GHSA-v23v-6jw2-98fq | |
CVE-2024-41110 | |
GHSA-xr7q-jx4m-x55m | |
GHSA-hw49-2p59-3mhj | |
CVE-2024-24791 | |
Information Exposure Through Log Files | |
GHSA-v6v8-xj6m-xwqh | |
GHSA-236w-p7wf-5ph8 | |
CVE-2024-24790 | |
GHSA-49gw-vxvf-fc2g | |
CVE-2024-24789 | |
GHSA-5fq7-4mxc-535h | |
GHSA-2jwv-jmq4-4j3r | |
CVE-2024-24787 | |
CVE-2024-24788 | |
GHSA-x84c-p2g9-rqv9 | |
CVE-2024-32473 | |
GHSA-83g2-8m93-v3w7 | |
GHSA-38j9-7pp9-2hjw | |
Missing Authorization | |
GHSA-6hw5-6gcx-phmw | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Resource Exhaustion | |
CVE-2023-1297 | |
GHSA-vq4h-9ghm-qmrr | |
GHSA-5rcv-m4m3-hfh7 | |
Incorrect Authorization | |
Inadequate Encryption Strength | |
Information Exposure | |
GHSA-wmg5-g953-qqfw | |
Information Exposure | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
GHSA-8h2g-r292-j8xh | |
GHSA-8xmx-h8rq-h94j | |
GHSA-vvpx-j8f3-3w6h | |
CVE-2022-41723 | |
Improper Certificate Validation | |
Server-Side Request Forgery (SSRF) | |
Out-of-bounds Read | |
Resource Exhaustion | |
GHSA-qv95-g3gm-x542 | |
NULL Pointer Dereference | |
SQL Injection | |
Missing Release of Resource after Effective Lifetime | |
GHSA-86c6-3g63-5w64 | |
GHSA-69ch-w2m2-3vjp | |
GHSA-wxc4-f4m6-wwqv | |
CVE-2021-4235 | |
Allocation of Resources Without Limits or Throttling | |
GHSA-c57c-7hrj-6q6v | |
GHSA-fp52-qw33-mfmw | |
GHSA-3vm4-22fp-5rfm | |
GHSA-7f33-f4f5-xwgw | |
GHSA-cjjc-xp8v-855w | |
GHSA-9v3w-w2jh-4hff | |
GHSA-q7fx-wm2p-qfj8 | |
GHSA-c3h9-896r-86jm | |
CVE-2022-27664 | |
GHSA-m425-mq94-257g | |
GHSA-6q6q-88xp-6f2r | |
GHSA-h86h-8ppg-mxmh | |
Allocation of Resources Without Limits or Throttling | |
Incorrect Permission Assignment for Critical Resource | |
Use of a Broken or Risky Cryptographic Algorithm | |
GHSA-q6h7-4qgw-2j9p | |
GHSA-4qvx-qq5w-695p | |
GHSA-8c26-wmh5-6g9v | |
GHSA-r5c5-pr8j-pfp7 | |
GHSA-j2rp-gmqv-frhv | |
Cryptographic Issues | |
GHSA-4qhc-v8r6-8vwm | |
Improper Certificate Validation | |
Authentication Bypass | |
GHSA-23jv-v6qj-3fhh | |
CVE-2022-27191 | |
GHSA-9mh8-9j64-443f | |
Incorrect Permission Assignment for Critical Resource | |
GHSA-v3hp-mcj5-pg39 | |
Improper Verification of Cryptographic Signature | |
GHSA-25gf-8qrr-g78r | |
Improper Cross-boundary Removal of Sensitive Data | |
CVE-2023-45288 | |
GHSA-p782-xgp4-8hr8 | |
Cross-site Scripting (XSS) | |
CVE-2019-11254 | |
GHSA-6239-28c2-9mrm | |
GHSA-4v7x-pqxf-cx7m | |
Improper Privilege Management | |
CVE-2021-36213 | |
GHSA-x3jr-pf6g-c48f | |
GHSA-f5pg-7wfw-84q9 | |
GHSA-hgr8-6h9x-f7q9 | |
Uncontrolled Recursion | |
GHSA-gwc9-m7rh-j2ww | |
Improper Certificate Validation | |
GHSA-ffhg-7mh4-33c4 | |
Improper Verification of Cryptographic Signature | |
GHSA-hwc3-3qh6-r4gg | |
Improper Validation of Array Index | |
GHSA-76wf-9vgp-pj7w | |
CVE-2023-0665 | |
GHSA-m69r-9g56-7mv8 | |
CVE-2021-43565 | |
GHSA-69cg-p879-7622 | |
GHSA-6jvc-q2x7-pchv | |
GHSA-r3w7-mfpm-c2vw | |
Cross-site Scripting (XSS) | |
Improper Certificate Validation | |
CVE-2024-2048 | |
GHSA-gq98-53rq-qr5h | |
Use of a Broken or Risky Cryptographic Algorithm | |
CVE-2024-2660 | |
Unchecked Return Value | |
Memory Leak | |
GHSA-ccw8-7688-vqx4 | |
GHSA-39qc-96h7-956f | |
Use of Insufficiently Random Values | |
Origin Validation Error | |
GHSA-r88r-gmrh-7j83 | |
GHSA-ppp9-7jff-5vj2 | |
Insufficient Session Expiration | |
CVE-2024-24786 | |
GHSA-8r3f-844c-mc37 | |
GHSA-3q2c-pvp5-3cqp | |
CVE-2023-45290 | |
CVE-2024-24785 | |
CVE-2023-45289 | |
CVE-2024-24784 | |
CVE-2024-24783 | |
GHSA-j6m3-gc37-6r6q | |
GHSA-32ch-6x54-q4h9 | |
GHSA-fgq5-q76c-gx78 | |
GHSA-rr6r-cfgf-gc6h | |
GHSA-45x7-px36-x8w8 | |
GHSA-7ww5-4wqc-m92c | |
Exposure of Resource to Wrong Sphere | |
GHSA-xr7r-f8xq-vfvv | |
GHSA-4374-p667-p6c8 | |
Cross-site Scripting (XSS) | |
GHSA-2wrh-6pvc-2jm9 | |
Improper Validation of Integrity Check Value | |
GHSA-jq35-85cj-fj4p | |
Allocation of Resources Without Limits or Throttling | |
CVE-2023-39326 | |
GHSA-9f76-wg39-x86h | |
GHSA-5f94-vhjq-rpg8 | |
CVE-2023-45285 | |