| CVE-2025-8869 | |
| GHSA-4xh5-x5gv-qwph | |
| Algorithmic Complexity | |
| GHSA-7f5h-v6xp-fcq8 | |
| GHSA-g7f3-828f-7h7m | |
| GHSA-pq5p-34cr-23v9 | |
| Improper Input Validation | |
| GHSA-9ggr-2464-2j32 | |
| Insufficient Verification of Data Authenticity | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-2c2j-9gv5-cj73 | |
| Open Redirect | |
| GHSA-48p4-8xcf-vxj5 | |
| GHSA-pq67-6m6q-mj2v | |
| Open Redirect | |
| Insufficiently Protected Credentials | |
| GHSA-9hjg-9r4m-mvj7 | |
| Function Call With Incorrect Order of Arguments | |
| GHSA-4grg-w6v8-c28g | |
| GHSA-q34m-jh98-gwm2 | |
| Directory Traversal | |
| Resource Exhaustion | |
| GHSA-f9vj-2wh5-fj8j | |
| GHSA-gmj6-6f8f-6699 | |
| GHSA-q2x7-8rv6-6q7h | |
| Improper Neutralization | |
| Protection Mechanism Failure | |
| GHSA-248v-346w-9cwc | |
| Insufficient Verification of Data Authenticity | |
| CVE-2024-37891 | |
| GHSA-34jh-p97f-mpxf | |
| GHSA-pqcv-qw2r-r859 | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Arbitrary Code Injection | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| GHSA-7p8j-qv6x-f4g4 | |
| GHSA-x38x-g6gr-jqff | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| GHSA-ghv6-9r9j-wh4j | |
| GHSA-wf7f-8fxf-xfxc | |
| Deserialization of Untrusted Data | |
| GHSA-cwgg-w6mp-w9hg | |
| GHSA-j8mg-pqc5-x9gj | |
| GHSA-43c4-9qgj-x742 | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| GHSA-cv6c-7963-wxcg | |
| GHSA-76cg-cfhx-373f | |
| GHSA-9wx4-h78v-vm56 | |
| CVE-2024-35195 | |