CVE-2024-3854
| |
CVE-2024-3853
| |
CVE-2024-3856
| |
CVE-2024-3852
| |
CVE-2024-3855
| |
CVE-2024-3302
| |
CVE-2024-3862
| |
CVE-2024-3861
| |
CVE-2024-3864
| |
CVE-2024-3857
| |
CVE-2024-3858
| |
CVE-2024-3859
| |
CVE-2024-3865
| |
CVE-2024-3860
| |
CVE-2024-29944
| |
CVE-2024-29943
| |
CVE-2024-2612
| |
CVE-2024-2611
| |
CVE-2024-2610
| |
CVE-2024-2609
| |
CVE-2024-2614
| |
CVE-2024-2606
| |
CVE-2024-2608
| |
CVE-2024-2613
| |
CVE-2024-2607
| |
CVE-2024-2615
| |
CVE-2023-5388
| |
CVE-2024-1556
| |
CVE-2024-1555
| |
CVE-2024-1549
| |
CVE-2024-1551
| |
CVE-2024-1552
| |
CVE-2024-1546
| |
CVE-2024-1550
| |
CVE-2024-1554
| |
CVE-2024-1548
| |
CVE-2024-1547
| |
CVE-2024-1553
| |
CVE-2024-1557
| |
Use After Free
| |
Unchecked Return Value
| |
Out-of-Bounds
| |
Improper Privilege Management
| |
Out-of-bounds Write
| |
CVE-2024-0755
| |
CVE-2024-0742
| |
CVE-2024-0754
| |
CVE-2024-0746
| |
CVE-2024-0753
| |
Out-of-bounds Write
| |
Origin Validation Error
| |
CVE-2024-0750
| |
CVE-2024-0747
| |
CVE-2024-0748
| |
CVE-2023-6865
| |
Out-of-bounds Write
| |
Race Condition
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Information Exposure
| |
CVE-2023-6869
| |
CVE-2023-6871
| |
Out-of-bounds Write
| |
CVE-2023-6872
| |
CVE-2023-6860
| |
CVE-2023-6863
| |
Use After Free
| |
Out-of-bounds Write
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Handling of Exceptional Conditions
| |
Use After Free
| |
Out-of-bounds Read
| |
CVE-2023-6208
| |
Directory Traversal
| |
Use After Free
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2023-6210
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Out-of-bounds Write
| |
CVE-2023-5725
| |
CVE-2023-5728
| |
Information Exposure
| |
Improper Restriction of Rendered UI Layers or Frames
| |
CVE-2023-5724
| |
CVE-2023-5729
| |
Out-of-bounds Write
| |
CVE-2023-5723
| |
Out-of-bounds Write
| |
Integer Overflow or Wraparound
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Memory Leak
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Missing Encryption of Sensitive Data
| |
CVE-2023-4579
| |
CVE-2023-4581
| |
Use After Free
| |
Use After Free
| |
CVE-2023-4577
| |
Out-of-bounds Write
| |
Allocation of Resources Without Limits or Throttling
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2023-4583
| |
Use After Free
| |
Link Following
| |
Origin Validation Error
| |
CVE-2023-4047
| |
Race Condition
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
CVE-2023-4046
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2023-4051
| |
CVE-2023-4055
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2019-25136
| |
CVE-2023-37204
| |
Link Following
| |
CVE-2023-37203
| |
CVE-2023-37210
| |
Use After Free
| |
CVE-2023-37205
| |
Use After Free
| |
Use After Free
| |
CVE-2023-37208
| |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
Missing Authorization
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Open Redirect
| |
Out-of-bounds Write
| |
Improper Certificate Validation
| |
Out-of-bounds Write
| |
CVE-2023-32208
| |
Authentication Bypass
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
CVE-2023-32211
| |
CVE-2023-32210
| |
CVE-2023-32205
| |
Use of Uninitialized Resource
| |
CVE-2023-32212
| |
Out-of-bounds Write
| |
Double Free
| |
Out-of-bounds Write
| |
Inadequate Encryption Strength
| |
Use After Free
| |
Improper Encoding or Escaping of Output
| |
CVE-2023-29547
| |
CVE-2023-29550
| |
Resource Exhaustion
| |
Exposure of Resource to Wrong Sphere
| |
CVE-2023-29548
| |
Use After Free
| |
Race Condition
| |
CVE-2023-29535
| |
Open Redirect
| |
NULL Pointer Dereference
| |
CVE-2023-29533
| |
CVE-2023-25751
| |
CVE-2023-25752
| |
CVE-2023-28164
| |
CVE-2023-28160
| |
Incorrect Type Conversion or Cast
| |
Exposure of Resource to Wrong Sphere
| |
Improper Preservation of Permissions
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Unchecked Return Value
| |
CVE-2023-25742
| |
Out-of-bounds Write
| |
CVE-2023-25741
| |
CVE-2023-25736
| |
Use After Free
| |
CVE-2023-25737
| |
Out-of-bounds Write
| |
CVE-2023-25728
| |
CVE-2023-25729
| |
Out-of-bounds Write
| |
CVE-2023-25730
| |
CVE-2023-0767
| |
CVE-2023-25731
| |
Use After Free
| |
Origin Validation Error
| |
Inadequate Encryption Strength
| |
CVE-2023-23603
| |
Improper Check for Unusual or Exceptional Conditions
| |
Out-of-bounds Write
| |
CVE-2023-23598
| |
CVE-2023-23604
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2022-46871
| |
CVE-2022-46874
| |
Out-of-bounds Write
| |
Arbitrary Code Injection
| |
CVE-2022-46872
| |
Out-of-bounds Write
| |
CVE-2022-46877
| |
CVE-2022-45408
| |
Improper Certificate Validation
| |
Improper Restriction of Rendered UI Layers or Frames
| |
CVE-2022-45410
| |
Use After Free
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Link Following
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Out-of-bounds Write
| |
CVE-2022-45404
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
CVE-2022-45415
| |
Origin Validation Error
| |
NULL Pointer Dereference
| |
Cleartext Storage of Sensitive Information
| |
Out-of-bounds Write
| |
Race Condition
| |
CVE-2022-42929
| |
Arbitrary Code Injection
| |
CVE-2022-40957
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Insecure Storage of Sensitive Information
| |
Out-of-bounds Write
| |
Incorrect Authorization
| |
Improper Preservation of Permissions
| |
Origin Validation Error
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2022-36319
| |
CVE-2022-2205
| |
Race Condition
| |
Open Redirect
| |
Out-of-bounds Write
| |
CVE-2022-36315
| |
Out-of-bounds Write
| |
Open Redirect
| |
Cross-site Scripting (XSS)
| |
CVE-2022-34472
| |
CVE-2022-34471
| |
CVE-2022-34468
| |
Access of Uninitialized Pointer
| |
CVE-2022-34479
| |
Cross-site Scripting (XSS)
| |
CVE-2022-34476
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
CVE-2022-34482
| |
CVE-2022-34477
| |
Use After Free
| |
CVE-2022-34483
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Cross-site Scripting (XSS)
| |
CVE-2022-31742
| |
Improper Validation of Array Index
| |
Cross-site Scripting (XSS)
| |
CVE-2022-31736
| |
Out-of-bounds Write
| |
Use of Uninitialized Resource
| |
CVE-2022-31748
| |
Authentication Bypass
| |
Out-of-bounds Read
| |
CVE-2022-31740
| |
Use After Free
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Out-of-bounds Write
| |
Incorrect Default Permissions
| |
Out-of-bounds Write
| |
Open Redirect
| |
CVE-2022-29914
| |
CVE-2022-29916
| |
CVE-2022-29915
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Out-of-bounds Read
| |
CVE-2022-28283
| |
Use After Free
| |
CVE-2022-28284
| |
Use After Free
| |
CVE-2022-28287
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Inefficient Regular Expression Complexity
| |
Time-of-check Time-of-use (TOCTOU)
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2022-26384
| |
CVE-2022-26383
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
CVE-2022-22759
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Information Exposure
| |
CVE-2022-22761
| |
Origin Validation Error
| |
Operation on a Resource after Expiration or Release
| |
Incorrect Authorization
| |
CVE-2022-22756
| |
Out-of-bounds Write
| |
CVE-2022-22743
| |
Out-of-bounds Read
| |
Improper Certificate Validation
| |
CVE-2022-22741
| |
Use After Free
| |
XML Injection
| |
CVE-2022-22739
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2022-22745
| |
CVE-2022-22748
| |
Race Condition
| |
Use After Free
| |
CVE-2021-43533
| |
Open Redirect
| |
Out-of-bounds Write
| |
Origin Validation Error
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Information Exposure
| |
Race Condition
| |
CVE-2021-43541
| |
Excessive Iteration
| |
Cross-site Scripting (XSS)
| |
CVE-2021-43540
| |
Incorrect Type Conversion or Cast
| |
Information Exposure
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Use After Free
| |
Origin Validation Error
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Incorrect Authorization
| |
CVE-2021-38501
| |
CVE-2021-38500
| |
Out-of-bounds Write
| |
Use After Free
| |
Origin Validation Error
| |
Use After Free
| |
Out-of-bounds Write
| |
CVE-2021-38491
| |
Out-of-bounds Write
| |
Race Condition
| |
HTTP Request Smuggling
| |
Missing Release of Resource after Effective Lifetime
| |
Out-of-Bounds
| |
Race Condition
| |
Missing Initialization of Resource
| |
CVE-2021-29981
| |
Improper Restriction of Excessive Authentication Attempts
| |
Interpretation Conflict
| |
Out-of-Bounds
| |
Use After Free
| |
CVE-2021-29984
| |
Use After Free
| |
Use After Free
| |
CVE-2021-29975
| |
CVE-2021-29974
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Arbitrary Code Injection
| |
Out-of-bounds Write
| |
Incorrect Authorization
| |
Out-of-Bounds
| |
Missing Authorization
| |
Out-of-Bounds
| |
Incorrect Resource Transfer Between Spheres
| |
Race Condition
| |
Exposure of Resource to Wrong Sphere
| |
Missing Initialization of Resource
| |
Operation on a Resource after Expiration or Release
| |
CVE-2021-24000
| |
Arbitrary Argument Injection
| |
Incorrect Calculation
| |
Integer Overflow or Wraparound
| |
Out-of-Bounds
| |
CVE-2021-23996
| |
Incorrect Conversion between Numeric Types
| |
Improper Privilege Management
| |
Insufficient Verification of Data Authenticity
| |
Authentication Bypass
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Origin Validation Error
| |
Exposure of Resource to Wrong Sphere
| |
Out-of-Bounds
| |
Inadequate Encryption Strength
| |
Out-of-Bounds
| |
CVE-2021-23978
| |
CVE-2021-23974
| |
Missing Authorization
| |
Information Exposure
| |
Out-of-Bounds
| |
Information Exposure
| |
Reachable Assertion
| |
CVE-2021-23969
| |
CVE-2021-23972
| |
CVE-2021-23971
| |
Out-of-Bounds
| |
Improper Preservation of Permissions
| |
Out-of-Bounds
| |
Exposure of Resource to Wrong Sphere
| |
CVE-2021-23960
| |
CVE-2021-23962
| |
CVE-2021-23956
| |
CVE-2021-23961
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Improper Restriction of Rendered UI Layers or Frames
| |
CVE-2021-23953
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
CVE-2020-26973
| |
CVE-2020-35111
| |
Use After Free
| |
Out-of-bounds Write
| |
Open Redirect
| |
CVE-2020-26976
| |
CVE-2020-26978
| |
Information Exposure
| |
Out-of-bounds Write
| |
Out-of-bounds Write
| |
Use After Free
| |
CVE-2020-26963
| |
CVE-2020-26967
| |
CVE-2020-26961
| |
Use After Free
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Improper Cross-boundary Removal of Sensitive Data
| |
Cross-site Scripting (XSS)
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
CVE-2020-16012
| |
Out-of-bounds Write
| |
Use After Free
| |
Origin Validation Error
| |
CVE-2020-15681
| |
CVE-2020-15684
| |
CVE-2020-15683
| |
CVE-2020-15680
| |
Out-of-Bounds
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Buffer Overflow
| |
Use After Free
| |
Open Redirect
| |
Release of Invalid Pointer or Reference
| |
Release of Invalid Pointer or Reference
| |
Unrestricted Upload of File with Dangerous Type
| |
Information Exposure
| |
Release of Invalid Pointer or Reference
| |
Improper Locking
| |
CVE-2020-15665
| |
Incorrect Authorization
| |
Improper Restriction of Rendered UI Layers or Frames
| |
Information Exposure
| |
CVE-2020-6829
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
CVE-2020-15653
| |
Origin Validation Error
| |
Out-of-bounds Write
| |
Improper Check for Unusual or Exceptional Conditions
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Information Exposure
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
CVE-2020-6514
| |
CVE-2020-12412
| |
Use After Free
| |
Incorrect Default Permissions
| |
Incorrect Default Permissions
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Certificate Validation
| |
Use After Free
| |
Out-of-Bounds
| |
Information Exposure
| |
CVE-2020-12409
| |
Arbitrary Code Injection
| |
Out-of-Bounds
| |
Insufficient Verification of Data Authenticity
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Deserialization of Untrusted Data
| |
Race Condition
| |
Buffer Overflow
| |
Information Exposure
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Improper Privilege Management
| |
Session Fixation
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Use After Free
| |
Double Free
| |
Out-of-Bounds
| |
CVE-2020-6813
| |
Authentication Bypass
| |
Information Exposure
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Arbitrary Code Injection
| |
Out-of-bounds Read
| |
Authentication Bypass
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Cross-site Scripting (XSS)
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Improper Input Validation
| |
Buffer Overflow
| |
Out-of-bounds Write
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Improper Authentication
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Inclusion of Functionality from Untrusted Control Sphere
| |
Buffer Overflow
| |
Use After Free
| |
Buffer Overflow
| |
Buffer Overflow
| |
Incorrect Default Permissions
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Origin Validation Error
| |
Race Condition
| |
Improper Input Validation
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Buffer Overflow
| |
CVE-2019-11754
| |
Out-of-bounds Read
| |
Buffer Overflow
| |
Improper Initialization
| |
Insufficient Verification of Data Authenticity
| |
Buffer Overflow
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Out-of-Bounds
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
| |
Use After Free
| |
Incorrect Default Permissions
| |
Improper Input Validation
| |
Improper Preservation of Permissions
| |
Inclusion of Functionality from Untrusted Control Sphere
| |
CVE-2019-11749
| |
Cross-site Scripting (XSS)
| |
Improper Authentication
| |
Out-of-bounds Read
| |
Incorrect Authorization
| |
Arbitrary Code Injection
| |
CVE-2019-11725
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Use After Free
| |
CVE-2019-11721
| |
Arbitrary Code Injection
| |
Improper Certificate Validation
| |
Cross-site Request Forgery (CSRF)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
CVE-2019-11730
| |
Origin Validation Error
| |
Exposure of Resource to Wrong Sphere
| |
Improper Encoding or Escaping of Output
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
CVE-2019-11711
| |
Out-of-Bounds
| |
Information Exposure
| |
Improper Input Validation
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Information Exposure
| |
Cross-site Scripting (XSS)
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Origin Validation Error
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
CVE-2019-11699
| |
Improper Input Validation
| |
Improper Input Validation
| |
Use After Free
| |
CVE-2019-11695
| |
Improper Input Validation
| |
CVE-2018-18510
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Out-of-Bounds
| |
Resource Management Errors
| |
Use of Uninitialized Resource
| |
Origin Validation Error
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Resource Management Errors
| |
Improper Input Validation
| |
Reachable Assertion
| |
Information Exposure
| |
Out-of-Bounds
| |
Origin Validation Error
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Origin Validation Error
| |
Origin Validation Error
| |
Information Exposure
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-Bounds
| |
Improper Authentication
| |
Use After Free
| |
Out-of-Bounds
| |
CVE-2018-18506
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2018-18497
| |
Out-of-Bounds
| |
Use After Free
| |
Incorrect Permission Assignment for Critical Resource
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Origin Validation Error
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Improper Authentication
| |
Improper Input Validation
| |
Out-of-Bounds
| |
CVE-2018-12398
| |
Origin Validation Error
| |
CVE-2018-12395
| |
Incorrect Permission Assignment for Critical Resource
| |
Information Exposure
| |
CVE-2018-12403
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
CVE-2018-12392
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Improper Input Validation
| |
Incorrect Type Conversion or Cast
| |
Insufficiently Protected Credentials
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-bounds Write
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-bounds Write
| |
Cross-site Request Forgery (CSRF)
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Information Exposure
| |
Out-of-Bounds
| |
Cross-site Request Forgery (CSRF)
| |
Integer Overflow or Wraparound
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Information Exposure
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Improper Input Validation
| |
Incorrect Authorization
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Use After Free
| |
CVE-2018-5105
| |
Race Condition
| |
Cross-site Scripting (XSS)
| |
CVE-2017-5390
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Improper Validation of Array Index
| |
Information Exposure
| |
Use After Free
| |
CVE-2017-5386
| |
Arbitrary Code Injection
| |
Out-of-bounds Read
| |
Information Exposure
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Incorrect Calculation
| |
CVE-2017-7820
| |
Incorrect Default Permissions
| |
Improper Privilege Management
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
CVE-2017-7781
| |
Information Exposure
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Information Exposure
| |
CVE-2018-5168
| |
Use After Free
| |
Improper Input Validation
| |
Arbitrary Code Injection
| |
Improper Input Validation
| |
Allocation of Resources Without Limits or Throttling
| |
Incorrect Permission Assignment for Critical Resource
| |
Information Exposure
| |
Use After Free
| |
Information Exposure
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Information Exposure
| |
Out-of-Bounds
| |
Use After Free
| |
Link Following
| |
CVE-2017-5391
| |
Use After Free
| |
Use After Free
| |
Security Features
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Improper Input Validation
| |
Information Exposure
| |
Out-of-Bounds
| |
Information Exposure
| |
Use After Free
| |
Information Exposure
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
Improper Preservation of Permissions
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
CVE-2017-7830
| |
Use After Free
| |
Arbitrary Code Injection
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Input Validation
| |
Information Exposure
| |
Use After Free
| |
CVE-2017-7789
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Improper Input Validation
| |
Information Exposure
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Use After Free
| |
File and Directory Information Exposure
| |
Out-of-bounds Read
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Open Redirect
| |
Out-of-Bounds
| |
Cross-site Scripting (XSS)
| |
Origin Validation Error
| |
Information Exposure
| |
Use After Free
| |
Out-of-Bounds
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Improper Input Validation
| |
Use After Free
| |
Improper Initialization
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Use After Free
| |
CVE-2017-5455
| |
DEPRECATED: Use of Uninitialized Resource
| |
Out-of-bounds Write
| |
CVE-2018-5165
| |
Information Exposure
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Information Exposure
| |
Improper Input Validation
| |
CVE-2018-5142
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
Missing Authorization
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Information Exposure
| |
Incorrect Permission Assignment for Critical Resource
| |
Use After Free
| |
Integer Overflow or Wraparound
| |
Error Handling
| |
Information Exposure
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Information Exposure
| |
Improper Input Validation
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Missing Authorization
| |
Integer Overflow or Wraparound
| |
CVE-2017-5419
| |
Information Exposure
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
CVE-2018-5117
| |
Files or Directories Accessible to External Parties
| |
Out-of-bounds Write
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-bounds Read
| |
CVE-2017-7835
| |
Improper Input Validation
| |
Improper Input Validation
| |
Information Exposure
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Origin Validation Error
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Improper Input Validation
| |
Use After Free
| |
Access Restriction Bypass
| |
Out-of-bounds Read
| |
Use After Free
| |
Out-of-bounds Read
| |
Origin Validation Error
| |
Cross-site Scripting (XSS)
| |
Incorrect Permission Assignment for Critical Resource
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Open Redirect
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Input Validation
| |
Race Condition
| |
Access Restriction Bypass
| |
Use After Free
| |
Improper Certificate Validation
| |
Security Features
| |
Improper Input Validation
| |
Cross-site Scripting (XSS)
| |
Improper Input Validation
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Improper Input Validation
| |
Origin Validation Error
| |
Improper Input Validation
| |
CVE-2017-7822
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Information Exposure
| |
Improper Input Validation
| |
Improper Input Validation
| |
Use After Free
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Improper Input Validation
| |
Directory Traversal
| |
Improper Input Validation
| |
Information Exposure
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
Information Exposure
| |
Improper Privilege Management
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Information Exposure
| |
Information Exposure
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
Uncontrolled Search Path Element
| |
Security Features
| |
Access Restriction Bypass
| |
Information Exposure
| |
Out-of-bounds Write
| |
Improper Access Control
| |
Out-of-Bounds
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Access Control
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Information Exposure
| |
Out-of-Bounds
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Read
| |
Use After Free
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Integer Overflow or Wraparound
| |
Integer Overflow or Wraparound
| |
Information Exposure
| |
Access Restriction Bypass
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Input Validation
| |
Use After Free
| |
Security Features
| |
Out-of-Bounds
| |
Cross-site Scripting (XSS)
| |
Out-of-Bounds
| |
Incorrect Type Conversion or Cast
| |
Information Exposure
| |
Use After Free
| |
Information Exposure
| |
CVE-2016-2835
| |
Cross-site Scripting (XSS)
| |
Use After Free
| |
Use After Free
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Information Exposure
| |
CVE-2016-2828
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2016-2834
| |
Cross-site Scripting (XSS)
| |
Security Features
| |
Improper Access Control
| |
Improper Access Control
| |
CVE-2016-2821
| |
Improper Access Control
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2016-2811
| |
Race Condition
| |
Improper Access Control
| |
Access Restriction Bypass
| |
Improper Access Control
| |
Out-of-Bounds
| |
CVE-2016-1962
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Improper Data Handling
| |
Out-of-Bounds
| |
CVE-2016-1960
| |
Improper Data Handling
| |
Information Exposure
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2016-1966
| |
Security Features
| |
Access Restriction Bypass
| |
Out-of-Bounds
| |
CVE-2016-1973
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
CVE-2016-1979
| |
Out-of-Bounds
| |
Security Features
| |
Information Exposure
| |
Access Restriction Bypass
| |
CVE-2016-1961
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Resource Management Errors
| |
CVE-2016-1964
| |
Out-of-Bounds
| |
Out-of-Bounds
| |
Numeric Errors
| |
Out-of-Bounds
| |
Access Restriction Bypass
| |
CVE-2007-0801
| |
CVE-2006-6497
| |
Access Restriction Bypass
| |
Security Features
| |
CVE-2006-6502
| |
CVE-2006-6499
| |
CVE-2006-6498
| |
Arbitrary Code Injection
| |
CVE-2006-6585
| |
CVE-2006-5463
| |
CVE-2006-5748
| |
CVE-2006-5747
| |
CVE-2006-5462
| |
CVE-2006-5464
| |
CVE-2006-5633
| |
CVE-2006-4569
| |
Cross-site Scripting (XSS)
| |
CVE-2006-4571
| |
CVE-2006-4567
| |
CVE-2006-4566
| |
Out-of-Bounds
| |
Improper Input Validation
| |
CVE-2006-4561
| |
Improper Input Validation
| |
Access Restriction Bypass
| |
CVE-2006-3812
| |
CVE-2006-3805
| |
CVE-2006-3811
| |
CVE-2006-3808
| |
CVE-2006-3802
| |
CVE-2006-3809
| |
CVE-2006-3810
| |
CVE-2006-3801
| |
CVE-2006-3113
| |
CVE-2006-3803
| |
Numeric Errors
| |
Configuration
| |
CVE-2006-3807
| |
CVE-2006-3731
| |
Out-of-Bounds
| |
CVE-2006-2787
| |
CVE-2006-2786
| |
Improper Input Validation
| |
CVE-2006-2785
| |
Cross-site Scripting (XSS)
| |
Arbitrary Code Injection
| |
Arbitrary Code Injection
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
CVE-2006-2776
| |
CVE-2006-2778
| |
CVE-2006-2777
| |
CVE-2006-2723
| |
CVE-2006-2332
| |
Resource Management Errors
| |
CVE-2006-1942
| |
Resource Management Errors
| |
Numeric Errors
| |
CVE-2006-1738
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Improper Input Validation
| |
Resource Management Errors
| |
CVE-2006-1723
| |
CVE-2006-1742
| |
Out-of-Bounds
| |
CVE-2006-1736
| |
Resource Management Errors
| |
CVE-2006-1531
| |
CVE-2006-1732
| |
CVE-2006-1734
| |
CVE-2006-1529
| |
CVE-2006-1727
| |
CVE-2006-1740
| |
CVE-2006-1530
| |
Access Restriction Bypass
| |
CVE-2006-1724
| |
Numeric Errors
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Access Restriction Bypass
| |
CVE-2006-1728
| |
CVE-2006-1045
| |
Improper Input Validation
| |
CVE-2006-0299
| |
CVE-2006-0297
| |
Improper Input Validation
| |
CVE-2006-0295
| |
CVE-2006-0292
| |
CVE-2006-0293
| |
CVE-2006-0294
| |
CVE-2006-0296
| |
CVE-2005-4685
| |
CVE-2005-4720
| |
CVE-2005-4134
| |
CVE-2005-3896
| |
CVE-2005-2353
| |
CVE-2005-2414
| |
CVE-2005-2395
| |
CVE-2004-1639
| |