| Asymmetric Resource Consumption (Amplification) | |
| GHSA-428g-f7cq-pgp5 | |
| Link Following | |
| GHSA-w853-jp5j-5j7f | |
| Insecure Default Initialization of Resource | |
| GHSA-9h52-p55h-vw2f | |
| GHSA-m449-cwjh-6pw7 | |
| Improper Neutralization of Special Elements Used in a Template Engine | |
| GHSA-6qv9-48xg-fc7f | |
| Resource Exhaustion | |
| GHSA-2qfp-q593-8484 | |
| GHSA-7f5h-v6xp-fcq8 | |
| Algorithmic Complexity | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| GHSA-vr63-x8vc-m265 | |
| GHSA-jfx9-29x2-rv3j | |
| Excessive Iteration | |
| GHSA-g8c6-8fjj-2r4m | |
| Deserialization of Untrusted Data | |
| XML External Entity (XXE) Injection | |
| GHSA-m42m-m8cr-8m58 | |
| GHSA-9ggr-2464-2j32 | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| GHSA-pc6w-59fv-rh23 | |
| Resource Exhaustion | |
| GHSA-7hfw-26vp-jp8m | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-2c2j-9gv5-cj73 | |