| GHSA-xpqw-6gx7-v673 | |
| GHSA-v2wj-7wpq-c8vv | |
| CVE-2026-25679 | |
| GHSA-wc8c-qw6v-h7f6 | |
| Incorrect Authorization | |
| CVE-2026-27139 | |
| Cross-site Scripting (XSS) | |
| GHSA-vpq2-c234-7xj6 | |
| GHSA-ph5j-38mg-j6hp | |
| Server-Side Request Forgery (SSRF) | |
| CVE-2026-3449 | |
| GHSA-rv83-g57w-fr8j | |
| GHSA-j3gx-2473-5fp8 | |
| GHSA-v34v-rq6j-cj6p | |
| CVE-2026-27142 | |
| GHSA-j4j7-vw47-rhfq | |
| GHSA-7hfw-r8qc-89v4 | |
| CVE-2026-27137 | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| GHSA-5c6j-r48x-rmvq | |
| CVE-2026-27138 | |
| GHSA-xf7r-hgr6-v32p | |
| CVE-2026-2359 | |
| GHSA-v52c-386h-88mc | |
| CVE-2026-3304 | |
| CVE-2026-3520 | |
| GHSA-5528-5vmv-3xc2 | |
| Algorithmic Complexity | |
| GHSA-7r86-cg39-jmmj | |
| Inefficient Regular Expression Complexity | |
| Directory Traversal | |
| GHSA-mw96-cpmx-2vgc | |
| CVE-2026-2739 | |
| GHSA-378v-28hj-76wf | |
| GHSA-gq3j-xvxp-8hrf | |
| GHSA-23c5-xmqv-rm74 | |
| GHSA-fj3w-jwp8-x2g3 | |
| Buffer Overflow | |
| Inefficient Regular Expression Complexity | |
| GHSA-3ppc-4f35-3m26 | |
| GHSA-2g4f-4pwh-qvx6 | |
| Inefficient Regular Expression Complexity | |
| GHSA-37qj-frw5-hhjh | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Improper Input Validation | |
| GHSA-jmr7-xgp7-cmfj | |
| Server-Side Request Forgery (SSRF) | |
| Race Condition | |
| GHSA-8fgc-7cc6-rx7x | |
| GHSA-43fc-jf86-j433 | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-345p-7cg4-v4c7 | |
| GHSA-38r7-794h-5758 | |
| Improper Check for Unusual or Exceptional Conditions | |
| Inefficient Regular Expression Complexity | |
| Information Exposure Through Caching | |
| GHSA-6wqw-2p9w-4vw4 | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| GHSA-7h2j-956f-4vf2 | |
| Improper Access Control | |
| GHSA-9r54-q6cx-xmh5 | |
| Incorrect Regular Expression | |
| GHSA-w332-q679-j88p | |
| GHSA-r354-f388-2fhh | |
| Improper Check or Handling of Exceptional Conditions | |
| Improper Authorization | |
| Improper Access Control | |
| Server-Side Request Forgery (SSRF) | |
| Resource Exhaustion | |
| GHSA-73rr-hh4g-fpgx | |
| GHSA-g9mf-h72j-4rw9 | |
| CVE-2025-13465 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-xxjr-mmjv-4gpg | |
| GHSA-8r9q-7v3j-jr4g | |
| Inefficient Regular Expression Complexity | |
| Improper Validation of Syntactic Correctness of Input | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-wqch-xfxh-vrr4 | |
| CVE-2025-13204 | |
| GHSA-6rw7-vpxm-498p | |
| Arbitrary Code Injection | |
| GHSA-jc85-fpwf-qm7x | |
| CVE-2025-15284 | |
| GHSA-8gw3-rxh4-v6jx | |
| CVE-2025-13466 | |
| GHSA-r399-636x-v7f6 | |
| Deserialization of Untrusted Data | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Verification of Cryptographic Signature | |
| GHSA-869p-cjfg-cm3x | |
| GHSA-w48q-cv73-mx4w | |
| Insecure Default Initialization of Resource | |
| GHSA-4fh9-h7wg-q85m | |
| CVE-2025-66400 | |
| GHSA-pj86-cfqh-vqx6 | |
| GHSA-rcmh-qjqh-p98v | |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-mh29-5h37-fv8m | |
| GHSA-93m4-6634-74q7 | |
| Directory Traversal | |
| GHSA-mm7p-fcc7-pg87 | |