GHSA-2wrh-6pvc-2jm9 | |
GHSA-69cg-p879-7622 | |
GHSA-xrjj-mj9h-534m | |
Information Exposure Through Log Files | |
GHSA-r48q-9g5r-8q2h | |
Allocation of Resources Without Limits or Throttling | |
GHSA-8r3f-844c-mc37 | |
GHSA-c3h9-896r-86jm | |
CVE-2023-44487 | |
CVE-2025-22872 | |
GHSA-74fp-r6jw-h4mp | |
CVE-2021-43565 | |
CVE-2022-27191 | |
GHSA-4v7x-pqxf-cx7m | |
Allocation of Resources Without Limits or Throttling | |
GHSA-33c5-9fx5-fvjm | |
GHSA-hp87-p4gw-j4gq | |
GHSA-w32m-9786-jp63 | |
GHSA-qppj-fm5r-hxr3 | |
Improper Privilege Management | |
CVE-2024-45337 | |
Cross-site Scripting (XSS) | |
GHSA-jmrx-5g74-6v2f | |
GHSA-p782-xgp4-8hr8 | |
GHSA-gwc9-m7rh-j2ww | |
Improper Validation of Integrity Check Value | |
GHSA-45x7-px36-x8w8 | |
GHSA-qxp5-gwg8-xv66 | |
CVE-2024-45339 | |
GHSA-6wxm-mpqj-6jpf | |
CVE-2023-45288 | |
GHSA-4374-p667-p6c8 | |
GHSA-vvgc-356p-c3xw | |
Information Exposure Through Log Files | |
CVE-2024-45338 | |
GHSA-8cfg-vx93-jvxw | |
GHSA-8c26-wmh5-6g9v | |
Deserialization of Untrusted Data | |
Open Redirect | |
CVE-2022-27664 | |
GHSA-m425-mq94-257g | |
CVE-2025-22870 | |
GHSA-vvpx-j8f3-3w6h | |
GHSA-v778-237x-gjrc | |
Improper Validation of Array Index | |
Authorization Bypass Through User-Controlled Key | |
CVE-2022-41723 | |
GHSA-69ch-w2m2-3vjp | |
CVE-2024-24786 | |
Missing Release of Resource after Effective Lifetime | |