| CVE-2025-69872 | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| GHSA-fv83-x2xw-2j55 | |
| GHSA-3xc5-wrhm-f963 | |
| Link Following | |
| Cross-site Scripting (XSS) | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Certificate Validation | |
| CVE-2026-32280 | |
| GHSA-w8v5-vhqr-4h9v | |
| GHSA-gjvh-7jh8-7xhm | |
| GHSA-xj38-jxc5-rppx | |
| Improper Certificate Validation | |
| GHSA-7mr4-xjxg-34g6 | |
| GHSA-jrg3-gfjw-hm96 | |
| GHSA-cfp9-33rc-j74f | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-5w89-2c2x-6x66 | |
| Incorrect Authorization | |
| GHSA-x4jj-h2v8-hqqv | |
| GHSA-m4pr-4j3g-9v7v | |
| CVE-2026-27143 | |
| GHSA-cqrx-3m42-5p5w | |
| GHSA-jhf3-xxhw-2wpp | |
| GHSA-v92g-xgxw-vvmm | |
| Out-of-Bounds | |
| Improper Validation of Array Index | |
| GHSA-p423-j2cm-9vmq | |
| GHSA-gm2x-2g9h-ccm8 | |
| GHSA-3crg-w4f6-42mx | |
| Improper Authorization | |
| Directory Traversal | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| GHSA-x284-j5p8-9c5p | |
| XML External Entity (XXE) Injection | |
| GHSA-7gw9-cf7v-778f | |
| Integer Underflow | |
| GHSA-p77j-4mvh-x3m3 | |
| GHSA-xmrv-pmrh-hhx2 | |
| GHSA-4pxv-j86v-mhcw | |
| GHSA-76hw-p97h-883f | |
| GHSA-hfvc-g4fc-pqhx | |
| Untrusted Search Path | |
| GHSA-jj6c-8h6c-hppx | |
| GHSA-vfmq-68hx-4jfw | |
| Insufficient Verification of Data Authenticity | |
| Cross-site Scripting (XSS) | |
| GHSA-gfwx-w7gr-fvh7 | |
| GHSA-hqmj-h5c6-369m | |
| GHSA-rf74-v2fm-23pw | |
| Missing Authentication for Critical Function | |
| GHSA-jm6w-m3j8-898g | |
| Open Redirect | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-pq67-6m6q-mj2v | |
| GHSA-gm62-xv2j-4w53 | |
| GHSA-2xpw-w6gg-jr37 | |
| GHSA-rv83-g57w-fr8j | |
| GHSA-8fj7-8h3w-xwfm | |
| Directory Traversal | |
| Cross-site Scripting (XSS) | |
| GHSA-hqmh-ppp3-xvm7 | |
| GHSA-j4j7-vw47-rhfq | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-j3gx-2473-5fp8 | |
| CVE-2026-27141 | |
| Direct Request ('Forced Browsing') | |
| Directory Traversal | |
| GHSA-3936-cmfr-pm3m | |
| GHSA-f2v5-7jq9-h8cg | |
| Resource Exhaustion | |
| GHSA-7p94-766c-hgjp | |
| Arbitrary Code Injection | |
| GHSA-37cx-329c-33x3 | |
| CVE-2025-61732 | |
| GHSA-h355-32pf-p2xm | |
| CVE-2025-68121 | |
| GHSA-8jvr-vh7g-f8gx | |
| Improper Validation of Integrity Check Value | |
| GHSA-gm8q-m8mv-jj5m | |
| CVE-2026-1703 | |
| GHSA-7gcm-g887-7qv7 | |
| Directory Traversal | |
| GHSA-2q4j-m29v-hq73 | |
| GHSA-6vgw-5pg2-w6jp | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| CVE-2026-0994 | |
| GHSA-8rrh-rw8j-w5fx | |
| Directory Traversal | |
| Directory Traversal | |
| GHSA-58pv-8j8x-9vj2 | |
| CVE-2025-4674 | |
| CVE-2025-22874 | |
| GHSA-f6x5-jh6r-wrfv | |
| CVE-2025-22871 | |
| CVE-2025-58181 | |
| Race Condition | |
| CVE-2025-47914 | |
| Resource Exhaustion | |
| GHSA-j5pm-7495-qmr3 | |
| GHSA-hcg3-q754-cr77 | |
| GHSA-j5w8-q4qc-rx2x | |
| GHSA-6f52-wpx2-hvf2 | |
| GHSA-wprm-fgrx-xj42 | |
| GHSA-g9pc-8g42-g6vq | |
| CVE-2025-4673 | |
| CVE-2025-22872 | |
| GHSA-qxp5-gwg8-xv66 | |
| GHSA-62jj-gr2r-5c34 | |
| GHSA-vvgc-356p-c3xw | |
| GHSA-6v2p-p543-phr9 | |
| CVE-2025-22870 | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| GHSA-7c64-f9jr-v9h2 | |
| GHSA-5mh9-3jwc-rp59 | |
| GHSA-m449-cwjh-6pw7 | |
| Resource Exhaustion | |
| Algorithmic Complexity | |
| Excessive Iteration | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Creation of Temporary File With Insecure Permissions | |
| CVE-2025-47906 | |
| Resource Exhaustion | |
| Inefficient Regular Expression Complexity | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Input Validation | |
| Expected Behavior Violation | |
| Insufficiently Protected Credentials | |
| Open Redirect | |
| CVE-2025-4565 | |
| SQL Injection | |
| Function Call With Incorrect Order of Arguments | |
| HTTP Request Smuggling | |
| Uncaught Exception | |
| Asymmetric Resource Consumption (Amplification) | |
| CVE-2024-34069 | |
| CVE-2024-21503 | |
| CVE-2024-27306 | |
| CVE-2024-37891 | |
| Directory Traversal | |
| Cross-site Scripting (XSS) | |
| CVE-2024-39705 | |
| CVE-2024-42367 | |
| CVE-2024-34062 | |
| Arbitrary Code Injection | |
| CVE-2024-30251 | |
| Out-of-bounds Read | |
| CVE-2025-22868 | |
| CVE-2025-22869 | |
| Deserialization of Untrusted Data | |
| Improper Neutralization of Special Elements Used in a Template Engine | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| CVE-2025-22866 | |
| Arbitrary Argument Injection | |
| Resource Exhaustion | |
| CVE-2024-45338 | |
| Improper Neutralization | |
| Protection Mechanism Failure | |