| Out-of-Bounds |  | 
| Uncaught Exception |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Improper Validation of Array Index |  | 
| Improper Check or Handling of Exceptional Conditions |  | 
| Improper Check or Handling of Exceptional Conditions |  | 
| Out-of-Bounds |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Read |  | 
| Exposure of Private Personal Information to an Unauthorized Actor |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| NULL Pointer Dereference |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Use After Free |  | 
| Out-of-bounds Read |  | 
| Use After Free |  | 
| Use After Free |  | 
| Use After Free |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Cross-site Scripting (XSS) |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Expired Pointer Dereference |  | 
| Use After Free |  | 
| Buffer Overflow |  | 
| Use of Less Trusted Source |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Access of Resource Using Incompatible Type ('Type Confusion') |  | 
| Denial of Service (DoS) |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Write |  | 
| Improper Resource Shutdown or Release |  | 
| Improperly Implemented Security Check for Standard |  | 
| Access of Memory Location After End of Buffer |  | 
| Origin Validation Error |  | 
| Information Exposure |  | 
| Cross-site Scripting (XSS) |  | 
| Arbitrary Code Injection |  | 
| Information Exposure |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Arbitrary Code Injection |  | 
| Code Injection |  | 
| Origin Validation Error |  | 
| Use After Free |  | 
| Use After Free |  | 
| Resource Exhaustion |  | 
| User Interface (UI) Misrepresentation of Critical Information |  | 
| Use After Free |  | 
| Code Injection |  | 
| Code Injection |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Arbitrary Code Execution |  | 
| Out-of-bounds Read |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Permissive Cross-domain Policy with Untrusted Domains |  | 
| Out-of-Bounds |  | 
| Arbitrary Code Execution |  | 
| Arbitrary Code Execution |  | 
| Arbitrary Code Execution |  | 
| Out-of-Bounds |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Information Exposure |  | 
| Permissive Cross-domain Policy with Untrusted Domains |  | 
| Use After Free |  | 
| Buffer Overflow |  | 
| Use After Free |  | 
| Out-of-bounds Write |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Use After Free |  | 
| Improper Data Handling |  | 
| Improper Input Validation |  |