| Improper Check or Handling of Exceptional Conditions | |
| Improper Authorization | |
| Improper Access Control | |
| Server-Side Request Forgery (SSRF) | |
| Resource Exhaustion | |
| GHSA-73rr-hh4g-fpgx | |
| GHSA-g9mf-h72j-4rw9 | |
| CVE-2025-13465 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-xxjr-mmjv-4gpg | |
| GHSA-8r9q-7v3j-jr4g | |
| Inefficient Regular Expression Complexity | |
| Improper Validation of Syntactic Correctness of Input | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-wqch-xfxh-vrr4 | |
| CVE-2025-13204 | |
| GHSA-6rw7-vpxm-498p | |
| CVE-2025-12735 | |
| GHSA-jc85-fpwf-qm7x | |
| CVE-2025-15284 | |
| GHSA-8gw3-rxh4-v6jx | |
| CVE-2025-13466 | |
| GHSA-r399-636x-v7f6 | |
| Deserialization of Untrusted Data | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Verification of Cryptographic Signature | |
| GHSA-869p-cjfg-cm3x | |
| GHSA-w48q-cv73-mx4w | |
| Insecure Default Initialization of Resource | |
| GHSA-4fh9-h7wg-q85m | |
| Improper Input Validation | |
| GHSA-pj86-cfqh-vqx6 | |
| GHSA-rcmh-qjqh-p98v | |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-mh29-5h37-fv8m | |
| GHSA-93m4-6634-74q7 | |
| Directory Traversal | |
| GHSA-mm7p-fcc7-pg87 | |