| CVE-2026-44903 | |
| GHSA-fw8g-cg8f-9j28 | |
| GHSA-497x-jcxf-m478 | |
| GHSA-h74g-238j-357m | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| CVE-2026-39825 | |
| Out-of-bounds Write | |
| NULL Pointer Dereference | |
| Cross-site Scripting (XSS) | |
| CVE-2026-42501 | |
| Double Free | |
| GHSA-5m4p-2gjx-p2g8 | |
| GHSA-p9h5-jm8x-mjm5 | |
| GHSA-3v2c-x6q9-f697 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-qf3q-3h68-mmh2 | |
| CVE-2026-42499 | |
| GHSA-8g2r-hhvj-mv99 | |
| Improper Encoding or Escaping of Output | |
| GHSA-qc64-m6c2-v4x7 | |
| GHSA-xq5j-9r39-c3vf | |
| Link Following | |
| GHSA-2283-wf8c-rw8r | |
| GHSA-pxq6-2prw-chj9 | |
| Authentication Bypass | |
| Off-by-one Error | |
| GHSA-x744-4wpc-v9h2 | |
| SQL Injection | |
| GHSA-wf45-q9ch-q8gh | |
| Integer Overflow or Wraparound | |
| GHSA-j88v-2chj-qfwx | |
| GHSA-w8rr-5gcm-pp58 | |
| Uncontrolled Memory Allocation | |
| Untrusted Search Path | |
| GHSA-hfvc-g4fc-pqhx | |
| GHSA-78h2-9frx-2jm8 | |
| Uncaught Exception | |
| Improper Validation of Array Index | |
| GHSA-6g7g-w4f8-9c9x | |
| GHSA-p77j-4mvh-x3m3 | |
| Improper Authorization | |
| Directory Traversal | |
| Direct Request ('Forced Browsing') | |
| GHSA-j4j7-vw47-rhfq | |
| GHSA-rv83-g57w-fr8j | |
| GHSA-j3gx-2473-5fp8 | |
| Cross-site Scripting (XSS) | |
| GHSA-8fj7-8h3w-xwfm | |
| CVE-2026-27141 | |
| CVE-2025-68121 | |
| GHSA-8jvr-vh7g-f8gx | |
| CVE-2025-61732 | |
| GHSA-h355-32pf-p2xm | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-cfpf-hrx2-8rv6 | |
| GHSA-f6x5-jh6r-wrfv | |
| CVE-2025-47914 | |
| Race Condition | |
| Missing Initialization of Resource | |
| Time-of-check Time-of-use (TOCTOU) | |
| CVE-2025-22871 | |
| Asymmetric Resource Consumption (Amplification) | |
| Improper Input Validation | |
| Open Redirect | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2025-22870 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2025-22866 | |
| CVE-2024-45336 | |
| CVE-2024-45341 | |
| CVE-2024-45338 | |
| CVE-2024-45337 | |
| Improper Handling of Exceptional Conditions | |
| CVE-2024-34155 | |
| CVE-2024-34158 | |
| CVE-2024-34156 | |
| CVE-2024-45310 | |
| CVE-2024-41110 | |
| Information Exposure Through Log Files | |
| Race Condition | |
| Out-of-Bounds | |
| CVE-2024-24787 | |
| CVE-2024-24788 | |
| Arbitrary Command Injection | |
| CVE-2023-45288 | |