The REST compare API has buffer leak issue in RHDG, and I have confirmed that "OutOfMemoryError: Direct buffer memory" can occur when sending a request with some extent size of POST data (like 1MiB) to the REST API continually. As the REST endpoint is secured (= authentication is required) by default in RHDG, it's not possible for anonymous attackers to utilize this issue. However, a malicious user can utilize this issue for DoS attack. Hence.