| CVE-2024-28182 | |
| CVE-2024-27983 | |
| CVE-2024-27982 | |
| Out-of-bounds Read | |
| CVE-2024-22025 | |
| CVE-2024-22019 | |
| CVE-2023-44487 | |
| CVE-2023-32559 | |
| CVE-2023-32006 | |
| CVE-2023-32002 | |
| CVE-2023-30590 | |
| CVE-2023-30589 | |
| CVE-2023-30588 | |
| CVE-2023-30581 | |
| Use of Insufficiently Random Values | |
| Out-of-bounds Write | |
| Use of Insufficiently Random Values | |
| CVE-2023-32067 | |
| CVE-2022-29244 | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| Resource Exhaustion | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | |
| HTTP Request Smuggling | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| CVE-2022-33987 | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| OS Command Injection | |
| OS Command Injection | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| Arbitrary Code Injection | |
| Untrusted Search Path | |
| Incorrect Authorization | |
| Improper Validation of Specified Quantity in Input | |
| Inefficient Regular Expression Complexity | |