| GHSA-5m4p-2gjx-p2g8 | |
| GHSA-8g2r-hhvj-mv99 | |
| CVE-2026-42501 | |
| GHSA-497x-jcxf-m478 | |
| GHSA-qf3q-3h68-mmh2 | |
| Allocation of Resources Without Limits or Throttling | |
| Cross-site Scripting (XSS) | |
| Link Following | |
| GHSA-p9h5-jm8x-mjm5 | |
| Improper Encoding or Escaping of Output | |
| GHSA-2283-wf8c-rw8r | |
| CVE-2026-42499 | |
| GHSA-xq5j-9r39-c3vf | |
| Double Free | |
| GHSA-qc64-m6c2-v4x7 | |
| Out-of-bounds Write | |
| GHSA-3v2c-x6q9-f697 | |
| NULL Pointer Dereference | |
| Insufficiently Protected Credentials | |
| GHSA-3xc5-wrhm-f963 | |
| GHSA-pc3f-x583-g7j2 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-w8rr-5gcm-pp58 | |
| Uncontrolled Memory Allocation | |
| Untrusted Search Path | |
| GHSA-hfvc-g4fc-pqhx | |
| GHSA-846p-jg2w-w324 | |
| GHSA-gm2x-2g9h-ccm8 | |
| GHSA-78h2-9frx-2jm8 | |
| Directory Traversal | |
| Asymmetric Resource Consumption (Amplification) | |
| GHSA-whqx-f9j3-ch6m | |
| GHSA-4qg8-fj49-pxjh | |
| Uncaught Exception | |
| GHSA-jqc5-w2xx-5vq4 | |
| Improper Validation of Array Index | |
| GHSA-4c4x-jm2x-pf9j | |
| Improper Verification of Cryptographic Signature | |
| GHSA-273p-m2cw-6833 | |
| Insufficient Verification of Data Authenticity | |
| GHSA-jhf3-xxhw-2wpp | |
| NULL Pointer Dereference | |
| Integer Underflow | |
| GHSA-fphv-w9fq-2525 | |
| Reachable Assertion | |
| Server-Side Request Forgery (SSRF) | |
| Improper Validation of Array Index | |
| GHSA-x6gf-mpr2-68h6 | |
| Improper Validation of Array Index | |
| Improper Verification of Cryptographic Signature | |
| GHSA-hwqm-qvj9-4jr2 | |
| GHSA-pcgw-qcv5-h8ch | |
| GHSA-479m-364c-43vc | |
| GHSA-6g7g-w4f8-9c9x | |
| GHSA-p77j-4mvh-x3m3 | |
| Improper Authorization | |
| GHSA-37cx-329c-33x3 | |
| Improper Validation of Integrity Check Value | |
| CVE-2025-15558 | |
| GHSA-p436-gjf2-799p | |
| Untrusted Search Path | |
| GHSA-9h8m-3fm2-qjrq | |