GHSA-5j33-cvvr-w245 | |
GHSA-27hp-xhwr-wr2m | |
Time-of-check Time-of-use (TOCTOU) | |
Improper Authentication | |
GHSA-mfj5-cf8g-g2fv | |
Time-of-check Time-of-use (TOCTOU) | |
CVE-2024-12798 | |
CVE-2024-12801 | |
GHSA-pr98-23f8-jwxv | |
GHSA-6v67-2wr5-gvf4 | |
CVE-2024-38827 | |
GHSA-q3v6-hm2v-pw99 | |
GHSA-2x2g-32r7-p4x8 | |
Improper Privilege Management | |
GHSA-rhx6-c78j-4q9w | |
Inefficient Regular Expression Complexity | |
GHSA-c4q5-6c82-3qpw | |
CVE-2024-38816 | |
CVE-2024-38821 | |
GHSA-cx7f-g6mp-7hqm | |
GHSA-4gc7-5j7h-4qph | |
CVE-2024-38820 | |
Cross-site Scripting (XSS) | |
GHSA-493p-pfq6-5258 | |
GHSA-fg2v-w576-w4v3 | |
Out-of-bounds Write | |
GHSA-m6fv-jmcg-4jfg | |
Uncontrolled Recursion | |
CVE-2023-52428 | |
GHSA-w33c-445m-f8w7 | |
Inefficient Regular Expression Complexity | |
GHSA-9wv6-86v2-598j | |
GHSA-wm9w-rjj3-j356 | |
Resource Exhaustion | |
Incorrect Conversion between Numeric Types | |
GHSA-gvpg-vgmx-xg6w | |
GHSA-cqj8-47ch-rvvq | |
Incorrect Default Permissions | |
GHSA-2qp4-g3q3-f92w | |
Inclusion of Functionality from Untrusted Control Sphere | |