| GHSA-3966-f6p6-2qr9 | |
| Incorrect Permission Assignment for Critical Resource | |
| Insufficient Granularity of Access Control | |
| GHSA-6mpj-fw9g-9wqm | |
| Allocation of Resources Without Limits or Throttling | |
| Information Exposure | |
| GHSA-fjj2-x466-w3hx | |
| GHSA-rcvw-fc36-wjhj | |
| Authentication Bypass | |
| GHSA-h2vc-rgmf-cp34 | |
| GHSA-2jwx-73fx-pwrv | |
| GHSA-pv96-f897-xcch | |
| GHSA-cpx5-2q84-prc5 | |
| GHSA-x45w-x744-4hj7 | |
| GHSA-j8j9-23cp-fr5v | |
| Cross-site Scripting (XSS) | |
| GHSA-p9w7-rqj5-fjh5 | |
| Cross-site Scripting (XSS) | |
| GHSA-xgjv-46p6-hwgv | |
| Improper Encoding or Escaping of Output | |
| Information Exposure Through Log Files | |
| GHSA-w2j6-r4xj-rjcj | |
| Exposure of Private Information ('Privacy Violation') | |
| Allocation of Resources Without Limits or Throttling | |
| Missing Authorization | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-mp63-3qcj-f8c7 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Encoding or Escaping of Output | |
| GHSA-m766-xfqm-qm37 | |
| GHSA-39m5-rg2v-54h9 | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-w2m4-xx67-836j | |
| GHSA-3cq3-cj5m-hm72 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-mfcp-rjv7-385m | |
| GHSA-p9cp-qq4c-2wr5 | |
| GHSA-rh5v-9jwc-7736 | |
| GHSA-c3cp-7jp9-c872 | |
| GHSA-rrqh-93c8-j966 | |
| Resource Exhaustion | |
| Incorrect Execution-Assigned Permissions | |
| GHSA-pwhc-rpq9-4c8w | |
| GHSA-m6hq-p25p-ffr2 | |
| Reachable Assertion | |
| Memory Leak | |
| GHSA-56w8-48fp-6mgv | |
| GHSA-rm4r-vwvw-vj67 | |
| GHSA-7hhv-h469-wc4q | |
| GHSA-9mv9-gw4x-7xw4 | |
| Uncontrolled Memory Allocation | |
| Information Exposure | |
| Incorrect Authorization | |