CVE-2024-10977
| |
CVE-2024-10978
| |
CVE-2024-10979
| |
CVE-2024-10976
| |
Time-of-check Time-of-use (TOCTOU)
| |
CVE-2024-0985
| |
CVE-2023-5870
| |
CVE-2023-5868
| |
Integer Overflow or Wraparound
| |
SQL Injection
| |
CVE-2023-39418
| |
CVE-2023-2455
| |
CVE-2023-2454
| |
CVE-2022-41862
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Incomplete Cleanup
| |
SQL Injection
| |
Insufficiently Protected Credentials
| |
Information Exposure
| |
CVE-2021-32029
| |
Information Exposure
| |
Out-of-Bounds
| |
Incorrect Authorization
| |
Information Exposure
| |
Insufficient Comparison
| |
SQL Injection
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Untrusted Search Path
| |
SQL Injection
| |
Missing Authorization
| |
SQL Injection
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Improper Access Control
| |
SQL Injection
| |
Incorrect Authorization
| |
SQL Injection
| |
Incorrect Permission Assignment for Critical Resource
| |
Improper Input Validation
| |
Incorrect Permission Assignment for Critical Resource
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Improper Authentication
| |
Insufficiently Protected Credentials
| |
Missing Authorization
| |
Missing Encryption of Sensitive Data
| |
Information Exposure
| |
Information Exposure
| |