| Directory Traversal | |
| GHSA-58pv-8j8x-9vj2 | |
| GHSA-63vm-454h-vhhq | |
| Deserialization of Untrusted Data | |
| GHSA-jm66-cg57-jjv5 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-4f6g-68pf-7vhv | |
| Improper Handling of Windows Device Names | |
| GHSA-87hc-h4r5-73f7 | |
| Resource Exhaustion | |
| GHSA-4xc4-762w-m6cg | |
| Resource Exhaustion | |
| GHSA-mqqc-3gqh-h2x8 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-6mq8-rvhq-8wgg | |
| HTTP Request Smuggling | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-69f9-5gxw-wvc2 | |
| Directory Traversal | |
| GHSA-54jq-c3m8-4m76 | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| GHSA-g84x-mcqj-x9qq | |
| HTTP Request Smuggling | |
| GHSA-6jhg-hg63-jvvf | |
| Logging of Excessive Data | |
| GHSA-fh55-r93g-j68g | |
| GHSA-jj3x-wxrx-4x23 | |
| Improper Resource Shutdown or Release | |
| CVE-2024-28219 | |
| GHSA-9548-qrrj-x5pj | |
| HTTP Request Smuggling | |
| GHSA-9hjg-9r4m-mvj7 | |
| GHSA-48p4-8xcf-vxj5 | |
| Insufficiently Protected Credentials | |
| Open Redirect | |
| GHSA-pq67-6m6q-mj2v | |
| CVE-2024-35195 | |
| GHSA-44wm-f244-xhp3 | |
| Heap-based Buffer Overflow | |
| GHSA-xg8h-j46f-w952 | |
| Resource Exhaustion | |
| GHSA-9wx4-h78v-vm56 | |
| Open Redirect | |
| GHSA-887c-mr87-cxwp | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-gm62-xv2j-4w53 | |
| Asymmetric Resource Consumption (Amplification) | |
| GHSA-428g-f7cq-pgp5 | |
| Link Following | |
| GHSA-w853-jp5j-5j7f | |
| Insecure Default Initialization of Resource | |
| GHSA-9h52-p55h-vw2f | |
| GHSA-m449-cwjh-6pw7 | |
| Improper Neutralization of Special Elements Used in a Template Engine | |
| GHSA-6qv9-48xg-fc7f | |
| Resource Exhaustion | |
| GHSA-2qfp-q593-8484 | |
| GHSA-7f5h-v6xp-fcq8 | |
| Algorithmic Complexity | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| GHSA-vr63-x8vc-m265 | |
| GHSA-jfx9-29x2-rv3j | |
| Excessive Iteration | |
| GHSA-g8c6-8fjj-2r4m | |
| Deserialization of Untrusted Data | |
| XML External Entity (XXE) Injection | |
| GHSA-m42m-m8cr-8m58 | |
| GHSA-9ggr-2464-2j32 | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| GHSA-pc6w-59fv-rh23 | |
| Resource Exhaustion | |
| GHSA-7hfw-26vp-jp8m | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-2c2j-9gv5-cj73 | |