GHSA-hw49-2p59-3mhj | |
CVE-2024-24791 | |
GHSA-236w-p7wf-5ph8 | |
GHSA-49gw-vxvf-fc2g | |
CVE-2024-24789 | |
CVE-2024-24790 | |
GHSA-4v7x-pqxf-cx7m | |
CVE-2023-45288 | |
GHSA-8r3f-844c-mc37 | |
CVE-2024-24786 | |
GHSA-45x7-px36-x8w8 | |
Improper Validation of Integrity Check Value | |
CVE-2023-39326 | |
GHSA-5f94-vhjq-rpg8 | |
CVE-2023-45285 | |
GHSA-9f76-wg39-x86h | |
CVE-2022-27664 | |
GHSA-8c26-wmh5-6g9v | |
GHSA-69cg-p879-7622 | |
Missing Release of Resource after Effective Lifetime | |
Allocation of Resources Without Limits or Throttling | |
Authorization Bypass Through User-Controlled Key | |
Cross-site Scripting (XSS) | |
GHSA-69ch-w2m2-3vjp | |
CVE-2023-44487 | |
GHSA-vvpx-j8f3-3w6h | |
CVE-2022-41723 | |
HTTP Request Smuggling | |
CVE-2022-27191 | |
GHSA-4374-p667-p6c8 | |
GHSA-qppj-fm5r-hxr3 | |
GHSA-2wrh-6pvc-2jm9 | |
GHSA-fxg5-wq6x-vr4w | |
GHSA-r48q-9g5r-8q2h | |