Access of Resource Using Incompatible Type ('Type Confusion') | |
Denial of Service (DoS) | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Improper Resource Shutdown or Release | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Improperly Implemented Security Check for Standard | |
Access of Memory Location After End of Buffer | |
Origin Validation Error | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Information Exposure | |
User Interface (UI) Misrepresentation of Critical Information | |
Information Exposure | |
Out-of-bounds Write | |
Arbitrary Code Injection | |
Code Injection | |
Origin Validation Error | |
Cross-site Request Forgery (CSRF) | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Read | |
Improper Authentication | |
Use After Free | |
Resource Exhaustion | |
User Interface (UI) Misrepresentation of Critical Information | |
Use After Free | |
Code Injection | |
Code Injection | |
Use After Free | |
Information Exposure | |
Type Confusion | |
Improper Restriction of Operations within the Bounds of a Memory Buffer | |
Arbitrary Code Execution | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |
Improper Control of Generation of Code ('Code Injection') | |
Use After Free | |
Use After Free | |
Remote Code Execution (RCE) | |
Arbitrary Code Injection | |
Information Exposure | |
Out-of-Bounds | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Permissive Cross-domain Policy with Untrusted Domains | |
Out-of-Bounds | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Use After Free | |
Out-of-bounds Read | |
Sandbox Bypass | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Information Exposure | |
Out-of-bounds Write | |
Use After Free | |
Out-of-bounds Write | |
Information Exposure | |
Out-of-bounds Write | |
Information Exposure | |
Arbitrary Code Execution | |
Information Exposure | |
Authentication Bypass | |
Out-of-bounds Write | |
Information Exposure | |
Out-of-Bounds | |
Out-of-bounds Read | |
Buffer Overflow | |
Out-of-bounds Write | |
Use After Free | |
Denial of Service (DoS) | |
Information Exposure | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Use After Free | |
Use After Free | |
Denial of Service (DoS) | |
Heap-based Buffer Overflow | |
Permissive Cross-domain Policy with Untrusted Domains | |
Use After Free | |
Buffer Overflow | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Arbitrary Code Injection | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Data Handling | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Validation of Array Index | |
Authentication Bypass | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-bounds Write | |
Improper Input Validation | [,1.2.6)[7.0.517.0,7.0.517.44) |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
CVE-2010-3114 | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
CVE-2020-29623 | |
Improper Input Validation | |
Out-of-bounds Write | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-Bounds | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Race Condition | |
Use After Free | |
Arbitrary Code Execution | |
Out-of-bounds Read | |
Use After Free | |
Improper Input Validation | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Type Confusion | |
Improper Certificate Validation | |
Denial of Service (DoS) | |
Information Exposure | |
Out-of-Bounds | |
Improper Input Validation | |
Information Exposure | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Use After Free | |
Cross-site Scripting (XSS) | |
Use After Free | |
Out-of-Bounds | |
Information Exposure | |
Integer Overflow or Wraparound | |
Out-of-Bounds | |
Improper Certificate Validation | |
Improper Data Handling | |
Denial of Service (DoS) | |
Out-of-Bounds | |
Out-of-Bounds | |
Resource Management Errors | |
Out-of-Bounds | [,2.22.6][2.22.6,2.23.91) |
Use After Free | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Denial of Service (DoS) | |
Improper Input Validation | |
Security Features | |