| Integer Overflow or Wraparound | >=2.2.0 <2.11.14>=2.12.0 <2.12.5 |
| User Impersonation | |
| User Impersonation | <2.11.15>=2.12.0-RC.1 <2.12.6 |
| Incorrect Authorization | <2.11.15>=2.12.0-RC.1 <2.12.6 |
| Incorrect Authorization | <2.11.15>=2.12.0-RC.1 <2.12.6 |
| Credential Exposure | <2.11.15>=2.12.0-RC.1 <2.12.6 |
| NULL Pointer Dereference | |
| Improper Handling of Unexpected Data Type | <2.11.15>=2.12.0-RC.1 <2.12.6 |
| Information Exposure | <2.11.15>=2.12.0-RC.1 <2.12.6 |
| Incorrect Authorization | >=2.11.0-RC.1 <2.11.15>=2.12.0-RC.1 <2.12.6 |
| User Impersonation | <2.11.15>=2.12.0-RC.1 <2.12.6 |
| Allocation of Resources Without Limits or Throttling | <2.11.12>=2.12.0-RC.1 <2.12.3 |
| Improper Authorization | >=2.2.0 <2.10.27>=2.11.0-RC.1 <2.11.1 |
| Improper Access Control | |
| Inadequate Encryption Strength | |
| Improper Authentication | >=2.2.0 <2.9.23>=2.10.0 <2.10.2 |
| Authentication Bypass by Primary Weakness | >=2.2.0 <2.9.23>=2.10.0 <2.10.2 |
| Directory Traversal | |
| Stack-based Buffer Overflow | |
| Denial of Service (DoS) | |
| Arbitrary File Write via Archive Extraction (Zip Slip) | |
| Access Control Bypass | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Improper Authentication | |
| Denial of Service (DoS) | |