| GHSA-2mjp-6q6p-2qxm | |
| CVE-2026-2581 | |
| CVE-2026-2229 | |
| CVE-2026-1528 | |
| CVE-2026-1525 | |
| GHSA-vrm6-8vpv-qv8q | |
| GHSA-v9p9-hfj2-hcw8 | |
| CVE-2026-1526 | |
| CVE-2026-1527 | |
| GHSA-phc3-fgpg-7m6h | |
| GHSA-f269-vfmq-vjvj | |
| GHSA-4992-7rv2-5pvq | |
| GHSA-gmq8-994r-jv83 | |
| Off-by-one Error | |
| GHSA-vpq2-c234-7xj6 | |
| CVE-2026-3449 | |
| Inefficient Regular Expression Complexity | |
| Algorithmic Complexity | |
| GHSA-7r86-cg39-jmmj | |
| GHSA-23c5-xmqv-rm74 | |
| GHSA-5rq4-664w-9x2c | |
| Directory Traversal | |
| Inefficient Regular Expression Complexity | |
| Directory Traversal | |
| GHSA-83g3-92jg-28cx | |
| GHSA-3ppc-4f35-3m26 | |
| GHSA-w7fw-mjwx-w883 | |
| CVE-2026-2391 | |
| GHSA-3966-f6p6-2qr9 | |
| Incorrect Permission Assignment for Critical Resource | |
| Improper Handling of Unicode Encoding | |
| Directory Traversal | |
| GHSA-34x7-hfp2-rc4v | |
| GHSA-r6q2-hw4h-h46w | |
| GHSA-8qq5-rm4j-mr97 | |
| Allocation of Resources Without Limits or Throttling | |
| Directory Traversal | |
| GHSA-g9mf-h72j-4rw9 | |
| GHSA-8cj5-5rvv-wf4v | |
| GHSA-pq67-2wwv-3xjx | |
| Directory Traversal | |
| GHSA-vj76-c3g6-qr5v | |
| CVE-2024-12905 | |
| Directory Traversal | |
| GHSA-6rw7-vpxm-498p | |
| CVE-2025-15284 | |
| GHSA-wqch-xfxh-vrr4 | |
| CVE-2025-13466 | |
| GHSA-mh29-5h37-fv8m | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| CVE-2025-7339 | |
| GHSA-76c9-3jph-rj3q | |
| GHSA-v6h2-p8h4-qcjw | |
| Resource Exhaustion | |
| Memory Leak | |
| GHSA-cxrh-j4jr-qwg3 | |