| CVE-2025-61730 | |
| CVE-2025-61732 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-gr56-3gp6-6gmj | |
| CVE-2025-61731 | |
| GHSA-h355-32pf-p2xm | |
| GHSA-gm9r-q53w-2gh4 | |
| GHSA-8jvr-vh7g-f8gx | |
| GHSA-g9q4-qjx4-2v7q | |
| CVE-2025-68121 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-xvqr-69v8-f3gv | |
| GHSA-3966-f6p6-2qr9 | |
| Incorrect Permission Assignment for Critical Resource | |
| GHSA-p5wg-g6qr-c7cg | |
| CVE-2025-50537 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-mh29-5h37-fv8m | |
| CVE-2025-47914 | |
| GHSA-f6x5-jh6r-wrfv | |
| Improper Certificate Validation | |
| CVE-2025-61725 | |
| CVE-2025-58186 | |
| Algorithmic Complexity | |
| CVE-2025-47912 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2025-58183 | |
| Allocation of Resources Without Limits or Throttling | |
| Information Exposure Through Log Files | |
| Link Following | |
| CVE-2025-7783 | |