| GHSA-v468-qcjx-r72w | |
| Missing Critical Step in Authentication | |
| GHSA-45q3-82m4-75jr | |
| GHSA-m4cv-j2px-7723 | |
| Improper Input Validation | |
| CRLF Injection | |
| GHSA-xxqh-mfjm-7mv9 | |
| Resource Exhaustion | |
| Integer Overflow or Wraparound | |
| GHSA-mj4r-2hfc-f8p6 | |
| GHSA-v8h7-rr48-vmmv | |
| GHSA-cm33-6792-r9fm | |
| Resource Exhaustion | |
| HTTP Request Smuggling | |
| GHSA-57rv-r2g8-2cj3 | |
| HTTP Request Smuggling | |
| HTTP Response Splitting | |
| GHSA-f6hv-jmp6-3vwv | |
| HTTP Request Smuggling | |
| GHSA-38f8-5428-x5cv | |
| GHSA-995c-6rp3-4m4x | |
| GHSA-vf5j-865m-mq7c | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| GHSA-f2wh-grmh-r6jm | |
| CVE-2026-22746 | |
| CVE-2026-5598 | |
| CVE-2026-0636 | |
| GHSA-4wrg-8wpc-h923 | |
| CVE-2026-22751 | |
| GHSA-wg6q-6289-32hp | |
| GHSA-4vrc-j85c-598c | |
| GHSA-x2wq-9x2f-fhj7 | |
| GHSA-vxf7-qj7q-83fh | |
| GHSA-p93r-85wp-75v3 | |
| CVE-2026-22748 | |
| CVE-2026-5588 | |
| GHSA-2jrg-rf5x-568g | |
| GHSA-cvc6-q2cp-2xhw | |
| GHSA-c3fc-8qff-9hwx | |
| CVE-2026-22754 | |
| CVE-2026-22753 | |
| CVE-2026-22747 | |
| GHSA-cj8j-37rh-8475 | |
| CVE-2026-3505 | |
| GHSA-355h-qmc2-wpwf | |
| HTTP Request Smuggling | |
| Race Condition | |
| Improper Validation of Specified Index, Position, or Offset in Input | |
| GHSA-5qcv-4rpc-jp93 | |
| GHSA-28jg-cgg7-j4wc | |
| GHSA-2m67-wjpj-xhg9 | |
| CVE-2026-22732 | |
| GHSA-mf92-479x-3373 | |
| Information Exposure Through Log Files | |
| Improper Certificate Validation | |
| GHSA-crhr-qqj8-rpxc | |
| GHSA-7xrh-hqfc-g7qr | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-6v53-7c9g-w56r | |
| GHSA-qqpg-mvqg-649v | |
| CVE-2026-1225 | |
| GHSA-j288-q9x7-2f5v | |
| Uncontrolled Recursion | |
| GHSA-x44p-gvrj-pj2r | |
| CVE-2025-14763 | |
| GHSA-84h7-rjj3-6jx4 | |
| CRLF Injection | |
| CVE-2025-11226 | |
| CVE-2025-41249 | |
| CVE-2025-41248 | |
| HTTP Request Smuggling | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Resource Exhaustion | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Neutralization | |
| CVE-2025-22227 | |
| Uncontrolled Recursion | |
| CVE-2025-41234 | |
| CVE-2025-27817 | |
| CVE-2025-22233 | |
| CVE-2025-48734 | |
| CVE-2024-58103 | |
| Allocation of Resources Without Limits or Throttling | |
| Deserialization of Untrusted Data | |
| CVE-2024-57699 | |
| CVE-2025-24970 | |
| Deserialization of Untrusted Data | |
| CVE-2024-12798 | |
| CVE-2024-12801 | |
| CVE-2024-38829 | |
| Improper Privilege Management | |
| Out-of-bounds Read | |
| CVE-2024-38821 | |
| CVE-2024-6763 | |
| Resource Exhaustion | |
| CVE-2024-25638 | |
| CVE-2024-36114 | |
| CVE-2024-38820 | |
| Out-of-bounds Write | |
| Creation of Temporary File With Insecure Permissions | |
| CVE-2024-38809 | |
| CVE-2024-38808 | |
| Cross-site Scripting (XSS) | |