| CVE-2026-3520 | |
| GHSA-v52c-386h-88mc | |
| GHSA-qffp-2rhf-9h96 | |
| GHSA-5528-5vmv-3xc2 | |
| CVE-2026-3304 | |
| GHSA-xf7r-hgr6-v32p | |
| CVE-2026-2359 | |
| Directory Traversal | |
| CVE-2026-2391 | |
| GHSA-w7fw-mjwx-w883 | |
| GHSA-3ppc-4f35-3m26 | |
| Inefficient Regular Expression Complexity | |
| GHSA-34x7-hfp2-rc4v | |
| Directory Traversal | |
| GHSA-43fc-jf86-j433 | |
| Improper Check for Unusual or Exceptional Conditions | |
| Resource Exhaustion | |
| CVE-2025-13465 | |
| GHSA-8qq5-rm4j-mr97 | |
| Improper Handling of Unicode Encoding | |
| GHSA-xxjr-mmjv-4gpg | |
| GHSA-r6q2-hw4h-h46w | |
| Directory Traversal | |
| GHSA-73rr-hh4g-fpgx | |
| GHSA-6rw7-vpxm-498p | |
| CVE-2025-15284 | |
| GHSA-9965-vmph-33xx | |
| CVE-2025-56200 | |
| GHSA-869p-cjfg-cm3x | |
| CVE-2025-12758 | |
| Improper Verification of Cryptographic Signature | |
| GHSA-vghf-hv5q-vc2g | |
| GHSA-pj86-cfqh-vqx6 | |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | |
| GHSA-wqch-xfxh-vrr4 | |
| CVE-2025-13466 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-mh29-5h37-fv8m | |
| CVE-2025-60542 | |
| GHSA-q2pj-6v73-8rgj | |
| GHSA-vj76-c3g6-qr5v | |
| Directory Traversal | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-4hjh-wcwx-xvwj | |