| Information Exposure | |
| Reachable Assertion | |
| GHSA-846p-jg2w-w324 | |
| GHSA-fphv-w9fq-2525 | |
| Improper Verification of Cryptographic Signature | |
| GHSA-f83f-xpx7-ffpw | |
| Asymmetric Resource Consumption (Amplification) | |
| GHSA-5mh9-3jwc-rp59 | |
| Improper Certificate Validation | |
| GHSA-7c64-f9jr-v9h2 | |
| Improper Certificate Validation | |
| GHSA-f6x5-jh6r-wrfv | |
| CVE-2025-47914 | |
| GHSA-qh38-484v-w52x | |
| Information Exposure Through Log Files | |
| GHSA-wcw9-47fp-rrfr | |
| GHSA-447v-2qg4-h8hc | |
| GHSA-7wwx-xj66-r44x | |
| GHSA-hjx7-fpxx-mj48 | |
| GHSA-jwmf-chvc-rf92 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-cxq7-xw9v-rcv3 | |
| Algorithmic Complexity | |
| CVE-2025-58186 | |
| CVE-2025-61725 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-9gcr-gp5f-jw27 | |
| CVE-2025-58183 | |
| GHSA-rjcg-56ph-3qvg | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Certificate Validation | |
| GHSA-frhw-mqj2-wxw2 | |
| CVE-2025-47912 | |
| GHSA-2464-8j7c-4cjm | |