| CVE-2026-4800 | |
| GHSA-f23m-r3pf-42rh | |
| CVE-2026-2950 | |
| GHSA-r5fr-rjxr-66jc | |
| GHSA-3v7f-55p6-f55p | |
| GHSA-f886-m6hf-6m8v | |
| Inefficient Regular Expression Complexity | |
| Resource Exhaustion | |
| GHSA-c2c7-rcm5-vvqj | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-qffp-2rhf-9h96 | |
| Directory Traversal | |
| GHSA-7r86-cg39-jmmj | |
| Algorithmic Complexity | |
| GHSA-23c5-xmqv-rm74 | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| Directory Traversal | |
| GHSA-83g3-92jg-28cx | |
| GHSA-3ppc-4f35-3m26 | |
| Inefficient Regular Expression Complexity | |
| GHSA-34x7-hfp2-rc4v | |
| GHSA-7h2j-956f-4vf2 | |
| Directory Traversal | |
| GHSA-3966-f6p6-2qr9 | |
| Incorrect Permission Assignment for Critical Resource | |
| Resource Exhaustion | |
| Directory Traversal | |
| GHSA-73rr-hh4g-fpgx | |
| GHSA-8qq5-rm4j-mr97 | |
| GHSA-5j98-mcp5-4vw2 | |
| OS Command Injection | |
| GHSA-v6h2-p8h4-qcjw | |
| Resource Exhaustion | |
| GHSA-f5x3-32g6-xq36 | |
| CVE-2024-28863 | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-78xj-cgh5-2h22 | |