| GHSA-qx2v-qp2m-jg93 | |
| Cross-site Scripting (XSS) | |
| CVE-2026-44728 | |
| GHSA-fv7c-fp4j-7gwp | |
| CVE-2026-6322 | |
| GHSA-v39h-62p7-jpjc | |
| Out-of-bounds Write | |
| GHSA-qc64-m6c2-v4x7 | |
| GHSA-5m4p-2gjx-p2g8 | |
| CVE-2026-42501 | |
| GHSA-qf3q-3h68-mmh2 | |
| Link Following | |
| GHSA-q3j6-qgpj-74h6 | |
| CVE-2026-6321 | |
| GHSA-xq3m-2v4x-88gg | |
| Arbitrary Code Injection | |
| GHSA-xmrv-pmrh-hhx2 | |
| GHSA-f23m-r3pf-42rh | |
| GHSA-4w7w-66w2-5vf9 | |
| CVE-2026-2950 | |
| Incorrect Behavior Order: Validate Before Canonicalize | |
| CVE-2026-4923 | |
| Untrusted Search Path | |
| GHSA-v2wj-q39q-566r | |
| GHSA-27v5-c462-wpq7 | |
| GHSA-r5fr-rjxr-66jc | |
| GHSA-p9ff-h696-f583 | |
| GHSA-c2c7-rcm5-vvqj | |
| Uncontrolled Recursion | |
| Information Exposure | |
| CVE-2026-4926 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Inefficient Regular Expression Complexity | |
| Directory Traversal | |
| GHSA-hfvc-g4fc-pqhx | |
| GHSA-48c2-rrv3-qjmp | |
| CVE-2026-4800 | |
| GHSA-3v7f-55p6-f55p | |
| GHSA-j3q9-mxjg-w52f | |
| Uncaught Exception | |
| GHSA-78h2-9frx-2jm8 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-rf6f-7fwh-wjgh | |
| Improper Authorization | |
| GHSA-p77j-4mvh-x3m3 | |
| GHSA-xpqw-6gx7-v673 | |
| GHSA-25h7-pfq9-p65f | |
| Uncontrolled Recursion | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-wf6x-7x77-mvgw | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| GHSA-qpx9-hpmf-5gmw | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-23c5-xmqv-rm74 | |
| GHSA-7r86-cg39-jmmj | |
| Algorithmic Complexity | |
| Inefficient Regular Expression Complexity | |
| CVE-2025-15558 | |
| GHSA-p436-gjf2-799p | |
| Directory Traversal | |
| GHSA-v6h2-p8h4-qcjw | |
| Incorrect Permission Assignment for Critical Resource | |
| CVE-2025-47914 | |
| GHSA-3966-f6p6-2qr9 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-r6q2-hw4h-h46w | |
| GHSA-34x7-hfp2-rc4v | |
| GHSA-mh29-5h37-fv8m | |
| GHSA-8qq5-rm4j-mr97 | |
| GHSA-f6x5-jh6r-wrfv | |
| Directory Traversal | |
| CVE-2025-50537 | |
| GHSA-p5wg-g6qr-c7cg | |
| Resource Exhaustion | |
| Directory Traversal | |
| GHSA-9h8m-3fm2-qjrq | |
| Directory Traversal | |
| GHSA-mw96-cpmx-2vgc | |
| GHSA-g4jq-h2w9-997c | |
| Inefficient Regular Expression Complexity | |
| Directory Traversal | |
| CVE-2025-13465 | |
| GHSA-jqfw-vq24-v9c3 | |
| Untrusted Search Path | |
| CVE-2026-2327 | |
| GHSA-xxjr-mmjv-4gpg | |
| Inefficient Regular Expression Complexity | |
| GHSA-73rr-hh4g-fpgx | |
| Directory Traversal | |
| GHSA-83g3-92jg-28cx | |
| GHSA-3ppc-4f35-3m26 | |
| GHSA-38c4-r59v-3vqw | |
| Improper Handling of Unicode Encoding | |
| Resource Exhaustion | |
| CVE-2025-58181 | |
| GHSA-j5w8-q4qc-rx2x | |
| GHSA-2g4f-4pwh-qvx6 | |