| GHSA-jm66-cg57-jjv5 | |
| Deserialization of Untrusted Data | |
| GHSA-63vm-454h-vhhq | |
| Allocation of Resources Without Limits or Throttling | |
| Link Following | |
| GHSA-qmgc-5h2g-mvrw | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| GHSA-54jq-c3m8-4m76 | |
| GHSA-6mq8-rvhq-8wgg | |
| Logging of Excessive Data | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| GHSA-fh55-r93g-j68g | |
| GHSA-mqqc-3gqh-h2x8 | |
| GHSA-g84x-mcqj-x9qq | |
| HTTP Request Smuggling | |
| GHSA-69f9-5gxw-wvc2 | |
| GHSA-6jhg-hg63-jvvf | |
| HTTP Request Smuggling | |
| Directory Traversal | |
| GHSA-jj3x-wxrx-4x23 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-48p4-8xcf-vxj5 | |
| Open Redirect | |
| GHSA-w853-jp5j-5j7f | |
| Link Following | |
| HTTP Request Smuggling | |
| GHSA-9548-qrrj-x5pj | |
| GHSA-8qvm-5x2c-j2w7 | |
| CVE-2025-4565 | |
| GHSA-6vqw-3v5j-54x4 | |
| NULL Pointer Dereference | |
| GHSA-79v4-65xg-pq4g | |
| CVE-2024-12797 | |
| Arbitrary Command Injection | |
| GHSA-rqc4-2hc7-8c8v | |
| CVE-2023-45803 | |
| GHSA-g4mx-q9vg-27p4 | |
| CVE-2024-42367 | |
| GHSA-8495-4g3g-x7pr | |
| CVE-2024-52304 | |
| GHSA-jwhx-xcg6-8xhj | |
| GHSA-h4gh-qq45-vh27 | |
| Arbitrary Code Injection | |
| GHSA-cx63-2mw6-8hw5 | |
| Insufficient Verification of Data Authenticity | |
| GHSA-248v-346w-9cwc | |
| CVE-2024-37891 | |
| GHSA-34jh-p97f-mpxf | |
| Race Condition | |
| GHSA-m5vv-6r4h-3vj9 | |
| CVE-2024-35195 | |
| GHSA-9wx4-h78v-vm56 | |
| CVE-2024-27306 | |
| GHSA-jjg7-2v4v-x38h | |
| Inefficient Regular Expression Complexity | |
| GHSA-7gpw-8wmc-pm8g | |