| GHSA-w9j2-pvgh-6h63 | |
| GHSA-62hf-57xw-28j9 | |
| GHSA-v39h-62p7-jpjc | |
| Use of Uninitialized Resource | |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | |
| CVE-2026-41148 | |
| GHSA-xcj9-5m2h-648r | |
| GHSA-6m6c-36f7-fhxh | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Authentication | |
| GHSA-m7pr-hjqh-92cm | |
| GHSA-6chq-wfr3-2hj9 | |
| GHSA-vf2m-468p-8v99 | |
| GHSA-xx6v-rp6x-q39c | |
| GHSA-ghcm-xqfw-q4vr | |
| GHSA-87f9-hvmw-gh4p | |
| GHSA-pmwg-cvhr-8vh7 | |
| GHSA-5c9x-8gcm-mpgx | |
| Cross-site Scripting (XSS) | |
| CVE-2026-6322 | |
| GHSA-q3j6-qgpj-74h6 | |
| Improper Encoding or Escaping of Output | |
| CVE-2026-45134 | |
| GHSA-445q-vr5w-6q77 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Server-Side Request Forgery (SSRF) | |
| Uncontrolled Recursion | |
| GHSA-3644-q5cj-c5c7 | |
| GHSA-pf86-5x62-jrwf | |
| GHSA-3w6x-2g7m-8v23 | |
| CVE-2026-41149 | |
| CVE-2026-6321 | |
| GHSA-q8qp-cvcw-x6jj | |
| GHSA-58qx-3vcg-4xpx | |
| GHSA-xhjh-pmcv-23jw | |
| HTTP Response Splitting | |
| CRLF Injection | |
| CVE-2026-45149 | |
| Permissive Whitelist | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2026-41150 | |
| GHSA-v2v4-37r5-5v8g | |
| Permissive Whitelist | |
| CVE-2026-41159 | |
| GHSA-jxxr-4gwj-5jf2 | |
| Cross-site Scripting (XSS) | |
| GHSA-w5hq-g745-h8pq | |
| GHSA-rpmf-866q-6p89 | |
| Resource Exhaustion | |
| GHSA-qx2v-qp2m-jg93 | |
| Out-of-bounds Write | |
| Information Exposure | |
| Arbitrary Code Injection | |
| GHSA-xq3m-2v4x-88gg | |
| GHSA-fw9q-39r9-c252 | |
| Directory Traversal | |
| CVE-2026-32280 | |
| GHSA-6v7q-wjvx-w8wg | |
| GHSA-rr7j-v2q5-chgv | |
| GHSA-39q2-94rc-95cp | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-3p68-rc4w-qgx5 | |
| GHSA-5w89-2c2x-6x66 | |
| GHSA-q4gf-8mx6-v5v3 | |
| Improper Check for Unusual or Exceptional Conditions | |
| GHSA-jrg3-gfjw-hm96 | |
| Improper Certificate Validation | |
| Unintended Proxy or Intermediary ('Confused Deputy') | |
| GHSA-fvcv-3m26-pcqx | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-m4pr-4j3g-9v7v | |
| Incorrect Authorization | |
| GHSA-chqc-8p9q-pq6q | |
| GHSA-4w7w-66w2-5vf9 | |
| CRLF Injection | |
| GHSA-r4q5-vmmm-2653 | |
| GHSA-43fc-jf86-j433 | |
| HTTP Response Splitting | |
| GHSA-c7w3-x93f-qmm8 | |
| GHSA-gjvh-7jh8-7xhm | |
| GHSA-vvjj-xcjg-gr5g | |
| GHSA-qj83-cq47-w5f8 | |
| Resource Exhaustion | |
| GHSA-c2c7-rcm5-vvqj | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Uncontrolled Recursion | |
| Inefficient Regular Expression Complexity | |
| GHSA-48c2-rrv3-qjmp | |
| GHSA-r5fr-rjxr-66jc | |
| GHSA-f23m-r3pf-42rh | |
| CVE-2026-4800 | |
| GHSA-3v7f-55p6-f55p | |
| Resource Exhaustion | |
| CVE-2026-2950 | |
| GHSA-37ch-88jc-xwx2 | |
| GHSA-f886-m6hf-6m8v | |
| CVE-2026-4867 | |
| GHSA-wmrf-hv6w-mr66 | |
| GHSA-25h7-pfq9-p65f | |
| SQL Injection | |
| GHSA-8cpq-38p9-67gx | |
| GHSA-8gc5-j5rx-235r | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| GHSA-rf6f-7fwh-wjgh | |
| Uncontrolled Recursion | |
| Improper Validation of Specified Quantity in Input | |
| SQL Injection | |
| GHSA-jp2q-39xq-3w4g | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-ggv3-7p47-pfv8 | |
| HTTP Request Smuggling | |
| GHSA-3x4c-7xq6-9pq8 | |
| Resource Exhaustion | |
| Off-by-one Error | |
| GHSA-gmq8-994r-jv83 | |
| Direct Request ('Forced Browsing') | |
| GHSA-v2wj-7wpq-c8vv | |
| Directory Traversal | |
| GHSA-5c6j-r48x-rmvq | |
| Cross-site Scripting (XSS) | |
| GHSA-v8jm-5vwx-cfxm | |
| Cross-site Scripting (XSS) | |
| GHSA-rv83-g57w-fr8j | |
| GHSA-j3gx-2473-5fp8 | |
| Directory Traversal | |
| GHSA-fj3w-jwp8-x2g3 | |
| Buffer Overflow | |
| GHSA-mw96-cpmx-2vgc | |
| GHSA-5rq4-664w-9x2c | |
| GHSA-7r86-cg39-jmmj | |
| Directory Traversal | |
| GHSA-23c5-xmqv-rm74 | |
| Inefficient Regular Expression Complexity | |
| Algorithmic Complexity | |
| Incorrect Regular Expression | |
| Server-Side Request Forgery (SSRF) | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| GHSA-m7jm-9gc2-mpf2 | |
| GHSA-jmr7-xgp7-cmfj | |
| GHSA-3ppc-4f35-3m26 | |
| GHSA-v34v-rq6j-cj6p | |
| Inefficient Regular Expression Complexity | |
| GHSA-38r7-794h-5758 | |
| Server-Side Request Forgery (SSRF) | |
| Inefficient Regular Expression Complexity | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-2g4f-4pwh-qvx6 | |
| GHSA-8fgc-7cc6-rx7x | |
| GHSA-h25m-26qc-wcjf | |
| GHSA-9g9p-9gw9-jx7f | |
| CVE-2025-59471 | |
| Improper Input Validation | |
| GHSA-37qj-frw5-hhjh | |
| CVE-2025-61731 | |
| GHSA-gr56-3gp6-6gmj | |
| CVE-2025-61730 | |
| GHSA-cm6p-qc7v-m3jw | |
| Out-of-bounds Write | |
| GHSA-xvqr-69v8-f3gv | |
| CVE-2025-50537 | |
| GHSA-p5wg-g6qr-c7cg | |
| GHSA-xxjr-mmjv-4gpg | |
| GHSA-73rr-hh4g-fpgx | |
| Resource Exhaustion | |
| CVE-2025-13465 | |
| GHSA-6475-r3vj-m8vf | |
| GHSA-r399-636x-v7f6 | |
| GHSA-6rw7-vpxm-498p | |
| Deserialization of Untrusted Data | |
| CVE-2025-15284 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-43p4-m455-4f4j | |
| GHSA-mwv6-3258-q52c | |
| GHSA-4fh9-h7wg-q85m | |
| GHSA-5j59-xgg2-r9c4 | |
| CVE-2025-66400 | |
| Improper Certificate Validation | |
| GHSA-7c64-f9jr-v9h2 | |