| External Control of Assumed-Immutable Web Parameter | |
| External Control of Assumed-Immutable Web Parameter | |
| GHSA-fmvf-422w-w34q | |
| Heap-based Buffer Overflow | |
| GHSA-3gvp-p32j-pc5m | |
| GHSA-88x7-8x6j-5jw9 | |
| GHSA-4hxj-cq55-f7pf | |
| GHSA-7gpj-6vgg-g937 | |
| Use After Free | |
| CVE-2026-5903 | |
| Heap-based Buffer Overflow | |
| GHSA-9wcm-fcg4-668c | |
| GHSA-jj38-mp8f-h2ph | |
| Out-of-bounds Write | |
| CVE-2026-5882 | |
| Heap-based Buffer Overflow | |
| GHSA-3p5h-985r-gw4g | |
| GHSA-vv23-jmr5-38v3 | |
| CVE-2026-5907 | |
| Improper Input Validation | |
| Use After Free | |
| GHSA-w6c2-hh29-88fc | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Heap-based Buffer Overflow | |
| GHSA-m6q7-p4c3-835r | |
| GHSA-wrr6-q4vw-3g77 | |
| Improper Input Validation | |
| Use After Free | |
| GHSA-mp5w-52hw-836r | |
| GHSA-j5p3-q3mr-g82w | |
| GHSA-pwvq-679h-c42j | |
| Use After Free | |
| GHSA-7rpr-3745-83c9 | |
| Integer Overflow or Wraparound | |
| GHSA-4cv7-w26g-hfm8 | |
| GHSA-6xwp-952x-4vgf | |
| GHSA-rjhq-52xc-gxc5 | |
| Use After Free | |
| Use After Free | |
| Improper Input Validation | |
| GHSA-g3cg-9h6m-vx92 | |
| GHSA-xhc9-2rpq-wh58 | |
| Use of Uninitialized Variable | |
| GHSA-88qr-f9fq-422w | |
| External Control of Assumed-Immutable Web Parameter | |
| GHSA-5grw-5p3c-hg2g | |
| CVE-2026-5895 | |
| GHSA-j44f-447f-h94p | |
| Use After Free | |
| CVE-2026-6313 | |
| GHSA-cxxr-98x3-mp4j | |
| External Control of Assumed-Immutable Web Parameter | |
| CVE-2026-5906 | |
| GHSA-2rw5-37w7-549x | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| GHSA-mvj2-3qfg-7mxp | |
| GHSA-q4f4-mqcx-4prx | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Protection Against Physical Side Channels | |
| GHSA-vhh6-f54w-x5gw | |
| Use After Free | |
| GHSA-vhp9-v4r9-mxwj | |
| Use After Free | |
| GHSA-w92q-q263-3p4v | |
| GHSA-26fq-x95v-v55j | |
| GHSA-vmw5-396h-99jh | |
| CVE-2026-5911 | |
| GHSA-q568-5559-56w7 | |
| GHSA-44vf-4x73-jv4x | |
| GHSA-qwmx-478f-c8cp | |
| GHSA-m8qq-h68v-7p42 | |
| GHSA-2x9w-3q66-8rrm | |
| GHSA-9w25-v364-3jpm | |
| CVE-2026-5891 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| GHSA-x449-4qch-5wjq | |
| GHSA-p824-jmv3-c7rj | |
| GHSA-qg3c-xm7q-9c4x | |
| CVE-2026-5897 | |
| Use After Free | |
| Use After Free | |
| GHSA-xm65-r32w-c46p | |
| GHSA-2h64-4pg7-rq8p | |
| GHSA-gfjm-pp2m-j8cw | |
| GHSA-32x4-hg4x-w43c | |
| GHSA-7vch-9rmg-wjrj | |
| GHSA-4hx4-54fm-qc8q | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| GHSA-q3h3-jpfc-g5v7 | |
| Use After Free | |
| GHSA-42f8-mjwj-phf3 | |
| Use After Free | |
| GHSA-vwj9-ff2w-vvh3 | |
| Out-of-bounds Read | |
| GHSA-pvxc-vj6p-fp82 | |
| CVE-2026-5900 | |
| Use After Free | |
| CVE-2026-5873 | |
| GHSA-h6cm-pcwj-hj57 | |
| Heap-based Buffer Overflow | |
| CVE-2026-5905 | |
| Use After Free | |
| Use After Free | |
| GHSA-j7wg-hx8x-r38h | |
| CVE-2026-5862 | |
| GHSA-9jm7-cgmm-6qg2 | |
| Improper Input Validation | |
| GHSA-pfc6-jxgq-cf62 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2026-5880 | |
| CVE-2026-5894 | |
| GHSA-gxc3-xj8w-g58j | |
| CVE-2026-5892 | |
| GHSA-pwrx-g3gw-r3rq | |
| Use After Free | |
| GHSA-px27-v386-gc8q | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| GHSA-4hgw-f49w-4349 | |
| CVE-2026-5918 | |
| CVE-2026-5898 | |
| Race Condition | |
| GHSA-qcvg-hwr7-r9v7 | |
| CVE-2026-5901 | |
| Heap-based Buffer Overflow | |
| GHSA-6r59-54c6-3757 | |
| GHSA-7xx9-pp7c-pv8h | |
| GHSA-mxfw-g2rw-x783 | |
| GHSA-q556-g83v-3933 | |
| CVE-2026-5878 | |
| GHSA-3m3g-56cx-59q7 | |
| GHSA-2fw9-cxch-qx5h | |
| Use After Free | |
| Use After Free | |
| GHSA-g284-h8h3-hv83 | |
| GHSA-c9xc-4327-hw8j | |
| GHSA-jvch-x2xh-p75v | |
| GHSA-hmgp-8pgg-h7pp | |
| GHSA-x56m-fjh7-273x | |
| CVE-2026-5896 | |
| Race Condition | |
| Improper Input Validation | |
| GHSA-vm22-5c7q-8w8h | |
| GHSA-pphc-2gqm-m8rv | |
| GHSA-qhxw-36rq-x2m4 | |
| Race Condition | |
| CVE-2026-5863 | |
| External Control of Assumed-Immutable Web Parameter | |
| CVE-2026-5899 | |
| GHSA-7256-9fwc-879g | |
| GHSA-3347-qjpp-457v | |
| Use of Uninitialized Variable | |
| Out-of-bounds Read | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| CVE-2026-6312 | |
| Use After Free | |
| CVE-2026-5875 | |
| GHSA-hh8m-xqf2-mgfv | |
| GHSA-gjmf-r9m5-967q | |
| GHSA-f4mv-qxg4-7wq3 | |
| GHSA-24v7-w2x9-2cxh | |
| GHSA-rfr9-hj39-mwqc | |
| Out-of-bounds Read | |
| GHSA-j54v-ww9j-cr6r | |
| CVE-2026-5881 | |
| CVE-2026-5889 | |
| Improper Input Validation | |
| GHSA-68f9-j542-jmrp | |
| GHSA-q6m3-mcr7-qwwq | |
| Out-of-bounds Write | |
| GHSA-6p79-xrpj-wmp3 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| GHSA-x4jg-wm7v-8287 | |
| GHSA-x5c8-43vf-fmpc | |
| GHSA-96rx-8295-gjvx | |
| GHSA-5hwj-hjjc-gm39 | |
| Out-of-bounds Read | |
| Integer Overflow or Wraparound | |
| GHSA-x582-7573-343x | |
| CVE-2026-3934 | |
| GHSA-82w6-2jqh-pvw5 | |
| CVE-2026-3920 | |
| CVE-2026-3941 | |
| Use After Free | |
| GHSA-j53j-3fvf-64m5 | |
| GHSA-cfxf-mmwj-6763 | |
| GHSA-frgx-w57m-9m62 | |
| Improper Protection Against Physical Side Channels | |
| CVE-2026-3928 | |
| GHSA-8h7v-3ch8-p4rg | |
| Out-of-bounds Write | |
| GHSA-qgc5-2pjm-6x2m | |
| GHSA-gw82-5jc5-87cj | |
| GHSA-5j2j-j2vj-6m3j | |
| Use After Free | |
| Out-of-bounds Read | |
| Heap-based Buffer Overflow | |
| CVE-2026-3940 | |
| GHSA-593v-v2rv-gqr7 | |
| Use After Free | |
| CVE-2026-3939 | |
| GHSA-g9f5-pwqf-9xc6 | |
| CVE-2026-3938 | |
| GHSA-43w8-4q7x-65hj | |
| GHSA-6j39-2hhh-v6j9 | |
| Use After Free | |
| Use After Free | |
| GHSA-jmwc-f9w6-7j8q | |
| GHSA-89j4-4h3p-qx8x | |
| Use After Free | |
| GHSA-gc25-m8g6-jp4f | |
| GHSA-744q-86j7-m2q4 | |
| GHSA-7c9p-58x7-4wjx | |
| Use After Free | |
| GHSA-q3vm-f267-x4qx | |
| Out-of-bounds Read | |
| GHSA-mqf6-pg39-x737 | |
| CVE-2026-3927 | |
| GHSA-vqfx-qx8m-7h3j | |
| GHSA-vmg7-mm7m-x7r2 | |
| GHSA-fj9c-h67p-ph2j | |
| GHSA-cghr-h62w-2fc6 | |
| Integer Overflow or Wraparound | |
| GHSA-4x4v-cw6f-wc3m | |
| CVE-2026-3935 | |
| CVE-2026-3942 | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| GHSA-qvmx-rqmx-pvfg | |
| CVE-2026-3063 | |
| GHSA-33jq-j95r-2gpj | |
| GHSA-vmmw-c3hw-gvm3 | |
| GHSA-m7rx-q9f3-3p96 | |
| Use After Free | |
| GHSA-h5vr-w6qh-ffwp | |
| CVE-2026-2316 | |
| GHSA-m568-c33v-g59q | |
| GHSA-wcfp-f743-hjm5 | |
| Heap-based Buffer Overflow | |
| GHSA-c37x-p7mp-hh29 | |
| Use After Free | |
| GHSA-xpp8-qpcr-c3rg | |
| GHSA-3mf8-2573-7cx8 | |
| CVE-2026-2323 | |
| GHSA-hpj8-5pv7-f58m | |
| Race Condition | |
| CVE-2026-2322 | |
| CVE-2026-2317 | |
| CVE-2026-2318 | |
| Heap-based Buffer Overflow | |
| GHSA-4r9x-qh7r-9qv9 | |
| Heap-based Buffer Overflow | |
| GHSA-gvjm-pmwp-75mw | |
| External Control of Assumed-Immutable Web Parameter | |
| GHSA-rj79-m8w5-gpw8 | |
| Use After Free | |
| CVE-2026-2320 | |
| GHSA-pp78-hqqc-jrrq | |
| CVE-2026-2315 | |
| GHSA-4g6v-jhwq-9xjj | |
| GHSA-2prw-jcj2-h5xf | |
| GHSA-qprx-jf5f-fhhx | |
| GHSA-4hf5-r2xh-wq7q | |
| CVE-2026-0905 | |
| CVE-2026-0904 | |
| GHSA-jq9g-gj4g-q8w7 | |
| GHSA-7m49-7hpq-vmxj | |
| GHSA-743w-qrv8-633j | |
| GHSA-m5g9-928c-q4jg | |
| GHSA-39vc-r5gw-mf5w | |
| CVE-2026-0900 | |
| CVE-2026-0899 | |
| GHSA-pr2r-wqj6-wp4h | |
| GHSA-9j7r-xv46-hxx9 | |
| GHSA-pj9h-fmxg-jwmr | |
| Use After Free | |
| GHSA-fgj7-39v4-xhp5 | |
| GHSA-rw66-g8v8-wcwh | |
| CVE-2026-0902 | |
| CVE-2026-0628 | |
| CVE-2026-0906 | |
| CVE-2026-0901 | |
| CVE-2026-0907 | |
| Improper Input Validation | |
| GHSA-r5qp-7h29-v42w | |
| Use After Free | |
| GHSA-gv8f-9g4r-fj8q | |
| Use After Free | |
| GHSA-9fjm-6w64-76r7 | |
| CVE-2025-14766 | |
| GHSA-xmjj-27j3-8w2g | |
| Out-of-bounds Write | |
| CVE-2025-14373 | |
| GHSA-72mf-gf7v-562w | |
| Race Condition | |
| GHSA-m7f9-qw7f-whp3 | |
| GHSA-r3pv-9whv-57xc | |
| CVE-2025-13634 | |
| Use After Free | |
| GHSA-p4q8-mx85-6fc8 | |
| CVE-2025-13635 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| GHSA-68ww-h25v-g8mq | |
| GHSA-2c6f-5h2f-xj25 | |
| GHSA-6pgw-376w-jrxx | |
| GHSA-c8g4-h8j5-vjpp | |
| CVE-2025-13632 | |
| GHSA-x93g-7wjc-5jqw | |
| CVE-2025-13636 | |
| GHSA-6jxr-vc7p-9hqv | |
| CVE-2025-13640 | |
| CVE-2025-13631 | |
| GHSA-h5pr-3m5w-7gm8 | |
| Use After Free | |
| GHSA-9www-pqcc-jm28 | |
| CVE-2025-13639 | |
| GHSA-gvmq-hr29-xrx3 | |
| CVE-2025-13637 | |
| Incorrect Type Conversion or Cast | |
| Out-of-bounds Write | |
| GHSA-4xh6-3w83-666c | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2025-6556 | |
| Use After Free | |
| External Control of Assumed-Immutable Web Parameter | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| CVE-2025-5064 | |
| CVE-2025-5281 | |
| Out-of-bounds Write | |
| CVE-2025-5066 | |
| CVE-2025-5067 | |
| CVE-2025-5065 | |
| Use After Free | |
| CVE-2025-4050 | |
| CVE-2025-4052 | |
| CVE-2025-4051 | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2025-0451 | |
| Use After Free | |
| Use After Free | |
| CVE-2025-0611 | |
| CVE-2025-0612 | |
| CVE-2025-0435 | |
| CVE-2025-0441 | |
| Race Condition | |
| CVE-2025-0440 | |
| External Control of Assumed-Immutable Web Parameter | |
| Out-of-bounds Read | |
| CVE-2025-0447 | |
| CVE-2025-0443 | |
| CVE-2025-0442 | |
| CVE-2025-0446 | |
| Stack-based Buffer Overflow | |
| CVE-2025-0434 | |
| CVE-2025-0448 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-12692 | |
| CVE-2024-12694 | |
| CVE-2024-12695 | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-11395 | |
| CVE-2024-11116 | |
| CVE-2024-11114 | |
| Use After Free | |
| Use After Free | |
| CVE-2024-11117 | |
| CVE-2024-11115 | |
| CVE-2024-11111 | |
| CVE-2024-11110 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2024-8906 | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-8908 | |
| CVE-2024-8909 | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-Bounds | |
| CVE-2024-8035 | |
| CVE-2024-8034 | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-7978 | |
| Use After Free | |
| Insufficient Verification of Data Authenticity | |
| Out-of-bounds Write | |
| CVE-2024-7974 | |
| Insufficient Verification of Data Authenticity | |
| CVE-2024-7972 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-7981 | |
| CVE-2024-7975 | |
| CVE-2024-7977 | |
| CVE-2024-8033 | |
| Out-of-bounds Write | |
| CVE-2024-7976 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Use of Uninitialized Resource | |
| CVE-2024-7256 | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| CVE-2024-6778 | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-6101 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2024-5843 | |
| Use After Free | |
| Use After Free | |
| CVE-2024-5839 | |
| Use After Free | |
| CVE-2024-5840 | |
| Use After Free | |
| Use After Free | |
| CVE-2024-5836 | |
| CVE-2024-5834 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2024-3846 | |
| CVE-2024-3840 | |
| CVE-2024-3833 | |
| Use After Free | |
| CVE-2024-3843 | |
| CVE-2024-3845 | |
| Cross-site Scripting (XSS) | |
| CVE-2024-3838 | |
| Use After Free | |
| CVE-2024-3844 | |
| Out-of-bounds Read | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| CVE-2024-3832 | |
| Out-of-Bounds | |
| CVE-2024-3156 | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |