CVE-2024-21538 | |
GHSA-3xgq-45jj-v275 | |
GHSA-9wv6-86v2-598j | |
GHSA-pxg6-pf52-xh8x | |
CVE-2024-4067 | |
Cross-site Scripting (XSS) | |
CVE-2024-47764 | |
Inefficient Regular Expression Complexity | |
GHSA-gx9m-whjm-85jf | |
Inefficient Regular Expression Complexity | |
GHSA-952p-6rrq-rcjv | |
GHSA-mmhx-hmjr-r674 | |
GHSA-876p-c77m-x2hc | |
CVE-2024-38996 | |
CVE-2024-39001 | |
GHSA-328p-362g-r48j | |
GHSA-3h5v-q93c-6h6q | |
CVE-2024-37890 | |
GHSA-grv7-fg5c-xmjg | |
GHSA-f5x3-32g6-xq36 | |
CVE-2024-4068 | |
CVE-2024-28863 | |
GHSA-cxjh-pqwp-8mfp | |
GHSA-2jcg-qqmg-46q6 | |
GHSA-wf5p-g6vw-rhxx | |
GHSA-jchw-25xp-jwwc | |
GHSA-c429-5p7v-vgjp | |
Cross-site Request Forgery (CSRF) | |
CVE-2024-28849 | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Open Redirect | |