From this webpage screenshot, the following key vulnerability information can be obtained: 1. Vulnerability IDs: - CVE-2024-43783: Payload limits may exceed configured maximum - CVE-2024-43414: Update query planner to resolve uncontrolled recursion 2. Vulnerability Descriptions: - CVE-2024-43783: A denial-of-service vulnerability where, under certain non-default configurations, it was possible to exceed the configured request payload maximums set with the option. - CVE-2024-43414: An uncontrolled recursion weakness during query planning for complex queries on particularly complex graphs. 3. Affected Configurations: - Configurations that send request bodies to , where the configuration option is set to . - Configurations that declare custom Rust plugins, where the plugin accesses the request body at the layer. 4. Affected Plugins: - Rhai plugin is not affected. 5. Mitigation Measures: - Upgrade to version v2.8.5 to resolve the uncontrolled recursion issue in complex queries. 6. Related Links: - Related GitHub Advisories: GHSA-x6xq-whh3-qg32 and GHSA-fmj9-77q8-g6c4. This information helps users understand the nature of the vulnerabilities, the affected configurations and plugins, and how to fix these issues by updating to the appropriate versions.