Improper Handling of Highly Compressed Data (Data Amplification) | |
CVE-2025-1088 | |
CVE-2025-47906 | |
Improper Access Control | |
CVE-2025-4123 | |
Improper Authorization | |
CVE-2025-22870 | |
CVE-2025-4673 | |
Improper Verification of Cryptographic Signature | |
CVE-2025-6023 | |
Improper Input Validation | |
CVE-2025-3580 | |
Allocation of Resources Without Limits or Throttling | |
CVE-2025-2703 | |
Link Following | |
CVE-2025-47910 | |
Improper Authorization | |
GHSA-2464-8j7c-4cjm | |
CVE-2025-22871 | |
CVE-2025-22869 | |
Asymmetric Resource Consumption (Amplification) | |
CVE-2025-22872 | |
CVE-2025-4674 | |
CVE-2025-47907 | |
CVE-2025-22868 | |
CVE-2025-3454 | |
GHSA-fv92-fjc5-jj9h | |
CVE-2025-6197 | |
Improper Authorization | |
CVE-2025-3415 | |
CVE-2025-22874 | |
GHSA-2464-8j7c-4cjm | |