| Insufficient Verification of Data Authenticity | |
| Cross-site Scripting (XSS) | |
| GHSA-gfwx-w7gr-fvh7 | |
| GHSA-hqmj-h5c6-369m | |
| GHSA-rf74-v2fm-23pw | |
| Missing Authentication for Critical Function | |
| GHSA-jm6w-m3j8-898g | |
| Open Redirect | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-pq67-6m6q-mj2v | |
| GHSA-gm62-xv2j-4w53 | |
| GHSA-2xpw-w6gg-jr37 | |
| GHSA-rv83-g57w-fr8j | |
| GHSA-8fj7-8h3w-xwfm | |
| Directory Traversal | |
| Cross-site Scripting (XSS) | |
| GHSA-hqmh-ppp3-xvm7 | |
| GHSA-j4j7-vw47-rhfq | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-j3gx-2473-5fp8 | |
| CVE-2026-27141 | |
| Direct Request ('Forced Browsing') | |
| Directory Traversal | |
| GHSA-3936-cmfr-pm3m | |
| GHSA-f2v5-7jq9-h8cg | |
| Resource Exhaustion | |
| GHSA-7p94-766c-hgjp | |
| Arbitrary Code Injection | |
| GHSA-37cx-329c-33x3 | |
| CVE-2025-61732 | |
| GHSA-h355-32pf-p2xm | |
| CVE-2025-68121 | |
| GHSA-8jvr-vh7g-f8gx | |
| Improper Validation of Integrity Check Value | |
| GHSA-gm8q-m8mv-jj5m | |
| CVE-2026-1703 | |
| GHSA-7gcm-g887-7qv7 | |
| Directory Traversal | |
| GHSA-2q4j-m29v-hq73 | |
| GHSA-6vgw-5pg2-w6jp | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| CVE-2026-0994 | |
| GHSA-8rrh-rw8j-w5fx | |
| Directory Traversal | |
| Directory Traversal | |
| GHSA-58pv-8j8x-9vj2 | |
| CVE-2025-4674 | |
| CVE-2025-22874 | |
| GHSA-f6x5-jh6r-wrfv | |
| CVE-2025-22871 | |
| CVE-2025-58181 | |
| Race Condition | |
| CVE-2025-47914 | |
| Resource Exhaustion | |
| GHSA-j5pm-7495-qmr3 | |
| GHSA-hcg3-q754-cr77 | |
| GHSA-j5w8-q4qc-rx2x | |
| GHSA-6f52-wpx2-hvf2 | |
| GHSA-wprm-fgrx-xj42 | |
| GHSA-g9pc-8g42-g6vq | |
| CVE-2025-4673 | |
| CVE-2025-22872 | |
| GHSA-qxp5-gwg8-xv66 | |
| GHSA-62jj-gr2r-5c34 | |
| GHSA-vvgc-356p-c3xw | |
| GHSA-6v2p-p543-phr9 | |
| CVE-2025-22870 | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| GHSA-7c64-f9jr-v9h2 | |
| GHSA-5mh9-3jwc-rp59 | |
| GHSA-m449-cwjh-6pw7 | |
| Resource Exhaustion | |
| Algorithmic Complexity | |
| Excessive Iteration | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Creation of Temporary File With Insecure Permissions | |
| CVE-2025-47906 | |
| Resource Exhaustion | |
| Inefficient Regular Expression Complexity | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Input Validation | |
| Expected Behavior Violation | |
| Insufficiently Protected Credentials | |
| Open Redirect | |
| CVE-2025-4565 | |
| SQL Injection | |
| Function Call With Incorrect Order of Arguments | |
| HTTP Request Smuggling | |
| Uncaught Exception | |
| Asymmetric Resource Consumption (Amplification) | |
| CVE-2024-34069 | |
| CVE-2024-21503 | |
| CVE-2024-27306 | |
| CVE-2024-37891 | |
| Directory Traversal | |
| Cross-site Scripting (XSS) | |
| CVE-2024-39705 | |
| CVE-2024-42367 | |
| CVE-2024-34062 | |
| Arbitrary Code Injection | |
| CVE-2024-30251 | |
| Out-of-bounds Read | |
| CVE-2025-22868 | |
| CVE-2025-22869 | |
| Deserialization of Untrusted Data | |
| Improper Neutralization of Special Elements Used in a Template Engine | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| CVE-2025-22866 | |
| Arbitrary Argument Injection | |
| Resource Exhaustion | |
| CVE-2024-45338 | |
| Improper Neutralization | |
| Protection Mechanism Failure | |