| Directory Traversal | |
| GHSA-qffp-2rhf-9h96 | |
| Directory Traversal | |
| GHSA-9ppj-qmqm-q256 | |
| Off-by-one Error | |
| GHSA-gmq8-994r-jv83 | |
| GHSA-qpx9-hpmf-5gmw | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-23c5-xmqv-rm74 | |
| GHSA-3ppc-4f35-3m26 | |
| Inefficient Regular Expression Complexity | |
| Incorrect Permission Assignment for Critical Resource | |
| GHSA-r6q2-hw4h-h46w | |
| OS Command Injection | |
| Improper Handling of Unicode Encoding | |
| Information Exposure Through Log Files | |
| GHSA-9gcr-gp5f-jw27 | |
| Improper Input Validation | |
| GHSA-wcw9-47fp-rrfr | |
| GHSA-qh38-484v-w52x | |
| GHSA-5j98-mcp5-4vw2 | |
| GHSA-7r86-cg39-jmmj | |
| GHSA-37qj-frw5-hhjh | |
| GHSA-83g3-92jg-28cx | |
| GHSA-g9mf-h72j-4rw9 | |
| Allocation of Resources Without Limits or Throttling | |
| Inefficient Regular Expression Complexity | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-73rr-hh4g-fpgx | |
| GHSA-h5c3-5r3r-rr8q | |
| Resource Exhaustion | |
| GHSA-rmvr-2pp2-xj38 | |
| GHSA-hjx7-fpxx-mj48 | |
| Algorithmic Complexity | |
| Directory Traversal | |
| Directory Traversal | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-2g4f-4pwh-qvx6 | |
| GHSA-7wwx-xj66-r44x | |
| Inefficient Regular Expression Complexity | |
| GHSA-jwmf-chvc-rf92 | |
| Inefficient Regular Expression Complexity | |
| CVE-2025-58186 | |
| Algorithmic Complexity | |
| GHSA-93m4-6634-74q7 | |
| Improper Certificate Validation | |
| Buffer Overflow | |
| GHSA-jmr7-xgp7-cmfj | |
| GHSA-869p-cjfg-cm3x | |
| GHSA-m7jm-9gc2-mpf2 | |
| Directory Traversal | |
| CVE-2025-47912 | |
| Incorrect Regular Expression | |
| GHSA-v6h2-p8h4-qcjw | |
| GHSA-29xp-372q-xqph | |
| Inefficient Regular Expression Complexity | |
| Race Condition | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Verification of Cryptographic Signature | |
| GHSA-7h2j-956f-4vf2 | |
| Inefficient Regular Expression Complexity | |
| Resource Exhaustion | |
| GHSA-3966-f6p6-2qr9 | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| CVE-2025-58183 | |
| GHSA-xxjr-mmjv-4gpg | |
| GHSA-cxq7-xw9v-rcv3 | |
| CVE-2025-15284 | |
| GHSA-fj3w-jwp8-x2g3 | |
| GHSA-3xgq-45jj-v275 | |
| GHSA-6rw7-vpxm-498p | |
| GHSA-rjcg-56ph-3qvg | |
| GHSA-frhw-mqj2-wxw2 | |
| GHSA-34x7-hfp2-rc4v | |
| CVE-2024-21538 | |
| CVE-2025-13465 | |
| Inefficient Regular Expression Complexity | |
| GHSA-8qq5-rm4j-mr97 | |
| GHSA-38c4-r59v-3vqw | |
| CVE-2025-61725 | |
| Improper Verification of Cryptographic Signature | |
| GHSA-mh29-5h37-fv8m | |
| Inefficient Regular Expression Complexity | |
| GHSA-8qff-qr5q-5pr8 | |
| Directory Traversal | |
| CVE-2026-2327 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-xx4v-prfh-6cgc | |
| GHSA-447v-2qg4-h8hc | |
| GHSA-x4c5-c7rf-jjgv | |
| GHSA-952p-6rrq-rcjv | |
| CVE-2024-4067 | |
| Resource Exhaustion | |
| GHSA-mpg4-rc92-vx8v | |
| CVE-2024-27307 | |
| GHSA-fqg8-vfv7-8fj8 | |
| GHSA-78xj-cgh5-2h22 | |
| Server-Side Request Forgery (SSRF) | |