| Server-Side Request Forgery (SSRF) | |
| GHSA-8hc4-vh64-cxmj | |
| GHSA-mpg4-rc92-vx8v | |
| Resource Exhaustion | |
| CVE-2024-5321 | |
| GHSA-82m2-cv7p-4m75 | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| GHSA-jfmj-5v4g-7637 | |
| GHSA-248v-346w-9cwc | |
| Insufficient Verification of Data Authenticity | |
| CVE-2024-24791 | |
| GHSA-hw49-2p59-3mhj | |
| CVE-2024-37890 | |
| GHSA-3h5v-q93c-6h6q | |
| CVE-2024-37891 | |
| GHSA-34jh-p97f-mpxf | |
| GHSA-8cfg-vx93-jvxw | |
| Information Exposure Through Log Files | |
| GHSA-9wx4-h78v-vm56 | |
| CVE-2024-35195 | |
| Inefficient Regular Expression Complexity | |
| GHSA-jjg7-2v4v-x38h | |
| GHSA-4v7x-pqxf-cx7m | |
| CVE-2023-45288 | |
| GHSA-8r3f-844c-mc37 | |
| CVE-2024-24786 | |
| CVE-2024-28849 | |
| GHSA-cxjh-pqwp-8mfp | |
| GHSA-32ch-6x54-q4h9 | |
| CVE-2024-24783 | |
| CVE-2024-24785 | |
| CVE-2024-24784 | |
| GHSA-j6m3-gc37-6r6q | |
| GHSA-rr6r-cfgf-gc6h | |
| GHSA-3q2c-pvp5-3cqp | |
| CVE-2023-45289 | |
| CVE-2023-45290 | |
| GHSA-fgq5-q76c-gx78 | |
| GHSA-6vqw-3v5j-54x4 | |
| NULL Pointer Dereference | |
| GHSA-9v9h-cgj8-h64p | |
| CVE-2024-0727 | |
| GHSA-3ww4-gg4f-jr7f | |
| Information Exposure | |
| GHSA-jchw-25xp-jwwc | |
| Open Redirect | |
| Improper Validation of Integrity Check Value | |
| GHSA-45x7-px36-x8w8 | |