| GHSA-qffp-2rhf-9h96 | |
| Directory Traversal | |
| Directory Traversal | |
| GHSA-9ppj-qmqm-q256 | |
| Algorithmic Complexity | |
| GHSA-23c5-xmqv-rm74 | |
| Inefficient Regular Expression Complexity | |
| GHSA-7r86-cg39-jmmj | |
| Server-Side Request Forgery (SSRF) | |
| Inefficient Regular Expression Complexity | |
| GHSA-83g3-92jg-28cx | |
| GHSA-8hc4-vh64-cxmj | |
| GHSA-8qq5-rm4j-mr97 | |
| GHSA-rmvr-2pp2-xj38 | |
| Inefficient Regular Expression Complexity | |
| GHSA-52f5-9888-hmc6 | |
| Directory Traversal | |
| GHSA-h5c3-5r3r-rr8q | |
| Inefficient Regular Expression Complexity | |
| Link Following | |
| GHSA-3ppc-4f35-3m26 | |
| Directory Traversal | |
| GHSA-5j98-mcp5-4vw2 | |
| Improper Handling of Unicode Encoding | |
| Inefficient Regular Expression Complexity | |
| GHSA-r6q2-hw4h-h46w | |
| OS Command Injection | |
| GHSA-4hjh-wcwx-xvwj | |
| GHSA-43fc-jf86-j433 | |
| GHSA-xx4v-prfh-6cgc | |
| Allocation of Resources Without Limits or Throttling | |
| Resource Exhaustion | |
| GHSA-v6h2-p8h4-qcjw | |
| CVE-2024-4067 | |
| GHSA-952p-6rrq-rcjv | |
| Improper Check for Unusual or Exceptional Conditions | |
| GHSA-34x7-hfp2-rc4v | |
| GHSA-jr5f-v2jv-69x6 | |
| Directory Traversal | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Server-Side Request Forgery (SSRF) | |
| GHSA-mh29-5h37-fv8m | |
| GHSA-rm8p-cx58-hcvx | |
| GHSA-7h2j-956f-4vf2 | |
| GHSA-3xgq-45jj-v275 | |
| CVE-2025-54371 | |
| CVE-2024-21538 | |
| Inefficient Regular Expression Complexity | |
| GHSA-grv7-fg5c-xmjg | |
| CVE-2024-4068 | |
| CVE-2024-33883 | |
| GHSA-f5x3-32g6-xq36 | |
| GHSA-ghr5-ch3p-vcr6 | |
| CVE-2024-28863 | |
| GHSA-cxjh-pqwp-8mfp | |
| CVE-2024-28849 | |
| GHSA-78xj-cgh5-2h22 | |
| Server-Side Request Forgery (SSRF) | |
| Open Redirect | |
| GHSA-jchw-25xp-jwwc | |