| GHSA-3966-f6p6-2qr9 | |
| Incorrect Permission Assignment for Critical Resource | |
| Authentication Bypass | |
| GHSA-p9cp-qq4c-2wr5 | |
| Allocation of Resources Without Limits or Throttling | |
| Insufficient Granularity of Access Control | |
| GHSA-m766-xfqm-qm37 | |
| GHSA-fjj2-x466-w3hx | |
| GHSA-2jwx-73fx-pwrv | |
| Cross-site Scripting (XSS) | |
| Allocation of Resources Without Limits or Throttling | |
| Authentication Bypass | |
| Improper Encoding or Escaping of Output | |
| GHSA-rh5v-9jwc-7736 | |
| GHSA-w2j6-r4xj-rjcj | |
| Cross-site Scripting (XSS) | |
| Exposure of Private Information ('Privacy Violation') | |
| Information Exposure | |
| GHSA-6mpj-fw9g-9wqm | |
| GHSA-39m5-rg2v-54h9 | |
| GHSA-3cq3-cj5m-hm72 | |
| Information Exposure Through Log Files | |
| GHSA-cpx5-2q84-prc5 | |
| GHSA-p9w7-rqj5-fjh5 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Encoding or Escaping of Output | |
| Allocation of Resources Without Limits or Throttling | |
| GHSA-j8j9-23cp-fr5v | |
| GHSA-c3cp-7jp9-c872 | |
| GHSA-h2vc-rgmf-cp34 | |
| GHSA-mp63-3qcj-f8c7 | |
| GHSA-2v4g-65gf-w58f | |
| GHSA-625h-95r8-8xpm | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| GHSA-wpv5-97wm-hp9c | |
| Resource Exhaustion | |
| GHSA-w9pc-fmgc-vxvw | |
| GHSA-6xw4-3v39-52mm | |
| GHSA-rrqh-93c8-j966 | |
| Resource Exhaustion | |
| GHSA-r657-rxjc-j557 | |
| GHSA-p543-xpfm-54cp | |
| Information Exposure | |
| Reachable Assertion | |
| GHSA-56w8-48fp-6mgv | |
| GHSA-5mh9-3jwc-rp59 | |
| Improper Certificate Validation | |
| GHSA-7c64-f9jr-v9h2 | |
| Improper Certificate Validation | |
| GHSA-pwhc-rpq9-4c8w | |
| Memory Leak | |
| Incorrect Execution-Assigned Permissions | |
| GHSA-m6hq-p25p-ffr2 | |
| GHSA-c2f4-jgmc-q2r5 | |
| Resource Exhaustion | |