| Out-of-Bounds | |
| Uncaught Exception | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Improper Validation of Array Index | |
| Improper Check or Handling of Exceptional Conditions | |
| Improper Check or Handling of Exceptional Conditions | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Exposure of Private Personal Information to an Unauthorized Actor | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| NULL Pointer Dereference | |
| Cross-site Request Forgery (CSRF) | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Cross-site Scripting (XSS) | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Expired Pointer Dereference | |
| Use After Free | |
| Buffer Overflow | |
| Use of Less Trusted Source | |
| Information Exposure | |
| Out-of-bounds Write | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-bounds Write | |
| Missing Release of Resource after Effective Lifetime | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Denial of Service (DoS) | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Improper Resource Shutdown or Release | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Injection | |
| Improperly Implemented Security Check for Standard | |
| Access of Memory Location After End of Buffer | |
| Origin Validation Error | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Injection | |
| Information Exposure | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Information Exposure | |
| Out-of-bounds Write | |
| Arbitrary Code Injection | |
| Code Injection | |
| Origin Validation Error | |
| Cross-site Request Forgery (CSRF) | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Authentication | |
| Use After Free | |
| Resource Exhaustion | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Code Injection | |
| Code Injection | |
| Use After Free | |
| Information Exposure | |
| Type Confusion | |
| Improper Restriction of Operations within the Bounds of a Memory Buffer | |
| Arbitrary Code Execution | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| Improper Control of Generation of Code ('Code Injection') | |
| Use After Free | |
| Use After Free | |
| Remote Code Execution (RCE) | |
| Arbitrary Code Injection | |
| Information Exposure | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Permissive Cross-domain Policy with Untrusted Domains | |
| Out-of-Bounds | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Use After Free | |
| Out-of-bounds Read | |
| Sandbox Bypass | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Information Exposure | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Information Exposure | |
| Out-of-bounds Write | |
| Information Exposure | |
| Arbitrary Code Execution | |
| Information Exposure | |
| Authentication Bypass | |
| Out-of-bounds Write | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-bounds Read | |
| Buffer Overflow | |
| Out-of-bounds Write | |
| Use After Free | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Use After Free | |
| Use After Free | |
| Denial of Service (DoS) | |
| Heap-based Buffer Overflow | |
| Permissive Cross-domain Policy with Untrusted Domains | |
| Use After Free | |
| Buffer Overflow | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Data Handling | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Validation of Array Index | |
| Authentication Bypass | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Improper Input Validation | [,1.2.6)[7.0.517.0,7.0.517.44) |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2010-3114 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| CVE-2020-29623 | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Use After Free | |
| Information Exposure | |
| Race Condition | |
| Use After Free | |
| Arbitrary Code Execution | |
| Out-of-bounds Read | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| Type Confusion | |
| Improper Certificate Validation | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Input Validation | |
| Use After Free | |
| Out-of-Bounds | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Out-of-Bounds | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Out-of-Bounds | |
| Improper Certificate Validation | |
| Improper Data Handling | |
| Denial of Service (DoS) | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Use After Free | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Security Features | |