| Insufficient Verification of Data Authenticity | |
| GHSA-3936-cmfr-pm3m | |
| Directory Traversal | |
| GHSA-752w-5fwx-jx9f | |
| CVE-2026-27139 | |
| GHSA-rv83-g57w-fr8j | |
| CVE-2026-25679 | |
| CVE-2026-27142 | |
| GHSA-j4j7-vw47-rhfq | |
| GHSA-j3gx-2473-5fp8 | |
| GHSA-9h8m-3fm2-qjrq | |
| Untrusted Search Path | |
| GHSA-r6ph-v2qm-q3c2 | |
| CVE-2026-26007 | |
| CVE-2025-68121 | |
| CVE-2025-61732 | |
| GHSA-h355-32pf-p2xm | |
| GHSA-8jvr-vh7g-f8gx | |
| GHSA-hx9q-6w63-j58v | |
| Directory Traversal | |
| GHSA-58pv-8j8x-9vj2 | |
| Directory Traversal | |
| CVE-2026-0994 | |
| CVE-2025-67221 | |
| GHSA-7gcm-g887-7qv7 | |
| GHSA-8rrh-rw8j-w5fx | |
| Deserialization of Untrusted Data | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-jm66-cg57-jjv5 | |
| GHSA-63vm-454h-vhhq | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| GHSA-38jv-5279-wg99 | |
| GHSA-hcg3-q754-cr77 | |
| GHSA-6v2p-p543-phr9 | |
| GHSA-c4p6-qg4m-9jmr | |
| Directory Traversal | |
| GHSA-w853-jp5j-5j7f | |
| Directory Traversal | |
| GHSA-5rjg-fvgr-3xxf | |
| Link Following | |
| HTTP Request Smuggling | |
| GHSA-vqfr-h8mv-ghfj | |
| GHSA-cfpf-hrx2-8rv6 | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| GHSA-2xpw-w6gg-jr37 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-gm62-xv2j-4w53 | |
| Improper Certificate Validation | |
| GHSA-7c64-f9jr-v9h2 | |
| CVE-2025-58181 | |
| GHSA-j5w8-q4qc-rx2x | |
| CVE-2025-47914 | |
| GHSA-f6x5-jh6r-wrfv | |
| GHSA-7f5h-v6xp-fcq8 | |
| Algorithmic Complexity | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-2c2j-9gv5-cj73 | |
| GHSA-8qvm-5x2c-j2w7 | |
| Open Redirect | |
| GHSA-48p4-8xcf-vxj5 | |
| GHSA-pq67-6m6q-mj2v | |
| Open Redirect | |
| CVE-2025-4565 | |
| GHSA-qxp5-gwg8-xv66 | |
| CVE-2025-22870 | |
| CVE-2025-22869 | |
| CVE-2025-22868 | |
| CVE-2024-12797 | |
| GHSA-79v4-65xg-pq4g | |
| CVE-2024-57000 | |
| GHSA-xg2h-7cxj-3gvh | |
| CVE-2025-22866 | |
| GHSA-3whm-j4xm-rv8x | |
| GHSA-3f6r-qh9c-x6mm | |
| CVE-2024-45336 | |
| CVE-2024-45341 | |
| GHSA-7wrw-r4p8-38rx | |
| GHSA-gmj6-6f8f-6699 | |
| Protection Mechanism Failure | |
| GHSA-q2x7-8rv6-6q7h | |
| Improper Neutralization | |
| GHSA-w32m-9786-jp63 | |
| CVE-2024-45338 | |
| GHSA-v778-237x-gjrc | |
| CVE-2024-45337 | |
| CVE-2024-52304 | |
| Resource Exhaustion | |
| GHSA-78wr-2p64-hpwj | |
| GHSA-8495-4g3g-x7pr | |
| GHSA-8xfx-rj4p-23jm | |
| GHSA-j7vj-rw65-4v26 | |
| CVE-2024-34155 | |
| CVE-2024-34156 | |
| CVE-2024-34158 | |
| GHSA-crqm-pwhx-j97f | |
| CVE-2024-27306 | |
| GHSA-5m98-qgg9-wh84 | |
| GHSA-jjg7-2v4v-x38h | |
| CVE-2024-30251 | |
| Inefficient Regular Expression Complexity | |
| GHSA-jwhx-xcg6-8xhj | |
| GHSA-7gpw-8wmc-pm8g | |
| CVE-2024-42367 | |