| GHSA-mh29-5h37-fv8m | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-5jpx-9hw9-2fx4 | |
| GHSA-mm7p-fcc7-pg87 | |
| GHSA-33vc-wfww-vjfv | |
| CVE-2025-9910 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-4hjh-wcwx-xvwj | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-xv57-4mr9-wg8v | |
| GHSA-4342-x723-ch2f | |
| Information Exposure Through Caching | |
| Improper Input Validation | |
| GHSA-g5qg-72qw-gw5v | |
| GHSA-fjxv-7rqg-78g4 | |
| CVE-2025-7783 | |
| GHSA-r2fc-ccr8-96c4 | |
| HTTP Request Smuggling | |
| Directory Traversal | |
| GHSA-8cj5-5rvv-wf4v | |
| GHSA-f82v-jwr5-mffw | |
| Incorrect Authorization | |
| GHSA-968p-4wvh-cqc8 | |
| Inefficient Regular Expression Complexity | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-jr5f-v2jv-69x6 | |
| Use of Insufficiently Random Values | |
| GHSA-c76h-2ccp-4975 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-7m27-7ghc-44w9 | |
| CVE-2024-55565 | |
| GHSA-mwcw-c2x4-8c55 | |
| Inefficient Regular Expression Complexity | |
| GHSA-pfq8-rq6v-vf5m | |
| GHSA-pxg6-pf52-xh8x | |
| CVE-2024-47764 | |
| Uncontrolled Recursion | |
| GHSA-g77x-44xx-532m | |
| Authorization Bypass Through User-Controlled Key | |
| GHSA-gp8f-8m3g-qvj9 | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-8hc4-vh64-cxmj | |
| GHSA-fr5h-rqp8-mj6g | |
| CVE-2024-34351 | |
| GHSA-7v5v-9h63-cj86 | |
| CVE-2024-37168 | |