| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| CVE-2026-6313 | |
| Use After Free | |
| Out-of-bounds Write | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2026-6312 | |
| Out-of-bounds Read | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use of Uninitialized Variable | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| External Control of Assumed-Immutable Web Parameter | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2026-5896 | |
| External Control of Assumed-Immutable Web Parameter | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2026-5907 | |
| Heap-based Buffer Overflow | |
| CVE-2026-5903 | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| CVE-2026-5881 | |
| Race Condition | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Improper Input Validation | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| External Control of Assumed-Immutable Web Parameter | |
| External Control of Assumed-Immutable Web Parameter | |
| CVE-2026-5878 | |
| CVE-2026-5875 | |
| Improper Input Validation | |
| CVE-2026-5895 | |
| Heap-based Buffer Overflow | |
| External Control of Assumed-Immutable Web Parameter | |
| CVE-2026-5898 | |
| CVE-2026-5901 | |
| CVE-2026-5900 | |
| CVE-2026-5905 | |
| Improper Input Validation | |
| Improper Protection Against Physical Side Channels | |
| CVE-2026-5891 | |
| Race Condition | |
| CVE-2026-5894 | |
| CVE-2026-5918 | |
| Use After Free | |
| CVE-2026-5906 | |
| CVE-2026-5892 | |
| Use of Uninitialized Variable | |
| CVE-2026-5882 | |
| CVE-2026-5880 | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2026-5862 | |
| CVE-2026-5873 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2026-5863 | |
| Heap-based Buffer Overflow | |
| CVE-2026-5911 | |
| CVE-2026-5897 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2026-5889 | |
| Race Condition | |
| CVE-2026-5899 | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| CVE-2026-5283 | |
| Use After Free | |
| External Control of Assumed-Immutable Web Parameter | |
| Heap-based Buffer Overflow | |
| External Control of Assumed-Immutable Web Parameter | |
| Use After Free | |
| CVE-2026-5291 | |
| Use After Free | |
| CVE-2026-5276 | |
| CVE-2026-5279 | |
| Use After Free | |
| Out-of-bounds Read | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2026-4461 | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2026-4459 | |
| Integer Overflow or Wraparound | |
| CVE-2026-4440 | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Write | |
| CVE-2026-4439 | |
| CVE-2026-4447 | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Integer Overflow or Wraparound | |
| Arbitrary Code Injection | |
| Out-of-bounds Write | |
| CVE-2026-3930 | |
| CVE-2026-3938 | |
| CVE-2026-3932 | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2026-3937 | |
| Out-of-bounds Write | |
| CVE-2026-3925 | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2026-3941 | |
| CVE-2026-3920 | |
| Use After Free | |
| CVE-2026-3934 | |
| Use After Free | |
| CVE-2026-3939 | |
| CVE-2026-3928 | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2026-3935 | |
| Integer Overflow or Wraparound | |
| CVE-2026-3927 | |
| Use After Free | |
| CVE-2026-3940 | |
| CVE-2026-3942 | |
| Improper Protection Against Physical Side Channels | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| CVE-2026-3543 | |
| Out-of-bounds Read | |
| Integer Underflow | |
| CVE-2026-3541 | |
| CVE-2026-3545 | |
| CVE-2026-3542 | |
| External Control of Assumed-Immutable Web Parameter | |
| CVE-2026-3539 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2026-3063 | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| External Control of Assumed-Immutable Web Parameter | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| CVE-2026-2315 | |
| Race Condition | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| CVE-2026-2316 | |
| CVE-2026-2322 | |
| CVE-2026-2317 | |
| CVE-2026-2323 | |
| CVE-2026-2318 | |
| CVE-2026-2320 | |
| Use After Free | |
| CVE-2026-1862 | |
| Out-of-bounds Write | |
| CVE-2026-1504 | |
| CVE-2026-1220 | |
| Use After Free | |
| CVE-2026-0900 | |
| CVE-2026-0905 | |
| CVE-2026-0899 | |
| CVE-2026-0904 | |
| CVE-2026-0907 | |
| Improper Input Validation | |
| CVE-2026-0902 | |
| CVE-2026-0901 | |
| CVE-2026-0906 | |
| CVE-2026-0628 | |
| CVE-2025-14766 | |
| Use After Free | |
| CVE-2025-14373 | |
| Use After Free | |
| Improper Protection Against Physical Side Channels | |
| Use After Free | |
| CVE-2025-13631 | |
| CVE-2025-13635 | |
| CVE-2025-13640 | |
| CVE-2025-13632 | |
| CVE-2025-13637 | |
| Incorrect Type Conversion or Cast | |
| CVE-2025-13639 | |
| CVE-2025-13634 | |
| CVE-2025-13636 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Race Condition | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2025-13097 | |
| CVE-2025-13107 | |
| Out-of-bounds Read | |
| CVE-2024-7017 | |
| CVE-2024-13178 | |
| Out-of-bounds Write | |
| CVE-2025-12910 | |
| CVE-2025-12911 | |
| CVE-2025-12906 | |
| CVE-2025-12909 | |
| CVE-2025-12907 | |
| CVE-2025-12728 | |
| CVE-2025-12729 | |
| CVE-2025-12726 | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| CVE-2025-12446 | |
| CVE-2025-12440 | |
| CVE-2025-12433 | |
| Race Condition | |
| CVE-2025-12447 | |
| CVE-2025-12435 | |
| Race Condition | |
| CVE-2025-12431 | |
| CVE-2025-12430 | |
| CVE-2025-12429 | |
| CVE-2025-12436 | |
| CVE-2025-12444 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2025-12445 | |
| Inadequate Encryption Strength | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2025-12036 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Protection Against Physical Side Channels | |
| CVE-2025-11216 | |
| CVE-2025-11213 | |
| CVE-2025-11208 | |
| CVE-2025-11212 | |
| Improper Protection Against Physical Side Channels | |
| Out-of-bounds Write | |
| Use After Free | |
| Off-by-one Error | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| CVE-2025-11209 | |
| External Control of Assumed-Immutable Web Parameter | |
| External Control of Assumed-Immutable Web Parameter | |
| Information Exposure | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2025-10201 | |
| Use After Free | |
| CVE-2025-9867 | |
| CVE-2025-9865 | |
| CVE-2025-9866 | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Race Condition | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| CVE-2025-8881 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2025-5281 | |
| Use After Free | |
| CVE-2025-4664 | |
| Heap-based Buffer Overflow | |
| Improper Input Validation | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| External Control of Assumed-Immutable Web Parameter | |
| Improper Input Validation | |
| CVE-2025-4052 | |
| Out-of-bounds Read | |
| CVE-2024-9958 | |
| CVE-2025-8581 | |
| CVE-2025-3073 | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2024-8906 | |
| Use After Free | |
| Use After Free | |
| CVE-2024-8908 | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Use After Free | |
| Directory Traversal | |
| Insufficient Verification of Data Authenticity | |
| CVE-2025-0451 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2025-0441 | |
| Out-of-bounds Read | |
| CVE-2024-7975 | |
| CVE-2025-0446 | |
| CVE-2024-7972 | |
| CVE-2025-8583 | |
| Out-of-Bounds | |
| Use After Free | |
| CVE-2024-9962 | |
| External Control of Assumed-Immutable Web Parameter | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2025-3067 | |
| CVE-2025-3069 | |
| Out-of-bounds Write | |
| CVE-2025-5064 | |
| Use After Free | |
| Use After Free | |
| CVE-2024-7005 | |
| Improper Restriction of Rendered UI Layers or Frames | |
| CVE-2025-5419 | |
| CVE-2025-4051 | |
| Out-of-bounds Write | |
| CVE-2025-3072 | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| CVE-2024-7978 | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2025-0447 | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Exposure of Sensitive Information Through Metadata | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Use After Free | |
| Stack-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| CVE-2025-0612 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2024-6995 | |
| Out-of-bounds Write | |
| CVE-2025-0448 | |
| Use After Free | |
| CVE-2025-0442 | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2024-5500 | |
| Race Condition | |
| Use After Free | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-8035 | |
| CVE-2024-9963 | |
| Improper Input Validation | |
| CVE-2024-7001 | |
| CVE-2025-8579 | |
| Insufficient Verification of Data Authenticity | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-5843 | |
| CVE-2024-9965 | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Write | |
| CVE-2025-5066 | |
| Improper Validation of Specified Quantity in Input | |
| CVE-2025-8580 | |
| CVE-2024-5834 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2024-8033 | |
| CVE-2024-8909 | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2025-6556 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2025-6557 | |
| Use After Free | |
| Use of Uninitialized Resource | |
| CVE-2025-5067 | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Integer Overflow or Wraparound | |
| Heap-based Buffer Overflow | |
| Use After Free | |
| Use After Free | |
| CVE-2024-7004 | |
| CVE-2025-4050 | |
| CVE-2024-5836 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2025-5065 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-5839 | |
| CVE-2025-8577 | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2025-3071 | |
| CVE-2025-3068 | |
| CVE-2024-3833 | |
| CVE-2024-3844 | |
| Use After Free | |
| CVE-2024-6778 | |
| Use After Free | |
| Use After Free | |
| CVE-2024-3843 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2025-3074 | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-3846 | |
| Insufficient Verification of Data Authenticity | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2025-0443 | |
| CVE-2024-6101 | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2025-0611 | |
| External Control of Assumed-Immutable Web Parameter | |
| Out-of-bounds Write | |
| CVE-2024-8034 | |
| Use After Free | |
| Use After Free | |
| CVE-2025-0996 | |
| Use of Uninitialized Resource | |
| CVE-2025-4609 | |
| CVE-2025-0440 | |
| Out-of-bounds Read | |
| CVE-2025-0435 | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2024-9964 | |
| CVE-2025-0434 | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| CVE-2024-7003 | |
| Use After Free | |
| CVE-2024-12695 | |
| Use After Free | |
| CVE-2024-3174 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-9966 | |
| Use After Free | |
| CVE-2024-9956 | |
| CVE-2024-1671 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2024-10229 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2024-7981 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| CVE-2024-12692 | |
| CVE-2024-5840 | |
| CVE-2024-7976 | |
| Out-of-bounds Write | |
| CVE-2024-2630 | |
| CVE-2024-11117 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2024-0810 | |
| CVE-2024-7974 | |
| CVE-2024-0333 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-2631 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| CVE-2024-7977 | |
| CVE-2024-3840 | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2024-7256 | |
| CVE-2023-7282 | |
| CVE-2024-7019 | |
| Use After Free | |
| Use After Free | |
| CVE-2024-3832 | |
| CVE-2024-7020 | |
| Use After Free | |
| Use After Free | |
| CVE-2024-11110 | |
| CVE-2024-6999 | |
| Race Condition | |
| CVE-2024-3172 | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Integer Underflow | |
| Use After Free | |
| CVE-2024-3175 | |
| CVE-2024-11116 | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-5850 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| CVE-2024-2629 | |
| CVE-2024-1675 | |
| CVE-2024-0809 | |
| Out-of-bounds Write | |
| CVE-2024-0811 | |
| Use After Free | |
| CVE-2023-6511 | |
| CVE-2023-5479 | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| CVE-2023-5477 | |
| Use After Free | |
| CVE-2024-0812 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Origin Validation Error | |
| Use After Free | |
| CVE-2023-5481 | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| CVE-2023-4908 | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2024-3845 | |
| Use After Free | |
| CVE-2023-5475 | |
| Out-of-bounds Write | |
| Use After Free | |
| Improper Restriction of Rendered UI Layers or Frames | |
| Use After Free | |
| Use After Free | |
| CVE-2023-4904 | |
| Use After Free | |
| Use After Free | |
| CVE-2023-6512 | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2024-11115 | |
| CVE-2023-4368 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2024-3838 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| CVE-2023-4359 | |
| Use After Free | |
| Origin Validation Error | |
| Out-of-bounds Read | |
| CVE-2024-0805 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2023-5484 | |
| Out-of-bounds Write | |
| Arbitrary Command Injection | |
| Use After Free | |
| Use After Free | |
| Out-of-Bounds | |
| CVE-2023-7281 | |
| CVE-2024-1672 | |
| CVE-2023-7012 | |
| CVE-2024-2628 | |
| Use After Free | |
| CVE-2023-3736 | |
| Use After Free | |
| Out-of-bounds Read | |
| Use After Free | |
| CVE-2024-2625 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-4905 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2023-4900 | |
| CVE-2023-4764 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| CVE-2024-1674 | |
| Out-of-bounds Write | |
| CVE-2023-2937 | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2023-4360 | |
| Use After Free | |
| CVE-2024-3156 | |
| Use After Free | |
| CVE-2023-5487 | |
| CVE-2024-11111 | |
| CVE-2023-2938 | |
| Use After Free | |
| CVE-2024-11114 | |
| CVE-2023-2726 | |
| Origin Validation Error | |
| Out-of-bounds Write | |
| CVE-2024-11395 | |
| CVE-2023-4357 | |
| CVE-2024-12694 | |
| Use After Free | |
| Use After Free | |
| CVE-2023-4078 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2023-2941 | |
| CVE-2023-2463 | |
| Use After Free | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Use After Free | |
| CVE-2023-5485 | |
| CVE-2023-2466 | |
| Use After Free | |
| CVE-2023-2468 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2023-7011 | |
| Insufficient Verification of Data Authenticity | |
| Integer Overflow or Wraparound | |
| CVE-2024-0804 | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2023-1817 | |
| CVE-2023-4906 | |
| CVE-2023-4367 | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Read | |
| CVE-2023-1822 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-2940 | |
| CVE-2023-5857 | |
| Use After Free | |
| CVE-2023-3734 | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| CVE-2023-4901 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Insufficient Verification of Data Authenticity | |
| CVE-2023-5483 | |
| Use After Free | |
| CVE-2023-1223 | |
| CVE-2023-2313 | |
| Origin Validation Error | |
| Origin Validation Error | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-4365 | |
| CVE-2023-1228 | |
| CVE-2023-5486 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2023-4902 | |
| Out-of-bounds Write | |
| CVE-2023-5478 | |
| CVE-2023-4077 | |
| CVE-2023-4860 | |
| CVE-2023-4909 | |
| Use After Free | |
| CVE-2023-2460 | |
| CVE-2023-4907 | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-3737 | |
| Use After Free | |
| Out-of-bounds Read | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| CVE-2023-1821 | |
| Use After Free | |
| CVE-2022-4955 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-4361 | |
| Improper Input Validation | |
| CVE-2023-4363 | |
| Use After Free | |
| CVE-2023-0140 | |
| Use After Free | |
| Use After Free | |
| CVE-2023-3733 | |
| CVE-2023-0700 | |
| Out-of-bounds Write | |
| CVE-2023-0704 | |
| CVE-2023-2462 | |
| CVE-2023-4350 | |
| CVE-2023-1231 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-0136 | |
| Link Following | |
| CVE-2023-1814 | |
| CVE-2023-1816 | |
| Use After Free | |
| Use After Free | |
| CVE-2023-0133 | |
| Use After Free | |
| CVE-2023-1230 | |
| Use After Free | |
| CVE-2023-4364 | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Integer Overflow or Wraparound | |
| CVE-2022-4923 | |
| CVE-2022-4909 | |
| Out-of-Bounds | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-4903 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2023-1226 | |
| CVE-2023-1225 | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2022-4189 | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| CVE-2023-3740 | |
| CVE-2023-2467 | |
| Out-of-bounds Write | |
| CVE-2023-3735 | |
| Use After Free | |
| CVE-2023-3738 | |
| Improper Input Validation | |
| CVE-2022-4184 | |
| CVE-2022-4182 | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2022-4193 | |
| CVE-2022-4025 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Read | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2023-2311 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| CVE-2022-3660 | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-1823 | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2023-2465 | |
| Use After Free | |
| CVE-2022-4908 | |
| Use After Free | |
| Improper Input Validation | |
| Use After Free | |
| CVE-2023-1813 | |
| Use After Free | |
| CVE-2023-1236 | |
| Use After Free | |
| CVE-2023-1234 | |
| CVE-2022-3447 | |
| CVE-2023-1232 | |
| Use After Free | |
| CVE-2022-3443 | |
| Use After Free | |
| Use After Free | |
| Incorrect Default Permissions | |
| Use After Free | |
| Improper Resource Shutdown or Release | |
| Use After Free | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2023-1221 | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Use After Free | |
| Use After Free | |
| CVE-2023-1224 | |
| Integer Overflow or Wraparound | |
| Improper Input Validation | |
| CVE-2023-2459 | |
| Use After Free | |
| CVE-2022-4906 | |
| Use After Free | |
| Use After Free | |
| Integer Overflow or Wraparound | |
| Use After Free | |
| CVE-2022-3047 | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| CVE-2023-0697 | |
| Incorrect Authorization | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Missing Authentication for Critical Function | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Read | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2022-3053 | |
| Use After Free | |
| Use After Free | |
| CVE-2022-3304 | |
| Use After Free | |
| CVE-2022-2856 | |
| CVE-2022-3044 | |
| CVE-2023-1233 | |
| CVE-2022-2622 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| Use After Free | |
| Race Condition | |
| CVE-2022-4913 | |
| Use After Free | |
| Race Condition | |
| CVE-2022-4907 | |
| CVE-2022-4922 | |
| CVE-2022-4195 | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2023-0141 | |
| Out-of-bounds Write | |
| Use After Free | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| Out-of-bounds Write | |
| CVE-2022-4917 | |
| CVE-2022-2616 | |
| Out-of-bounds Write | |
| CVE-2023-2464 | |
| Use After Free | |
| Use After Free | |
| Improper Encoding or Escaping of Output | |
| Out-of-bounds Write | |
| Improper Input Validation | |
| Use After Free | |
| CVE-2022-3310 | |
| Use After Free | |
| CVE-2023-0131 | |
| CVE-2022-3316 | |
| Use After Free | |
| Use After Free | |
| CVE-2023-0132 | |
| Use After Free | |
| Out-of-bounds Write | |
| Use After Free | |
| CVE-2022-4190 | |
| Out-of-bounds Write | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Out-of-bounds Write | |
| Arbitrary Code Injection | |
| Use After Free | |
| Race Condition | |
| Use After Free | |
| Out-of-bounds Write | |
| CVE-2023-0130 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| CVE-2022-4926 | |
| CVE-2022-1871 | |
| Use After Free | |
| Out-of-bounds Read | |