| Link Following | |
| GHSA-52f5-9888-hmc6 | |
| GHSA-fjxv-7rqg-78g4 | |
| CVE-2025-7783 | |
| Resource Exhaustion | |
| GHSA-v6h2-p8h4-qcjw | |
| Resource Exhaustion | |
| GHSA-w532-jxjh-hjhj | |
| CVE-2025-25977 | |
| GHSA-v2mw-5mch-w8c5 | |
| GHSA-968p-4wvh-cqc8 | |
| Inefficient Regular Expression Complexity | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-p8p7-x288-28g6 | |
| CVE-2025-26791 | |
| GHSA-vhxf-7vqr-mrjg | |
| Cross-site Scripting (XSS) | |
| GHSA-76p7-773f-r4q5 | |
| CVE-2024-21538 | |
| GHSA-3xgq-45jj-v275 | |
| GHSA-9wv6-86v2-598j | |
| GHSA-pxg6-pf52-xh8x | |
| CVE-2024-4067 | |
| Cross-site Scripting (XSS) | |
| CVE-2024-47764 | |
| Inefficient Regular Expression Complexity | |
| GHSA-gx9m-whjm-85jf | |
| Inefficient Regular Expression Complexity | |
| GHSA-952p-6rrq-rcjv | |
| GHSA-mmhx-hmjr-r674 | |
| GHSA-876p-c77m-x2hc | |
| CVE-2024-38996 | |
| CVE-2024-39001 | |
| GHSA-328p-362g-r48j | |
| GHSA-3h5v-q93c-6h6q | |
| CVE-2024-37890 | |
| GHSA-grv7-fg5c-xmjg | |
| GHSA-f5x3-32g6-xq36 | |
| CVE-2024-4068 | |
| CVE-2024-28863 | |
| GHSA-cxjh-pqwp-8mfp | |
| GHSA-2jcg-qqmg-46q6 | |
| GHSA-wf5p-g6vw-rhxx | |
| GHSA-jchw-25xp-jwwc | |
| GHSA-c429-5p7v-vgjp | |
| Cross-site Request Forgery (CSRF) | |
| CVE-2024-28849 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Open Redirect | |