| GHSA-mwh4-6h8g-pg8w | |
| Out-of-Bounds | |
| Directory Traversal | |
| Improper Input Validation | |
| GHSA-p998-jp59-783m | |
| GHSA-m5qp-6w8w-w647 | |
| GHSA-2vrm-gr82-f7m5 | |
| Information Exposure | |
| GHSA-966j-vmvw-g2g9 | |
| GHSA-63hf-3vf5-4wqf | |
| Resource Exhaustion | |
| Allocation of Resources Without Limits or Throttling | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| GHSA-3wq7-rqq7-wx6j | |
| GHSA-c427-h43c-vf67 | |
| HTTP Response Splitting | |
| GHSA-w2fm-2cpv-w7v5 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-p423-j2cm-9vmq | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-hcc4-c3v8-rx92 | |
| GHSA-7gcm-g887-7qv7 | |
| CVE-2026-0994 | |
| GHSA-jm6w-m3j8-898g | |
| Missing Authentication for Critical Function | |
| Cross-site Scripting (XSS) | |
| GHSA-gfwx-w7gr-fvh7 | |
| GHSA-rf74-v2fm-23pw | |
| GHSA-jr27-m4p2-rc6r | |
| GHSA-78cv-mqj4-43f7 | |
| Resource Exhaustion | |
| GHSA-qjxf-f2mg-c6mc | |
| Uncontrolled Recursion | |
| GHSA-29vq-49wr-vm6x | |
| Improper Handling of Windows Device Names | |
| GHSA-7p94-766c-hgjp | |
| Arbitrary Code Injection | |
| GHSA-r6ph-v2qm-q3c2 | |
| GHSA-cfh3-3jmp-rvhc | |
| Out-of-bounds Write | |
| CVE-2026-26007 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-63vm-454h-vhhq | |
| CVE-2026-0897 | |
| GHSA-xfhx-r7ww-5995 | |
| CVE-2026-21883 | |
| GHSA-793v-589g-574v | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| HTTP Request Smuggling | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| GHSA-g84x-mcqj-x9qq | |
| GHSA-6mq8-rvhq-8wgg | |
| GHSA-jj3x-wxrx-4x23 | |
| Logging of Excessive Data | |
| GHSA-54jq-c3m8-4m76 | |
| GHSA-6jhg-hg63-jvvf | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| HTTP Request Smuggling | |
| GHSA-mqqc-3gqh-h2x8 | |
| GHSA-69f9-5gxw-wvc2 | |
| GHSA-2xpw-w6gg-jr37 | |
| Allocation of Resources Without Limits or Throttling | |
| Directory Traversal | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-fh55-r93g-j68g | |
| GHSA-m5xw-hwxw-fq3j | |
| Deserialization of Untrusted Data | |
| GHSA-gm62-xv2j-4w53 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2025-12058 | |
| CVE-2025-12060 | |
| CVE-2025-59842 | |
| Heap-based Buffer Overflow | |
| Uncontrolled Search Path Element | |
| Insufficiently Protected Credentials | |
| Allocation of Resources Without Limits or Throttling | |
| HTTP Request Smuggling | |
| Arbitrary Code Injection | |
| CVE-2025-1550 | |
| CVE-2024-12797 | |
| Allocation of Resources Without Limits or Throttling | |
| Execution with Unnecessary Privileges | |
| CVE-2022-29241 | |
| Resource Exhaustion | |
| Open Redirect | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Directory Traversal | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Improper Access Control | |
| CVE-2024-35178 | |
| CVE-2024-28397 | |
| Protection Mechanism Failure | |
| CVE-2024-55459 | |
| Resource Exhaustion | |
| Insecure Storage of Sensitive Information | |
| Insufficient Verification of Data Authenticity | |
| CVE-2024-37891 | |
| CVE-2024-35195 | |
| Out-of-bounds Read | |
| Cross-site Scripting (XSS) | |
| CVE-2024-28219 | |
| CVE-2024-34069 | |
| CVE-2024-27454 | |
| CVE-2023-29483 | |
| Inefficient Regular Expression Complexity | |
| Uncontrolled Recursion | |