| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-rcvw-fc36-wjhj | |
| GHSA-6mpj-fw9g-9wqm | |
| GHSA-p9cp-qq4c-2wr5 | |
| GHSA-fjj2-x466-w3hx | |
| Exposure of Private Information ('Privacy Violation') | |
| Cross-site Scripting (XSS) | |
| GHSA-c3cp-7jp9-c872 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Encoding or Escaping of Output | |
| GHSA-2jwx-73fx-pwrv | |
| Allocation of Resources Without Limits or Throttling | |
| Information Exposure | |
| Authentication Bypass | |
| GHSA-w2j6-r4xj-rjcj | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-p9w7-rqj5-fjh5 | |
| GHSA-h2vc-rgmf-cp34 | |
| Insufficient Granularity of Access Control | |
| Improper Encoding or Escaping of Output | |
| GHSA-rh5v-9jwc-7736 | |
| Cross-site Scripting (XSS) | |
| GHSA-w2m4-xx67-836j | |
| Cross-site Scripting (XSS) | |
| Missing Authorization | |
| GHSA-xgjv-46p6-hwgv | |
| GHSA-mfcp-rjv7-385m | |
| GHSA-mp63-3qcj-f8c7 | |
| GHSA-x45w-x744-4hj7 | |
| Information Exposure Through Log Files | |
| GHSA-3cq3-cj5m-hm72 | |
| GHSA-39m5-rg2v-54h9 | |
| GHSA-j8j9-23cp-fr5v | |
| GHSA-m766-xfqm-qm37 | |
| GHSA-pv96-f897-xcch | |
| GHSA-cpx5-2q84-prc5 | |
| GHSA-5mh9-3jwc-rp59 | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| GHSA-7c64-f9jr-v9h2 | |
| GHSA-rm4r-vwvw-vj67 | |
| CVE-2025-47914 | |
| Incorrect Authorization | |
| Uncontrolled Memory Allocation | |
| GHSA-f6x5-jh6r-wrfv | |
| GHSA-7hhv-h469-wc4q | |
| CVE-2025-58181 | |
| GHSA-9mv9-gw4x-7xw4 | |
| Information Exposure | |
| GHSA-j5w8-q4qc-rx2x | |
| GHSA-hjx7-fpxx-mj48 | |
| CVE-2025-47912 | |
| GHSA-cxq7-xw9v-rcv3 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2025-61725 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2025-58183 | |
| GHSA-9gcr-gp5f-jw27 | |
| GHSA-447v-2qg4-h8hc | |
| GHSA-7wwx-xj66-r44x | |
| GHSA-jwmf-chvc-rf92 | |
| GHSA-frhw-mqj2-wxw2 | |
| Algorithmic Complexity | |
| GHSA-wcw9-47fp-rrfr | |
| Information Exposure Through Log Files | |
| CVE-2025-58186 | |
| Improper Certificate Validation | |
| GHSA-rjcg-56ph-3qvg | |
| GHSA-qh38-484v-w52x | |