| Allocation of Resources Without Limits or Throttling | |
| Insertion of Sensitive Information Into Sent Data | |
| Arbitrary Code Injection | |
| Improper Neutralization | |
| Improper Restriction of Excessive Authentication Attempts | |
| Synchronous Access of Remote Resource without Timeout | |
| Not Failing Securely ('Failing Open') | |
| Improper Access Control | |
| Information Exposure | >=1.13.0 <1.13.5>=1.14.0 <1.14.1 |
| Improper Authorization | >=1.11.0 <1.11.9>=1.12.5 <1.12.5>=1.13.0 <1.13.1 |
| Improper Authentication | |
| Insecure Defaults | |
| Incorrect Privilege Assignment | |
| Access Restriction Bypass | >=1.7.0 <1.7.4>=1.8.0 <1.8.4 |
| Improper Authentication | >=1.7.0 <1.7.2>=1.6.0 <1.6.5<1.5.9 |
| Information Exposure | |
| Information Exposure | |
| Improper Authentication | |
| Authentication Bypass | >=0.8.3 <1.2.5>=1.3.0 <1.3.8>=1.4.0 <1.4.4>=1.5.0 <1.5.1 |
| Authentication Bypass | >=0.8.1 <1.2.5>=1.3.0 <1.3.8>=1.4.0 <1.4.4>=1.5.0 <1.5.1 |
| Privilege Escalation | |
| Privilege Escalation | |