| Allocation of Resources Without Limits or Throttling | |
| GHSA-mh2q-q3fh-2475 | |
| GHSA-5w89-2c2x-6x66 | |
| Improper Certificate Validation | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-x4jj-h2v8-hqqv | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-7mr4-xjxg-34g6 | |
| Incorrect Authorization | |
| CVE-2026-32280 | |
| Cross-site Scripting (XSS) | |
| GHSA-m4pr-4j3g-9v7v | |
| GHSA-gjvh-7jh8-7xhm | |
| GHSA-jrg3-gfjw-hm96 | |
| GHSA-pxq6-2prw-chj9 | |
| GHSA-x744-4wpc-v9h2 | |
| Authentication Bypass | |
| Off-by-one Error | |
| Uncaught Exception | |
| GHSA-78h2-9frx-2jm8 | |
| Improper Authorization | |
| GHSA-p77j-4mvh-x3m3 | |
| Symlink Following | |
| Memory Leak | |
| Incorrect Execution-Assigned Permissions | |
| OS Command Injection | |
| Use of Hard-coded Cryptographic Key | |
| Time-of-check Time-of-use (TOCTOU) | |
| Allocation of Resources Without Limits or Throttling | |
| Integer Overflow or Wraparound | |
| CVE-2025-22871 | |
| CVE-2025-22870 | |
| CVE-2025-22866 | |
| CVE-2025-22872 | |
| Arbitrary Command Injection | |
| CVE-2024-45336 | |
| CVE-2024-45341 | |
| CVE-2024-45338 | |
| CVE-2024-34156 | |
| CVE-2024-34155 | |
| CVE-2024-34158 | |
| CVE-2024-45310 | |
| CVE-2024-41110 | |
| CVE-2024-24791 | |
| CVE-2024-24790 | |
| CVE-2024-24789 | |
| CVE-2024-24788 | |
| CVE-2024-24787 | |
| CVE-2024-32473 | |
| CVE-2023-45288 | |