| CVE-2026-42338 | |
| GHSA-v2v4-37r5-5v8g | |
| Out-of-bounds Write | |
| GHSA-f6ww-3ggp-fr8h | |
| Uncontrolled Recursion | |
| XML Injection | |
| XML Injection | |
| GHSA-j759-j44w-7fr8 | |
| GHSA-x6wf-f3px-wcqx | |
| GHSA-2v35-w6hq-6mfw | |
| XML Injection | |
| GHSA-w5hq-g745-h8pq | |
| CVE-2026-4800 | |
| GHSA-f23m-r3pf-42rh | |
| CVE-2026-2950 | |
| GHSA-r5fr-rjxr-66jc | |
| GHSA-3v7f-55p6-f55p | |
| GHSA-f886-m6hf-6m8v | |
| Inefficient Regular Expression Complexity | |
| Resource Exhaustion | |
| GHSA-c2c7-rcm5-vvqj | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-qffp-2rhf-9h96 | |
| Directory Traversal | |
| GHSA-7r86-cg39-jmmj | |
| Algorithmic Complexity | |
| GHSA-23c5-xmqv-rm74 | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| Directory Traversal | |
| GHSA-83g3-92jg-28cx | |
| GHSA-3ppc-4f35-3m26 | |
| Inefficient Regular Expression Complexity | |
| GHSA-34x7-hfp2-rc4v | |
| GHSA-7h2j-956f-4vf2 | |
| Directory Traversal | |
| GHSA-3966-f6p6-2qr9 | |
| Incorrect Permission Assignment for Critical Resource | |
| Resource Exhaustion | |
| Directory Traversal | |
| GHSA-73rr-hh4g-fpgx | |
| GHSA-8qq5-rm4j-mr97 | |
| GHSA-5j98-mcp5-4vw2 | |
| OS Command Injection | |
| Resource Exhaustion | |
| CVE-2024-28863 | |
| Server-Side Request Forgery (SSRF) | |