| CVE-2025-61727 | |
| CVE-2025-61729 | |
| CVE-2025-47914 | |
| CVE-2025-58181 | |
| CVE-2025-61724 | |
| CVE-2025-58185 | |
| CVE-2025-58188 | |
| CVE-2025-58187 | |
| CVE-2025-58183 | |
| CVE-2025-61725 | |
| CVE-2025-58186 | |
| CVE-2025-47912 | |
| CVE-2025-61723 | |
| CVE-2025-58189 | |
| Improper Validation of Integrity Check Value | |
| GHSA-32gq-x56h-299c | |
| Improper Verification of Cryptographic Signature | |
| CVE-2024-28180 | |
| CVE-2025-47906 | |
| CVE-2025-22869 | |
| CVE-2025-47907 | |
| CVE-2024-45337 | |
| CVE-2025-47910 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2023-45288 | |
| CVE-2025-22868 | |
| CVE-2025-8959 | |
| CVE-2025-22872 | |
| Asymmetric Resource Consumption (Amplification) | |
| CVE-2025-22870 | |
| Improper Handling of Exceptional Conditions | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-jc7w-c686-c4v9 | |