| GHSA-fx83-v9x8-x52w | |
| Uncontrolled Recursion | |
| GHSA-75px-5xx7-5xc7 | |
| GHSA-v2v4-37r5-5v8g | |
| GHSA-66ff-xgx4-vchm | |
| Improper Handling of Unicode Encoding | |
| Improper Input Validation | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Cross-site Scripting (XSS) | |
| GHSA-685m-2w69-288q | |
| GHSA-2pr8-phx7-x9h3 | |
| GHSA-q6x5-8v7m-xcrf | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| GHSA-jvwf-75h9-cwgg | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Insufficiently Protected Credentials | |
| GHSA-xmrv-pmrh-hhx2 | |
| Untrusted Search Path | |
| GHSA-hfvc-g4fc-pqhx | |
| Arbitrary Code Injection | |
| GHSA-xq3m-2v4x-88gg | |
| GHSA-3xc5-wrhm-f963 | |
| GHSA-x4jj-h2v8-hqqv | |
| GHSA-gjvh-7jh8-7xhm | |
| GHSA-m4pr-4j3g-9v7v | |
| Improper Certificate Validation | |
| CVE-2026-32280 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-jrg3-gfjw-hm96 | |
| Incorrect Authorization | |
| GHSA-5w89-2c2x-6x66 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-7mr4-xjxg-34g6 | |
| Cross-site Scripting (XSS) | |
| GHSA-f886-m6hf-6m8v | |
| Resource Exhaustion | |
| Improper Validation of Array Index | |
| Integer Underflow | |
| GHSA-gm2x-2g9h-ccm8 | |
| GHSA-jhf3-xxhw-2wpp | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-c2c7-rcm5-vvqj | |
| Inefficient Regular Expression Complexity | |
| GHSA-78h2-9frx-2jm8 | |
| GHSA-3v7f-55p6-f55p | |
| Uncaught Exception | |
| GHSA-p77j-4mvh-x3m3 | |
| Improper Authorization | |
| GHSA-8fj7-8h3w-xwfm | |
| Cross-site Scripting (XSS) | |
| GHSA-rv83-g57w-fr8j | |
| CVE-2026-27141 | |
| GHSA-j4j7-vw47-rhfq | |
| Directory Traversal | |
| Direct Request ('Forced Browsing') | |
| GHSA-qffp-2rhf-9h96 | |
| Directory Traversal | |
| Directory Traversal | |
| GHSA-j3gx-2473-5fp8 | |
| GHSA-9ppj-qmqm-q256 | |
| Directory Traversal | |
| GHSA-vvgc-356p-c3xw | |
| GHSA-3ppc-4f35-3m26 | |
| GHSA-v6h2-p8h4-qcjw | |
| GHSA-hcg3-q754-cr77 | |
| GHSA-2mj3-vfvx-fc43 | |
| GHSA-w32m-9786-jp63 | |
| GHSA-8qq5-rm4j-mr97 | |
| CVE-2024-45338 | |
| CVE-2024-36623 | |
| CVE-2025-22869 | |
| GHSA-q59j-vv4j-v33c | |
| Directory Traversal | |
| CVE-2025-22872 | |
| GHSA-gh5c-3h97-2f3q | |
| Directory Traversal | |
| GHSA-7h2j-956f-4vf2 | |
| GHSA-83g3-92jg-28cx | |
| Inefficient Regular Expression Complexity | |
| Allocation of Resources Without Limits or Throttling | |
| Resource Exhaustion | |
| Improper Validation of Specified Type of Input | |
| CVE-2024-45339 | |
| CVE-2024-36621 | |
| GHSA-6wxm-mpqj-6jpf | |
| GHSA-c6gw-w398-hv78 | |
| GHSA-2x5j-vhc8-9cwm | |
| CVE-2024-36620 | |
| GHSA-23c5-xmqv-rm74 | |
| Improper Handling of Unicode Encoding | |
| Inefficient Regular Expression Complexity | |
| OS Command Injection | |
| GHSA-r6q2-hw4h-h46w | |
| GHSA-v778-237x-gjrc | |
| GHSA-5j98-mcp5-4vw2 | |
| CVE-2025-22870 | |
| CVE-2024-34155 | |
| GHSA-8xfx-rj4p-23jm | |
| Resource Exhaustion | |
| GHSA-r9px-m959-cxf4 | |
| CVE-2025-22868 | |
| CVE-2024-45337 | |
| Improper Validation of Integrity Check Value | |
| GHSA-mh29-5h37-fv8m | |
| Asymmetric Resource Consumption (Amplification) | |
| Algorithmic Complexity | |
| CVE-2025-22866 | |
| GHSA-7r86-cg39-jmmj | |
| CVE-2024-34156 | |
| CVE-2024-34158 | |
| GHSA-3whm-j4xm-rv8x | |
| GHSA-37cx-329c-33x3 | |
| GHSA-j7vj-rw65-4v26 | |
| GHSA-crqm-pwhx-j97f | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-mh63-6h87-95cp | |
| GHSA-q9hv-hpm4-hj6x | |
| Inefficient Regular Expression Complexity | |
| Arbitrary Argument Injection | |
| GHSA-6v2p-p543-phr9 | |
| GHSA-34x7-hfp2-rc4v | |
| CVE-2026-1229 | |
| GHSA-qxp5-gwg8-xv66 | |
| GHSA-v725-9546-7q7m | |
| CVE-2024-24791 | |
| Information Exposure Through Log Files | |
| Race Condition | |
| CVE-2023-45288 | |
| CVE-2024-24786 | |
| CVE-2024-24783 | |
| CVE-2024-24784 | |
| CVE-2024-24785 | |
| CVE-2023-45289 | |
| CVE-2023-45290 | |
| Origin Validation Error | |
| CVE-2023-49568 | |
| Improper Validation of Integrity Check Value | |
| Cross-site Scripting (XSS) | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2023-44487 | |