| CVE-2026-41139 | |
| Inefficient Regular Expression Complexity | |
| GHSA-jg4p-7fhp-p32p | |
| GHSA-6v7q-wjvx-w8wg | |
| GHSA-chqc-8p9q-pq6q | |
| CRLF Injection | |
| GHSA-jvff-x2qm-6286 | |
| GHSA-fvcv-3m26-pcqx | |
| HTTP Response Splitting | |
| Unintended Proxy or Intermediary ('Confused Deputy') | |
| GHSA-r5fr-rjxr-66jc | |
| Directory Traversal | |
| CVE-2026-2950 | |
| GHSA-92pp-h63x-v22m | |
| GHSA-wmmm-f939-6g9c | |
| Directory Traversal | |
| Incorrect Behavior Order: Validate Before Canonicalize | |
| GHSA-xpcf-pg52-r92g | |
| Directory Traversal | |
| GHSA-xf4j-xp2r-rqqx | |
| GHSA-r5rp-j6wh-rvv4 | |
| GHSA-26pp-8wgv-hjvm | |
| GHSA-3p68-rc4w-qgx5 | |
| CVE-2026-4800 | |
| GHSA-f23m-r3pf-42rh | |
| Improper Input Validation | |
| GHSA-2g4f-4pwh-qvx6 | |
| Inefficient Regular Expression Complexity | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| GHSA-2qvq-rjwj-gvw9 | |
| GHSA-9cx6-37pm-9jff | |
| GHSA-3v7f-55p6-f55p | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| GHSA-2328-f5f3-gj25 | |
| CVE-2026-4923 | |
| GHSA-442j-39wm-28r2 | |
| Improper Check for Unusual or Exceptional Conditions | |
| GHSA-xjpj-3mr7-gcpf | |
| Improper Certificate Validation | |
| Cross-site Scripting (XSS) | |
| GHSA-27v5-c462-wpq7 | |
| Arbitrary Code Injection | |
| GHSA-xhpv-hc6g-r9c6 | |
| CVE-2026-4926 | |
| Resource Exhaustion | |
| Inefficient Regular Expression Complexity | |
| GHSA-q67f-28xg-22rw | |
| GHSA-f886-m6hf-6m8v | |
| GHSA-5m6q-g25r-mvwx | |
| Arbitrary Code Injection | |
| GHSA-3mfm-83xf-c92r | |
| GHSA-j3q9-mxjg-w52f | |
| GHSA-7rx3-28cr-v5wh | |
| GHSA-2w6w-674q-4c4q | |
| GHSA-c2c7-rcm5-vvqj | |
| Improper Verification of Cryptographic Signature | |
| GHSA-ppp5-5v6c-4jwp | |
| Cross-site Scripting (XSS) | |
| Uncontrolled Recursion | |
| GHSA-48c2-rrv3-qjmp | |
| Improper Handling of URL Encoding (Hex Encoding) | |
| GHSA-7x6v-j9x4-qf24 | |
| Improper Encoding or Escaping of Output | |
| GHSA-p6xx-57qc-3wxr | |
| Cross-site Scripting (XSS) | |
| GHSA-5pq2-9x2x-5p6w | |
| Arbitrary Code Injection | |
| GHSA-v8jm-5vwx-cfxm | |
| GHSA-wc8c-qw6v-h7f6 | |
| Cross-site Scripting (XSS) | |
| Directory Traversal | |
| GHSA-q5qw-h33p-qvwr | |
| GHSA-9ppj-qmqm-q256 | |
| GHSA-wfv2-pwc8-crg5 | |
| Incorrect Authorization | |
| Inappropriate Comment Style | |
| Off-by-one Error | |
| GHSA-gmq8-994r-jv83 | |
| GHSA-r6q2-hw4h-h46w | |
| Directory Traversal | |
| GHSA-34x7-hfp2-rc4v | |
| GHSA-qffp-2rhf-9h96 | |
| GHSA-8qq5-rm4j-mr97 | |
| Improper Handling of Unicode Encoding | |
| Directory Traversal | |
| Directory Traversal | |
| GHSA-83g3-92jg-28cx | |
| Directory Traversal | |
| GHSA-v8w9-8mx6-g223 | |
| GHSA-v2wj-7wpq-c8vv | |
| Cross-site Scripting (XSS) | |
| GHSA-46wh-pxpv-q5gq | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-23c5-xmqv-rm74 | |
| GHSA-3ppc-4f35-3m26 | |
| Inefficient Regular Expression Complexity | |
| Algorithmic Complexity | |
| Inefficient Regular Expression Complexity | |
| GHSA-7r86-cg39-jmmj | |
| GHSA-5rq4-664w-9x2c | |
| Directory Traversal | |
| GHSA-378v-28hj-76wf | |
| CVE-2026-2739 | |
| GHSA-6rw7-vpxm-498p | |
| CVE-2025-57352 | |
| CVE-2025-15284 | |
| GHSA-rx8g-88g5-qh64 | |
| CVE-2026-2391 | |
| GHSA-w7fw-mjwx-w883 | |
| Resource Exhaustion | |
| GHSA-gq3j-xvxp-8hrf | |
| GHSA-67pg-wm7f-q7fj | |
| GHSA-p5xg-68wr-hm3m | |
| GHSA-9vjf-qc39-jprp | |
| Arbitrary Code Injection | |
| Improper Encoding or Escaping of Output | |
| GHSA-345p-7cg4-v4c7 | |
| Race Condition | |
| Improper Check for Unusual or Exceptional Conditions | |
| GHSA-43fc-jf86-j433 | |
| GHSA-pqxr-3g65-p328 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-vm32-vv63-w422 | |
| GHSA-cjw8-79x6-5cj4 | |
| GHSA-f8cm-6447-x5h2 | |
| Race Condition | |
| Arbitrary Code Injection | |
| Directory Traversal | |
| Improper Encoding or Escaping of Output | |
| GHSA-95fx-jjr5-f39c | |
| GHSA-8mvj-3j78-4qmw | |
| Improper Input Validation | |
| CVE-2025-13465 | |
| GHSA-xxjr-mmjv-4gpg | |
| GHSA-8r9q-7v3j-jr4g | |
| Inefficient Regular Expression Complexity | |
| GHSA-x7hr-w5r2-h6wg | |
| Cross-site Scripting (XSS) | |
| GHSA-jr5f-v2jv-69x6 | |
| Allocation of Resources Without Limits or Throttling | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-4hjh-wcwx-xvwj | |
| GHSA-w48q-cv73-mx4w | |
| Insecure Default Initialization of Resource | |
| Integer Overflow or Wraparound | |
| GHSA-wqch-xfxh-vrr4 | |
| GHSA-65ch-62r8-g69g | |
| CVE-2025-13466 | |
| CVE-2025-12816 | |
| Uncontrolled Recursion | |
| GHSA-554w-wpv2-vw27 | |
| GHSA-5gfm-wpxj-wjgq | |
| GHSA-mh29-5h37-fv8m | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Link Following | |
| CVE-2025-7783 | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| CVE-2025-25977 | |
| Inefficient Regular Expression Complexity | |
| Server-Side Request Forgery (SSRF) | |
| CVE-2025-26791 | |
| Cross-site Scripting (XSS) | |
| CVE-2024-21538 | |
| CVE-2024-4067 | |
| Cross-site Scripting (XSS) | |
| CVE-2024-47764 | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| CVE-2024-38996 | |
| CVE-2024-39001 | |
| CVE-2024-37890 | |
| CVE-2024-4068 | |
| CVE-2024-28863 | |
| Cross-site Request Forgery (CSRF) | |
| CVE-2024-28849 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Open Redirect | |