| Improper Input Validation | |
| Protection Mechanism Failure | |
| Resource Exhaustion | |
| Improper Neutralization of Special Elements | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Handling of Missing Special Element | |
| External Control of File Name or Path | |
| Untrusted Search Path | |
| CVE-2025-24070 | |
| Link Following | |
| Allocation of Resources Without Limits or Throttling | |
| Buffer Over-read | |
| HTTP Request Smuggling | |
| Inadequate Encryption Strength | |
| CVE-2025-21173 | |
| CVE-2025-21172 | |
| CVE-2024-43483 | |
| CVE-2024-43484 | |
| CVE-2024-43485 | |
| CVE-2024-38229 | |
| CVE-2024-38168 | |
| CVE-2024-38167 | |
| CVE-2024-30105 | |
| CVE-2024-38095 | |
| CVE-2024-35264 | |
| CVE-2024-20672 | |
| CVE-2024-30045 | |
| CVE-2024-21409 | |
| Race Condition | |
| CVE-2024-21392 | |
| CVE-2024-21404 | |
| CVE-2024-26190 | |
| CVE-2024-21386 | |