| GHSA-3x4c-7xq6-9pq8 | |
| Resource Exhaustion | |
| CVE-2026-2229 | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| GHSA-2mjp-6q6p-2qxm | |
| GHSA-v9p9-hfj2-hcw8 | |
| CVE-2026-1526 | |
| GHSA-vrm6-8vpv-qv8q | |
| GHSA-8gc5-j5rx-235r | |
| GHSA-phc3-fgpg-7m6h | |
| HTTP Request Smuggling | |
| GHSA-f269-vfmq-vjvj | |
| GHSA-4992-7rv2-5pvq | |
| CVE-2026-2581 | |
| CVE-2026-1528 | |
| CVE-2026-1527 | |
| CVE-2026-1525 | |
| GHSA-ggv3-7p47-pfv8 | |
| GHSA-pxg6-pf52-xh8x | |
| GHSA-554w-wpv2-vw27 | |
| GHSA-5gfm-wpxj-wjgq | |
| GHSA-33vc-wfww-vjfv | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-mwv6-3258-q52c | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-76p3-8jx3-jpfq | |
| CVE-2024-47764 | |
| GHSA-5jpx-9hw9-2fx4 | |
| GHSA-f82v-jwr5-mffw | |
| CVE-2025-66478 | |
| GHSA-4hjh-wcwx-xvwj | |
| CVE-2024-55565 | |
| CVE-2025-59472 | |
| GHSA-fj3w-jwp8-x2g3 | |
| GHSA-4342-x723-ch2f | |
| CVE-2025-22871 | |
| Information Exposure Through Caching | |
| GHSA-g9mf-h72j-4rw9 | |
| GHSA-mm7p-fcc7-pg87 | |
| GHSA-mwcw-c2x4-8c55 | |
| Incorrect Authorization | |
| GHSA-9qr9-h5gf-34mp | |
| GHSA-5f7q-jpqc-wp7h | |
| GHSA-rcmh-qjqh-p98v | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-8cj5-5rvv-wf4v | |
| CVE-2025-7783 | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Inefficient Regular Expression Complexity | |
| Authorization Bypass Through User-Controlled Key | |
| Improper Validation of Syntactic Correctness of Input | |
| GHSA-37qj-frw5-hhjh | |
| GHSA-pfq8-rq6v-vf5m | |
| Improper Check for Unusual or Exceptional Conditions | |
| GHSA-968p-4wvh-cqc8 | |
| CVE-2025-9910 | |
| GHSA-xxjr-mmjv-4gpg | |
| GHSA-r2fc-ccr8-96c4 | |
| CVE-2025-13465 | |
| Improper Input Validation | |
| Buffer Overflow | |
| GHSA-fjxv-7rqg-78g4 | |
| Uncontrolled Recursion | |
| GHSA-gp8f-8m3g-qvj9 | |
| Inefficient Regular Expression Complexity | |
| Use of Insufficiently Random Values | |
| Uncontrolled Recursion | |
| GHSA-mh29-5h37-fv8m | |
| Improper Input Validation | |
| GHSA-c76h-2ccp-4975 | |
| GHSA-jmr7-xgp7-cmfj | |
| GHSA-g77x-44xx-532m | |
| GHSA-xv57-4mr9-wg8v | |
| Integer Overflow or Wraparound | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-43fc-jf86-j433 | |
| GHSA-jr5f-v2jv-69x6 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-g9pc-8g42-g6vq | |
| GHSA-7m27-7ghc-44w9 | |
| GHSA-w37m-7fhw-fmv9 | |
| Improper Verification of Cryptographic Signature | |
| Server-Side Request Forgery (SSRF) | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| GHSA-g5qg-72qw-gw5v | |
| CVE-2025-12816 | |
| GHSA-869p-cjfg-cm3x | |
| HTTP Request Smuggling | |
| Improper Check or Handling of Exceptional Conditions | |
| Directory Traversal | |
| GHSA-65ch-62r8-g69g | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-8hc4-vh64-cxmj | |
| CVE-2024-34351 | |
| GHSA-fr5h-rqp8-mj6g | |
| CVE-2024-37168 | |
| GHSA-7v5v-9h63-cj86 | |