| GHSA-r5fr-rjxr-66jc | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Resource Exhaustion | |
| GHSA-737v-mqg7-c878 | |
| CVE-2026-3449 | |
| CVE-2026-4800 | |
| CVE-2026-2950 | |
| GHSA-vpq2-c234-7xj6 | |
| GHSA-f886-m6hf-6m8v | |
| GHSA-f23m-r3pf-42rh | |
| Race Condition | |
| Inefficient Regular Expression Complexity | |
| GHSA-m56q-vw4c-c2cp | |
| Cross-site Scripting (XSS) | |
| GHSA-f7gr-6p89-r883 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-38f7-945m-qr2g | |
| Cross-site Scripting (XSS) | |
| GHSA-crpf-4hrx-3jrp | |
| Cross-site Scripting (XSS) | |
| GHSA-3v7f-55p6-f55p | |
| GHSA-phwv-c562-gvmh | |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | |
| GHSA-c2c7-rcm5-vvqj | |
| GHSA-rv83-g57w-fr8j | |
| GHSA-46wh-pxpv-q5gq | |
| CVE-2026-27142 | |
| GHSA-j4j7-vw47-rhfq | |
| GHSA-25h7-pfq9-p65f | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-8jvr-vh7g-f8gx | |
| CVE-2025-68121 | |
| Uncontrolled Recursion | |
| Improper Validation of Specified Quantity in Input | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-rf6f-7fwh-wjgh | |
| CVE-2026-25679 | |
| GHSA-h355-32pf-p2xm | |
| GHSA-8cpq-38p9-67gx | |
| GHSA-jp2q-39xq-3w4g | |
| SQL Injection | |
| SQL Injection | |
| CVE-2025-61732 | |
| GHSA-j3gx-2473-5fp8 | |
| GHSA-wmrf-hv6w-mr66 | |
| CVE-2026-27139 | |
| GHSA-ggv3-7p47-pfv8 | |
| GHSA-3x4c-7xq6-9pq8 | |
| Resource Exhaustion | |
| HTTP Request Smuggling | |
| Incorrect Authorization | |
| Cross-site Scripting (XSS) | |
| GHSA-v2wj-7wpq-c8vv | |
| GHSA-wc8c-qw6v-h7f6 | |
| Cross-site Scripting (XSS) | |
| GHSA-v8jm-5vwx-cfxm | |
| GHSA-v8w9-8mx6-g223 | |
| GHSA-5c6j-r48x-rmvq | |
| Directory Traversal | |
| GHSA-5rq4-664w-9x2c | |
| GHSA-mw96-cpmx-2vgc | |
| Directory Traversal | |
| GHSA-38r7-794h-5758 | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-8fgc-7cc6-rx7x | |
| Server-Side Request Forgery (SSRF) | |
| Inefficient Regular Expression Complexity | |
| GHSA-gq3j-xvxp-8hrf | |
| GHSA-3ppc-4f35-3m26 | |
| CVE-2026-2391 | |
| Inefficient Regular Expression Complexity | |
| GHSA-2g4f-4pwh-qvx6 | |
| GHSA-w7fw-mjwx-w883 | |
| GHSA-43fc-jf86-j433 | |
| GHSA-37qj-frw5-hhjh | |
| Server-Side Request Forgery (SSRF) | |
| Improper Check for Unusual or Exceptional Conditions | |
| Improper Input Validation | |
| GHSA-v34v-rq6j-cj6p | |
| Incorrect Regular Expression | |
| GHSA-345p-7cg4-v4c7 | |
| GHSA-w332-q679-j88p | |
| Cross-site Scripting (XSS) | |
| GHSA-h25m-26qc-wcjf | |
| GHSA-r354-f388-2fhh | |
| Information Exposure | |
| GHSA-9r54-q6cx-xmh5 | |
| Race Condition | |
| Information Exposure Through Caching | |
| GHSA-9g9p-9gw9-jx7f | |
| CVE-2025-59471 | |
| GHSA-6wqw-2p9w-4vw4 | |
| GHSA-5f7q-jpqc-wp7h | |
| CVE-2025-59472 | |
| Out-of-bounds Write | |
| GHSA-gr56-3gp6-6gmj | |
| GHSA-xvqr-69v8-f3gv | |
| CVE-2025-61731 | |
| GHSA-cm6p-qc7v-m3jw | |
| CVE-2025-61730 | |
| GHSA-xxjr-mmjv-4gpg | |
| CVE-2025-13465 | |
| GHSA-73rr-hh4g-fpgx | |
| Allocation of Resources Without Limits or Throttling | |
| Resource Exhaustion | |
| GHSA-g9mf-h72j-4rw9 | |
| GHSA-3vhc-576x-3qv4 | |
| Improper Verification of Cryptographic Signature | |
| Improper Verification of Cryptographic Signature | |
| GHSA-f67f-6cw9-8mq4 | |
| GHSA-6475-r3vj-m8vf | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| GHSA-36hm-qxxp-pg3m | |
| GHSA-8r9q-7v3j-jr4g | |
| Inefficient Regular Expression Complexity | |
| GHSA-7c64-f9jr-v9h2 | |
| Improper Certificate Validation | |
| CVE-2025-15284 | |
| GHSA-6rw7-vpxm-498p | |
| GHSA-43p4-m455-4f4j | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-mwv6-3258-q52c | |
| GHSA-w37m-7fhw-fmv9 | |
| Improper Verification of Cryptographic Signature | |
| CVE-2025-66478 | |
| GHSA-9qr9-h5gf-34mp | |
| GHSA-869p-cjfg-cm3x | |