| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Certificate Validation | |
| CVE-2025-14762 | |
| CRLF Injection | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2025-58186 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2025-47912 | |
| Information Exposure Through Log Files | |
| Algorithmic Complexity | |
| CVE-2025-61725 | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Certificate Validation | |
| CVE-2025-58183 | |
| Information Exposure | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Inefficient Regular Expression Complexity | |
| Resource Exhaustion | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Resource Exhaustion | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Allocation of Resources Without Limits or Throttling | |
| Inefficient Regular Expression Complexity | |