attack | |
Out-of-bounds Write | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-bounds Read | |
Remote Code Execution (RCE) | |
Information Exposure | |
Denial of Service (DoS) | |
Information Exposure | |
Improper Access Control | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Write | |
Race Condition | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | [2.0,2.0.0.18)[3.0,3.0.4) |
Out-of-Bounds | |
Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Authentication Bypass | [,2.0.0.20][2.0.0.20,3.0.7) |
Improper Input Validation | |
Information Exposure | |
NULL Pointer Dereference | |
Out-of-bounds Write | [,45.9.0)[52.0,52.1.0)(52.1.0,53.0) |
Out-of-Bounds | |
Information Exposure | |
Authentication Bypass | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Remote Code Execution (RCE) | |
CVE-2011-2980 | |
Authentication Bypass | |
Type Confusion | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Improper Input Validation | |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-Bounds | |
Buffer Overflow | [,10.0.11)(10.0.11,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Arbitrary Code Execution | |
Security Features | |
Denial of Service (DoS) | |
Information Exposure | |
CVE-2010-3182 | |
CVE-2006-6077 | |
Cross-site Request Forgery (CSRF) | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
Improper Input Validation | |
Type Confusion | |
Arbitrary Code Execution | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Remote Code Execution (RCE) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Access Restriction Bypass | |
Remote Code Execution (RCE) | [,2.0.0.19][2.0.0.19,3.0.11) |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-Bounds | |
Improper Authentication | |
Improper Preservation of Permissions | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | [,2.0.0.20][2.0.0.20,3.0.7) |
Integer Overflow or Wraparound | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-Bounds | [0,firefox-1.5.0.12-4.fc6) |
CVE-2008-0594 | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Improper Restriction of Rendered UI Layers or Frames | |
Race Condition | |
Arbitrary Code Execution | |
Out-of-bounds Write | [,68.11)[78.0,78.0.1][78.0.1,78.1.0)(78.1.0,79.0) |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Improper Access Control | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Directory Traversal | |
Information Exposure | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Access Restriction Bypass | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
User Impersonation | |
Security Features | |
Improper Access Control | |
Authentication Bypass | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Authentication Bypass | |
Out-of-Bounds | |
Improper Input Validation | |
Access Restriction Bypass | |
Race Condition | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Out-of-bounds Write | |
Information Exposure | |
CVE-2007-3845 | |
Improper Input Validation | |
Cryptographic Issues | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Denial of Service (DoS) | |
Resource Management Errors | |
Out-of-Bounds | |
Improper Access Control | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | [,52.3.0)(52.3.0,52.3)(52.3,55.0) |
Cross-site Scripting (XSS) | |
Arbitrary Code Execution | |
Improper Restriction of Rendered UI Layers or Frames | |
Resource Management Errors | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Resource Management Errors | |
Security Features | [,52.9)[53.0,60.1.0)(60.1.0,61.0) |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Resource Management Errors | |
Cross-site Scripting (XSS) | [2.0,2.0.0.19)[3.0,3.0.5) |
Arbitrary Code Injection | [10.0,10.0.10)(10.0.10,16.0.2) |
Out-of-Bounds | |
Improper Data Handling | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Insufficiently Protected Credentials | |
Improper Input Validation | |
Resource Management Errors | |
Improper Input Validation | |
User Impersonation | |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | [,2.0.0.21][2.0.0.21,3.0.9) |
Cross-site Scripting (XSS) | |
CVE-2007-1762 | |
Improper Input Validation | [2.0,2.0.0.18)[3.0,3.0.4) |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Denial of Service (DoS) | |
Use After Free | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
Denial of Service (DoS) | |
Improper Restriction of Rendered UI Layers or Frames | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Resource Management Errors | |
Use After Free | |
Use After Free | |
Resource Management Errors | |
Resource Management Errors | [1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1) |
Improper Input Validation | |
Race Condition | |
Access Restriction Bypass | |
Access Restriction Bypass | [2.0,2.0.0.19)[3.0,3.0.5) |
Information Exposure | |
Out-of-Bounds | |
Improper Access Control | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2020-15665 | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,31.5][31.5,31.5.3][31.5.3,37.0) |
Resource Management Errors | |
Out-of-Bounds | [,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0) |
Out-of-Bounds | |
Privilege Escalation | |
Out-of-Bounds | |
Arbitrary Code Injection | |
Out-of-bounds Write | |
Arbitrary Code Execution | |
Access Restriction Bypass | [,1.5.0.1][1.5.0.1,1.5.0.4) |
User Impersonation | [,60.2)(60.2,60.2.1)(60.2.1,62.0) |
Resource Management Errors | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Remote Code Execution (RCE) | |
Information Exposure | [1.5,1.5.0.11)[2.0,2.0.0.3) |
CVE-2005-1576 | |
Information Exposure | |
Information Exposure | |
Use After Free | [,60.7)(60.7,60.7.0)(60.7.0,67.0) |
Out-of-bounds Read | |
Buffer Overflow | |
Remote Code Execution (RCE) | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2020-15653 | |
Out-of-Bounds | [,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0) |
Out-of-bounds Write | |
Improper Input Validation | [0,firefox-1.5.0.12-4.fc6) |
Race Condition | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Authentication Bypass | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Insufficiently Protected Credentials | |
Authentication Bypass | |
Improper Access Control | |
Out-of-bounds Write | |
Access Restriction Bypass | |
Authentication Bypass | |
Information Management Errors | |
Command Injection | |
Improper Restriction of Rendered UI Layers or Frames | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Authentication Bypass | |
Argument Injection | |
CVE-2020-15680 | |
Improper Data Handling | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Information Exposure | |
Arbitrary Code Execution | |
Insufficiently Protected Credentials | |
CVE-2020-26961 | |
Information Exposure | |
Remote Code Execution (RCE) | |
Information Exposure | |
Access Restriction Bypass | |
Code | |
Security Features | |
Denial of Service (DoS) | |
Race Condition | |
Improper Input Validation | |
Improper Input Validation | |
Use After Free | |
Improper Access Control | |
Arbitrary Code Injection | |
Information Exposure | |
Resource Management Errors | |
Cryptographic Issues | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Input Validation | |
CVE-2005-0143 | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Resource Management Errors | |
Channel and Path Errors | |
Denial of Service (DoS) | |
Resource Management Errors | |
Denial of Service (DoS) | |
Information Exposure | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Security Features | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Release of Invalid Pointer or Reference | |
Race Condition | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Information Exposure | [1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Code | |
Denial of Service (DoS) | |
Information Exposure | |
CVE-2005-0232 | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | |
Arbitrary Code Execution | |
Out-of-bounds Write | [10.0,10.0.11)(10.0.11,17.0) |
Information Exposure | |
Use After Free | |
Resource Management Errors | |
Improper Input Validation | |
Denial of Service (DoS) | [3.0,3.0.2)(3.0.2,3.0.18)[3.5,3.5.8) |
Use After Free | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | [,52.1)(52.1,52.1.0)(52.1.0,53.0) |
Security Features | |
Denial of Service (DoS) | |
CVE-2009-3274 | |
Access Restriction Bypass | [2.0,2.0.0.19)[3.0,3.0.5) |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Authentication Bypass | |
Security Features | |
Improper Input Validation | |
Cryptographic Issues | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Resource Management Errors | |
Information Exposure | |
CVE-2013-1712 | |
Race Condition | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Resource Management Errors | |
Out-of-Bounds | |
Security Features | [1.5,1.5.0.9)[2.0,2.0.0.1) |
Improper Input Validation | |
Resource Management Errors | |
Out-of-Bounds | |
Privilege Escalation | [68.0,68.12)[78.0,78.2)(78.2,80.0) |
Out-of-Bounds | |
Resource Management Errors | |
Resource Management Errors | |
Improper Input Validation | |
Cryptographic Issues | |
Race Condition | |
Improper Input Validation | |
Access Restriction Bypass | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
CVE-2005-1575 | |
Out-of-Bounds | |
CVE-2005-1157 | |
CVE-2008-1240 | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Security Features | |
Out-of-Bounds | |
Out-of-Bounds | |
Code | |
CVE-2020-35111 | |
Security Features | |
Information Exposure | |
Improper Access Control | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Denial of Service (DoS) | |
Use After Free | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Resource Management Errors | |
Information Exposure | |
Improper Input Validation | |
User Impersonation | |
Resource Management Errors | |
Arbitrary Code Execution | |
Out-of-bounds Read | [,68.10)(68.10,68.10.0)(68.10.0,78.0) |
Cryptographic Issues | |
Improper Input Validation | |
Denial of Service (DoS) | |
Information Exposure | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Improper Authentication | [,2.0.0.19][2.0.0.19,3.0.11) |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Out-of-Bounds | |
Use After Free | |
Buffer Overflow | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Resource Management Errors | |
Access Restriction Bypass | |
Use After Free | |
Arbitrary Code Execution | |
User Impersonation | |
Access Restriction Bypass | |
Authentication Bypass | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | [,1.5.0.9][1.5.0.9,2.0.0.2) |
Remote Code Execution (RCE) | [,2.0.0.19][2.0.0.19,3.0.11) |
CVE-2010-4508 | |
CVE-2005-0144 | |
Improper Input Validation | |
CVE-2006-4570 | |
Out-of-Bounds | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Out-of-Bounds | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Use of Uninitialized Resource | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Information Exposure | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Authentication Bypass | |
Denial of Service (DoS) | [2.0,2.0.0.19)[3.0,3.0.5) |
Resource Management Errors | |
Open Redirect | |
Out-of-Bounds | |
Cryptographic Issues | |
Use After Free | |
Denial of Service (DoS) | |
Information Exposure | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Arbitrary Code Execution | |
Code | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Out-of-Bounds | |
Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Use After Free | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Resource Management Errors | [,2.0.0.20][2.0.0.20,3.0.7) |
Denial of Service (DoS) | |
Out-of-Bounds | |
Access Restriction Bypass | |
Symlink Attack | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Information Exposure | |
Authentication Bypass | |
Information Exposure | |
Out-of-bounds Read | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Improper Restriction of Rendered UI Layers or Frames | |
Information Exposure | |
Improper Input Validation | |
Out-of-bounds Read | |
Arbitrary Code Execution | |
Improper Input Validation | |
Remote Code Execution (RCE) | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Information Exposure | |
Resource Management Errors | |
CVE-2009-3076 | |
Insecure Default | |
Cross-site Scripting (XSS) | |
Directory Traversal | |
Resource Management Errors | |
Out-of-Bounds | |
Information Exposure | |
Access of Uninitialized Pointer | |
Information Exposure | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Code | |
Out-of-bounds Write | |
Improper Access Control | |
Authentication Bypass | |
Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Out-of-Bounds | |
Out-of-Bounds | |
Insufficient Verification of Data Authenticity | |
Denial of Service (DoS) | |
Information Exposure | [2.0,2.0.0.19)[3.0,3.0.5) |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Out-of-bounds Write | |
Improper Input Validation | |
Access Restriction Bypass | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Use After Free | |
Improper Input Validation | |
Buffer Overflow | |
CVE-2011-2668 | |
CVE-2004-0762 | |
CVE-2021-23956 | |
Out-of-Bounds | |
Use After Free | |
Resource Management Errors | |
User Impersonation | |
Denial of Service (DoS) | [1.5,1.5.0.9)[2.0,2.0.0.1) |
Out-of-Bounds | |
Use After Free | |
Resource Management Errors | |
Denial of Service (DoS) | |
Improper Access Control | |
Use After Free | |
CVE-2012-5354 | |
Access Restriction Bypass | |
Out-of-Bounds | [2.0,2.0.0.18)[3.0,3.0.4) |
Out-of-Bounds | |
Arbitrary Code Execution | |
Remote Code Execution (RCE) | |
Arbitrary Code Execution | |
Remote Code Execution (RCE) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Authentication Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Information Exposure | |
Use After Free | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Resource Management Errors | |
Arbitrary Code Execution | |
Resource Management Errors | |
Arbitrary Code Execution | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Directory Traversal | |
Access Restriction Bypass | [1.5,1.5.0.9)[2.0,2.0.0.1) |
Security Features | |
Out-of-bounds Write | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Use After Free | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Improper Input Validation | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Resource Management Errors | |
Information Exposure | |
Access Restriction Bypass | |
Remote Code Execution (RCE) | [,2.0.0.19][2.0.0.19,3.0.11) |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Remote Code Execution (RCE) | |
Access Restriction Bypass | |
Use After Free | |
Security Features | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Key Management Errors | |
Information Exposure | |
Use After Free | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
Resource Management Errors | |
Use After Free | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Arbitrary Code Execution | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Arbitrary Code Execution | |
Information Exposure | |
Access Restriction Bypass | [preview_release,1.5.0.1] |
Access Restriction Bypass | |
Use After Free | |
Remote Code Execution (RCE) | |
Information Exposure | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Resource Management Errors | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Code | |
Arbitrary Code Execution | |
Improper Data Handling | |
Code | |
Incorrect Authorization | [,68.12)[78.0,78.2)(78.2,80.0) |
Resource Management Errors | [,2.0.0.17][2.0.0.17,3.0.4) |
Denial of Service (DoS) | |
Out-of-Bounds | |
Open Redirect | |
Use After Free | |
Out-of-Bounds | [,60.0)(60.0,60.1.0)(60.1.0,61.0) |
Cross-site Scripting (XSS) | |
Open Redirect | |
Cross-site Scripting (XSS) | |
Arbitrary Code Execution | |
CVE-2005-0147 | |
Cross-site Request Forgery (CSRF) | |
CVE-2005-1160 | |
Improper Input Validation | [,2.0.0.20][2.0.0.20,3.0.7) |
Out-of-Bounds | |
Operation on a Resource after Expiration or Release | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,2.0.0.14][2.0.0.14,2.0.0.16) |
CVE-2005-0141 | |
Use After Free | |
Authentication Bypass | |
Out-of-Bounds | |
Incorrect Resource Transfer Between Spheres | |
Open Redirect | |
NULL Pointer Dereference | |
Code | |
CVE-2019-11754 | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Information Exposure | |
CVE-2006-4561 | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-Bounds | |
Information Exposure | |
Type Confusion | |
CVE-2005-2706 | |
Access Restriction Bypass | |
Resource Management Errors | |
Access Restriction Bypass | |
Information Exposure | |
Information Exposure | |
Out-of-Bounds | |
Remote Code Execution (RCE) | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
Resource Management Errors | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | [10.0,10.0.7)(10.0.7,15.0) |
Denial of Service (DoS) | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Resource Management Errors | |
Information Exposure | |
Out-of-Bounds | |
Security Features | |
Remote Code Execution (RCE) | |
Information Exposure | |
Insecure Default | |
Information Management Errors | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
CVE-2010-0169 | |
Use After Free | |
Denial of Service (DoS) | |
Use After Free | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Race Condition | |
Security Features | |
Access Restriction Bypass | |
Insufficient Verification of Data Authenticity | |
CVE-2007-3511 | |
Open Redirect | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Privilege Escalation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
User Impersonation | |
Information Exposure | |
Information Exposure | |
Out-of-bounds Write | |
Out-of-Bounds | |
Access Restriction Bypass | |
Insecure Permissions | |
Access Restriction Bypass | |
User Impersonation | |
Denial of Service (DoS) | |
CVE-2013-1715 | |
Information Exposure | |
Out-of-Bounds | |
Improper Restriction of Rendered UI Layers or Frames | |
Information Exposure | |
Denial of Service (DoS) | |
Use After Free | [,45.9.0)[52.0,52.1.0)(52.1.0,53.0) |
Improper Access Control | |
Denial of Service (DoS) | |
Use After Free | [,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0) |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | [,60.9)[68.0,68.1)(68.1,69.0) |
Code | |
Information Exposure | |
Use After Free | |
Access Restriction Bypass | |
Incorrect Calculation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Command Injection | |
Code | |
Buffer Overflow | |
Out-of-bounds Write | |
Use After Free | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Access Restriction Bypass | |
Improper Verification of Cryptographic Signature | |
Improper Input Validation | |
Security Features | |
Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Improper Input Validation | [,2.0.0.6][2.0.0.6,2.0.0.8) |
Remote Code Execution (RCE) | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Access Restriction Bypass | |
Use After Free | |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Code | |
Directory Traversal | |
Out-of-bounds Write | |
Arbitrary Code Injection | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Information Exposure | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Access Control | |
CVE-2004-2226 | |
Double Free | [,68.6.1)(68.6.1,68.7.0)(68.7.0,74.0.1) |
Denial of Service (DoS) | |
Code | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Use After Free | |
Resource Management Errors | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Cryptographic Issues | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Input Validation | |
Out-of-Bounds | |
Resource Management Errors | |
Information Exposure | |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Improper Input Validation | |
Race Condition | |
Information Exposure | |
Improper Access Control | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Use After Free | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
Denial of Service (DoS) | |
Integer Overflow or Wraparound | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
CVE-2021-29957 | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Open Redirect | |
CVE-2005-2261 | |
Privilege Escalation | |
Out-of-bounds Write | [10.0,10.0.7)(10.0.7,15.0) |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Access Restriction Bypass | |
Improper Input Validation | [2.0,2.0.0.19)[3.0,3.0.5) |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-bounds Read | |
CVE-2006-2787 | [preview_release,1.5.0.1] |
Use After Free | |
CVE-2006-6506 | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Certificate Validation | |
Use After Free | |
CVE-2020-15681 | |
Denial of Service (DoS) | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
User Impersonation | |
Denial of Service (DoS) | |
Improper Input Validation | [,60.9)[61.0,68.1)(68.1,69.0) |
Access Restriction Bypass | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Information Exposure | |
Arbitrary Code Execution | |
Information Exposure | |
Denial of Service (DoS) | |
Improper Input Validation | |
Improper Restriction of Rendered UI Layers or Frames | |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
Remote Code Execution (RCE) | |
Improper Input Validation | |
Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | |
Resource Management Errors | |
Information Exposure | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
CVE-2005-1158 | |
Authentication Bypass | |
Use After Free | |
Resource Management Errors | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | [2.0,2.0.0.18)[3.0,3.0.2) |
Arbitrary Code Execution | |
Resource Management Errors | |
Improper Certificate Validation | |
Access Restriction Bypass | |
Denial of Service (DoS) | [preview_release,1.5.0.1] |
Use After Free | |
Improper Input Validation | [2.0,2.0.0.19)[3.0,3.0.5) |
Arbitrary Code Injection | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-bounds Read | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
Information Exposure | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Improper Input Validation | |
Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
User Enumeration | |
Arbitrary Code Execution | |
Improper Input Validation | |
Use After Free | |
Information Exposure | [,52.9)[52.9.1,53.0][53.0,60.0)(60.0,60.1.0)(60.1.0,61.0) |
User Impersonation | |
Cross-site Scripting (XSS) | |
Authentication Bypass | |
Cross-site Scripting (XSS) | |
Use After Free | |
Cryptographic Issues | |
Improper Access Control | |
Improper Input Validation | |
Improper Input Validation | |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
Out-of-bounds Write | |
Use After Free | |
Use After Free | [,45.9.0)[52.0,52.1.0)(52.1.0,53.0) |
Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Incorrect Type Conversion or Cast | |
Information Exposure | |
Access Restriction Bypass | |
Resource Management Errors | |
Out-of-Bounds | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Denial of Service (DoS) | [1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1) |
Denial of Service (DoS) | |
Resource Management Errors | |
Information Exposure | |
Arbitrary Code Execution | [17.0,17.0.5)(17.0.5,20.0) |
Out-of-Bounds | |
Access Restriction Bypass | |
Use of a Risky Cryptographic Algorithm | |
Improper Input Validation | |
Out-of-bounds Read | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Cross-site Scripting (XSS) | |
Integer Overflow or Wraparound | |
Cross-site Scripting (XSS) | [,10.0.10)(10.0.10,16.0.2) |
Use After Free | |
Denial of Service (DoS) | [0,firefox-1.5.0.12-4.fc6) |
Improper Certificate Validation | |
Insecure Encryption | |
Denial of Service (DoS) | |
Out-of-bounds Write | |
Authentication Bypass | |
Use After Free | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
Information Exposure | |
Out-of-Bounds | |
Authentication Bypass | |
CVE-2013-5615 | |
Information Exposure | |
Resource Management Errors | |
CVE-2020-35112 | |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Use After Free | |
Buffer Overflow | |
Authentication Bypass | |
Resource Management Errors | |
Security Features | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Buffer Overflow | |
Argument Injection | |
Use After Free | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Remote Code Execution (RCE) | [,2.0.0.19][2.0.0.19,3.0.11) |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Insecure Encryption | |
Denial of Service (DoS) | |
Use After Free | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Out-of-Bounds | |
Improper Input Validation | |
Out-of-Bounds | |
CVE-2021-29975 | |
Access Restriction Bypass | |
Out-of-Bounds | [preview_release,1.5.0.3] |
Information Exposure | |
Arbitrary File Upload | |
Race Condition | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Authentication Bypass | |
Resource Management Errors | |
CVE-2005-1531 | |
Resource Management Errors | |
Resource Management Errors | |
Access Restriction Bypass | |
Improper Input Validation | |
User Impersonation | |
Cross-site Request Forgery (CSRF) | |
Access Restriction Bypass | |
Improper Input Validation | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Use After Free | |
Out-of-Bounds | |
Timing Attack | |
Resource Management Errors | |
User Impersonation | |
Out-of-Bounds | |
Access Restriction Bypass | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Directory Traversal | |
Authentication Bypass | |
Improper Input Validation | |
Remote Code Execution (RCE) | |
User Impersonation | |
Improper Initialization | |
Out-of-Bounds | |
Out-of-Bounds | |
Access Restriction Bypass | |
Unauthorized File Access | |
Improper Authentication | |
Incorrect Authorization | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Access Restriction Bypass | |
User Impersonation | |
Out-of-bounds Read | |
Improper Input Validation | |
Use After Free | |
Improper Input Validation | |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
XML External Entity (XXE) Injection | [2.0,2.0.0.18)[3.0,3.0.4) |
Out-of-Bounds | |
Privilege Escalation | |
Access Restriction Bypass | |
Security Features | |
Out-of-Bounds | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Integer Overflow or Wraparound | |
Race Condition | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Improper Input Validation | |
Out-of-bounds Read | |
Out-of-Bounds | |
Authentication Bypass | |
Use After Free | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Improper Input Validation | |
Arbitrary Code Execution | |
Improper Verification of Cryptographic Signature | |
Information Exposure | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Improper Input Validation | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | [,2.0.0.20][2.0.0.20,3.0.7) |
Improper Input Validation | [,60.0)(60.0,60.1.0)(60.1.0,61.0) |
Out-of-Bounds | |
Access Restriction Bypass | |
Improper Certificate Validation | |
Arbitrary Code Execution | |
Improper Input Validation | [,2.0.0.6][2.0.0.6,2.0.0.8) |
Arbitrary Code Execution | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | [,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Race Condition | |
Out-of-Bounds | [1.5,1.5.0.9)[2.0,2.0.0.1) |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Resource Management Errors | |
Arbitrary File Upload | |
CVE-2004-0764 | |
Access Restriction Bypass | |
Security Features | |
Out-of-bounds Write | |
Session Fixation | |
User Impersonation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Incorrect Authorization | |
Access Restriction Bypass | |
Out-of-Bounds | |
Type Confusion | |
Resource Management Errors | |
Resource Management Errors | |
Arbitrary Code Execution | |
Access Restriction Bypass | |
Improper Input Validation | |
Information Exposure | |
CVE-2020-15650 | |
Use After Free | |
Access Restriction Bypass | |
Buffer Overflow | |
Denial of Service (DoS) | |
Improper Input Validation | |
Resource Management Errors | |
Remote Code Execution (RCE) | |
Out-of-bounds Write | |
CVE-2008-3837 | |
Access Restriction Bypass | |
Improper Data Handling | |
Improper Input Validation | |
User Impersonation | |
Authentication Bypass | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Race Condition | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Use After Free | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Resource Management Errors | |
Race Condition | |
Access Restriction Bypass | |
CVE-2020-12409 | |
Improper Input Validation | |
Arbitrary Code Execution | |
Out-of-Bounds | |
CVE-2004-0866 | |
Resource Management Errors | |
Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Out-of-Bounds | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | |
Resource Management Errors | [preview_release,1.5.0.1] |
Information Exposure | |
Arbitrary Code Execution | |
Authentication Bypass | |
Out-of-bounds Write | |
Resource Management Errors | |
Information Exposure | |
Improper Input Validation | |
Resource Management Errors | |
Use After Free | |
Out-of-bounds Write | [,52.7.0)(52.7.0,52.7.2)(52.7.2,59.0.1) |
Denial of Service (DoS) | [10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0) |
Code | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Resource Management Errors | |
Code | |
Out-of-Bounds | |
Use After Free | [10.0,10.0.11)(10.0.11,17.0) |
Type Confusion | [,60.7.1)(60.7.1,60.7.2)(60.7.2,60.7.3) |
Resource Management Errors | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Buffer Overflow | |
Code | |
Access Restriction Bypass | |
Out-of-Bounds | |
CVE-2010-3773 | |
Cross-site Scripting (XSS) | |
Insecure Encryption | |
Improper Input Validation | |
Information Exposure | |
Use After Free | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Resources Downloaded over Insecure Protocol | |
Out-of-Bounds | |
Use After Free | [,68.10)(68.10,68.10.0)(68.10.0,78.0) |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Improper Input Validation | |
Access Restriction Bypass | |
Authentication Bypass | |
Brute Force | |
Improper Validation | [,60.9.0)[68.0,68.1.0)(68.1.0,69.0) |
Remote Code Execution (RCE) | |
CVE-2019-11730 | |
Improper Restriction of Rendered UI Layers or Frames | |
Improper Input Validation | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Use of Uninitialized Resource | |
Cross-site Scripting (XSS) | |
Cryptographic Issues | |
Improper Input Validation | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | [10.0,10.0.10)(10.0.10,16.0.2) |
Resource Management Errors | [,2.0.0.20][2.0.0.20,3.0.7) |
Out-of-Bounds | |
Use After Free | |
Resource Management Errors | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Cross-site Request Forgery (CSRF) | |
Information Exposure | |
Improper Input Validation | |
Access Restriction Bypass | |
Out-of-bounds Read | |
Arbitrary Code Execution | |
Untrusted Search Path | |
Remote Code Execution (RCE) | |
Resource Management Errors | |
Out-of-Bounds | |
Improper Input Validation | |
Access Restriction Bypass | |
Use After Free | |
Information Exposure | |
Resource Management Errors | |
Use After Free | |
Out-of-bounds Read | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Privilege Escalation | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Open Redirect | |
Use After Free | [,68.6.1)(68.6.1,68.7.0)(68.7.0,74.0.1) |
Out-of-Bounds | |
Resource Management Errors | |
Access Restriction Bypass | |
Improper Access Control | |
CVE-2007-4879 | |
Use After Free | [,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0) |
Use After Free | |
Remote Code Execution (RCE) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Out-of-bounds Write | [,68.3)(68.3,68.3.0)(68.3.0,71.0) |
Information Exposure | |
Information Exposure | |
Improper Restriction of Rendered UI Layers or Frames | |
Information Exposure | |
Access Restriction Bypass | |
Arbitrary Code Injection | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Read | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Input Validation | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Use After Free | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
CVE-2007-1736 | |
Out-of-Bounds | [,45.6)(45.6,45.6.0)(45.6.0,50.1) |
Cross-site Scripting (XSS) | |
Arbitrary Code Execution | |
Cross-site Scripting (XSS) | |
Integer Overflow or Wraparound | [,60.0)(60.0,60.1.0)(60.1.0,61.0) |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Input Validation | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Information Exposure | |
Interpretation Conflict | |
Out-of-Bounds | |
Denial of Service (DoS) | |
CVE-2018-18497 | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Use After Free | |
Access Restriction Bypass | |
Information Exposure | |
Buffer Overflow | |
Cross-site Request Forgery (CSRF) | |
CVE-2018-18506 | |
Resource Management Errors | |
Improper Input Validation | [,52.9.0)[52.9.1,60.0)(60.0,60.1.0)(60.1.0,61.0) |
Access Restriction Bypass | |
Use After Free | |
Out-of-Bounds | |
Symlink Attack | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Error Handling | |
Information Exposure | |
Remote Code Execution (RCE) | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Improper Input Validation | |
Denial of Service (DoS) | |
Security Features | |
CVE-2020-26976 | |
Information Exposure | |
CVE-2006-6585 | |
Authentication Bypass | |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Out-of-Bounds | |
Resource Management Errors | |
Denial of Service (DoS) | |
Information Exposure | |
Cryptographic Issues | |
Use After Free | |
Improper Input Validation | |
Information Exposure | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Remote Code Execution (RCE) | |
Improper Input Validation | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Security Features | |
Improper Input Validation | |
Information Exposure | |
Information Exposure | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Out-of-Bounds | [,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0) |
Improper Authentication | |
Out-of-Bounds | |
Access Restriction Bypass | |
Out-of-Bounds | |
Access Restriction Bypass | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
User Enumeration | |
Resource Management Errors | |
Race Condition | |
Out-of-Bounds | |
Type Confusion | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Security Features | |
CVE-2006-3812 | |
Denial of Service (DoS) | |
Improper Input Validation | |
Information Exposure | |
Symlink Attack | |
Improper Authentication | |
Out-of-bounds Write | |
Denial of Service (DoS) | |
Information Exposure | |
Information Exposure | |
Missing Initialization of Resource | |
Improper Access Control | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Arbitrary Code Execution | |
CVE-2005-0142 | |
Cross-site Scripting (XSS) | |
Resource Management Errors | [,2.0.0.20][2.0.0.20,3.0.7) |
Use After Free | [10.0,10.0.7)(10.0.7,15.0) |
Insecure Default | |
Out-of-Bounds | |
Improper Input Validation | |
Resource Management Errors | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Access Control | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Denial of Service (DoS) | |
Remote Code Execution (RCE) | |
Information Exposure | |
Information Exposure | |
Resource Management Errors | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Information Exposure | [10.0,10.0.7)(10.0.7,15.0) |
Cross-site Scripting (XSS) | |
CVE-2010-3181 | |
Authentication Bypass | |
Use After Free | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Use After Free | [,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0) |
Cross-site Scripting (XSS) | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Security Features | |
Denial of Service (DoS) | |
CVE-2006-1736 | |
Cryptographic Issues | |
Information Exposure | |
Access Restriction Bypass | |
Improper Input Validation | |
Out-of-bounds Write | |
Cryptographic Issues | |
Information Exposure | |
Cryptographic Issues | |
Cryptographic Issues | |
Improper Input Validation | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Resource Management Errors | |
Authentication Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Race Condition | [,24.3)(24.3,24.3.0)(24.3.0,27.0) |
Out-of-Bounds | |
Out-of-Bounds | |
Cryptographic Issues | |
Improper Input Validation | [,2.0.0.22)[2.0.0.22,3.3) |
Insecure Encryption | [,24.3)(24.3,24.3.0)(24.3.0,27.0) |
Arbitrary Code Execution | |
Denial of Service (DoS) | |
CVE-2006-5462 | |
Improper Input Validation | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | [1.5,1.5.0.10)[2.0,2.0.0.2) |
Denial of Service (DoS) | |
Denial of Service (DoS) | [,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0) |
Cryptographic Issues | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Data Handling | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Data Handling | |
Out-of-Bounds | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-bounds Read | |
Out-of-Bounds | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Buffer Overflow | [,3.0.6)[3.0.7,3.1.1)(3.1.1,3.5.11)[3.5.12,3.6.7) |
Cryptographic Issues | |
Cryptographic Issues | |