| Information Exposure Through Log Files | |
| Improper Input Validation | |
| Resource Exhaustion | |
| GHSA-xxh7-fcf3-rj7f | |
| GHSA-7xrh-hqfc-g7qr | |
| GHSA-crhr-qqj8-rpxc | |
| Improper Certificate Validation | |
| GHSA-72hv-8253-57qq | |
| GHSA-wjpw-4j6x-6rwh | |
| CVE-2024-6763 | |
| GHSA-qh8g-58pp-2wxh | |
| Improper Certificate Validation | |
| GHSA-vc5p-v9hr-52mj | |
| CVE-2024-8373 | |
| GHSA-m2h2-264f-f486 | |
| Inefficient Regular Expression Complexity | |
| CVE-2024-8372 | |
| Allocation of Resources Without Limits or Throttling | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| GHSA-qwqh-hm9m-p5hr | |
| GHSA-2vrf-hf26-jrp5 | |
| GHSA-2qqx-w9hr-q5gx | |
| Improper Handling of Insufficient Permissions or Privileges | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Resource Exhaustion | |
| Uncontrolled Recursion | |
| Authentication Bypass | |
| Cross-site Scripting (XSS) | |
| GHSA-prc3-vjfx-vhm9 | |
| Inefficient Regular Expression Complexity | |
| Cross-site Scripting (XSS) | |
| Missing Authorization | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2023-50298 | |
| Unrestricted Upload of File with Dangerous Type | |
| CVE-2023-51074 | |