Allocation of Resources Without Limits or Throttling | |
GHSA-q7rw-w4cq-2j6w | |
GHSA-fmhh-rw3h-785m | |
Allocation of Resources Without Limits or Throttling | |
GHSA-9w9f-6mg8-jp7w | |
Authentication Bypass | |
GHSA-9h6j-4ffx-cm84 | |
GHSA-63cv-4pc2-4fcf | |
GHSA-h5v9-xw2g-7hrq | |
CVE-2025-31363 | |
GHSA-85jj-c9jr-9jhx | |
CVE-2023-48732 | |
GHSA-7rgp-4j56-fm79 | |
GHSA-hwjf-4667-gqwx | |
GHSA-mj2p-v2c2-vh4v | |
CVE-2024-47003 | |
GHSA-fx48-xv6q-6gp3 | |
CVE-2025-32093 | |
GHSA-jj46-9cgh-qmfx | |
CVE-2025-27538 | |
GHSA-jcgv-3pfq-j4hr | |
GHSA-59hf-mpf8-pqjh | |
CVE-2025-27936 | |
CVE-2024-24776 | |
GHSA-q7rx-w656-fwmv | |
GHSA-wwhj-pw6h-f8hw | |
GHSA-q8p2-2hwc-jw64 | |
CVE-2024-47401 | |
CVE-2024-10241 | |
GHSA-6mvp-gh77-7vwh | |
CVE-2023-47865 | |
GHSA-3g36-gf7c-75qw | |
GHSA-rhvr-6w8c-6v7w | |
Resource Exhaustion | |
Directory Traversal | |
GHSA-h3gq-j7p9-x3p4 | |
GHSA-762g-9p7f-mrww | |
CVE-2023-45223 | |
Allocation of Resources Without Limits or Throttling | |
GHSA-j4c3-3h73-74m9 | |
CVE-2025-41395 | |
Cross-site Scripting (XSS) | |
GHSA-r833-w756-h5p2 | |
GHSA-vm9m-57jr-4pxh | |
GHSA-4ghx-8jw8-p76q | |
CVE-2025-2424 | |
GHSA-322v-vh2g-qvpv | |
GHSA-w88v-pjr8-cmv2 | |
CVE-2024-1942 | |
CVE-2025-22449 | |
GHSA-2j87-p623-8cc2 | |
CVE-2025-20621 | |
GHSA-jjr7-372r-cx7x | |
GHSA-j639-m367-75cf | |
GHSA-689c-xq7x-xjwf | |
GHSA-v469-7wp6-7cvp | |
GHSA-8j3q-gc9x-7972 | |
GHSA-g376-m3h3-mj4r | |
GHSA-2549-xh72-qrpm | |
CVE-2025-1412 | |
CVE-2023-50333 | |
GHSA-3487-3j7c-7gwj | |
GHSA-hm57-h27x-599c | |
GHSA-j5jw-m2ph-3jjf | |
CVE-2025-24526 | |
CVE-2024-23488 | |
CVE-2025-24839 | |
CVE-2025-41423 | |
CVE-2024-1887 | |
CVE-2025-35965 | |
GHSA-45v9-w9fh-33j6 | |
GHSA-c37r-v8jx-7cv2 | |
Race Condition | |
CVE-2025-22445 | |
GHSA-9w97-9rqx-8v4j | |
GHSA-xgxj-j98c-59rv | |
Cross-site Request Forgery (CSRF) | |
CVE-2024-1888 | |
GHSA-7664-hcp7-f497 | |
Open Redirect | |
Resource Exhaustion | |
Improper Check for Dropped Privileges | |
CVE-2025-20033 | |
CVE-2023-6202 | |
GHSA-xp9j-8p68-9q93 | |
GHSA-3g35-v53r-gpxc | |
Incorrect Authorization | |
GHSA-5m7j-6gc4-ff5g | |
Resource Exhaustion | |
CVE-2025-2475 | |
GHSA-5fwx-p6xh-vjrh | |
CVE-2025-24866 | |
GHSA-p5pr-vm3j-jxxf | |
CVE-2023-47858 | |
CVE-2025-2564 | |
GHSA-pfw6-5rx3-xh3c | |
CVE-2025-20086 | |
CVE-2025-27571 | |
CVE-2025-20051 | |
Asymmetric Resource Consumption (Amplification) | |
GHSA-fr22-5377-f3p7 | |
Arbitrary Code Injection | |
CVE-2023-6459 | |
GHSA-mh63-6h87-95cp | |
CVE-2024-50052 | |
GHSA-h4rr-f37j-4hh7 | |
GHSA-32h7-7j94-8fc2 | |
GHSA-762v-rq7q-ff97 | |
CVE-2023-43754 | |
GHSA-q8fg-cp3q-5jwm | |
GHSA-w6xh-c82w-h997 | |
CVE-2025-20088 | |
CVE-2025-21088 | |
CVE-2025-25279 | |
GHSA-6rqh-8465-2xcw | |
CVE-2024-10214 | |
Resource Exhaustion | |
GHSA-xfq9-hh5x-xfq9 | |