1. GitHub Project Directory Filter Exposes ReDoS Vulnerability via Unescaped User Input
A critical vulnerability in a GitHub project's directory filter allows user input to be passed directly into a regular expression constructor without escaping, creating a direct path for a Regular Expression Denial of Service (ReDoS) attack. The flaw, located in the `atr/static/js/src/projects-directory.js` file, enabl...