| SQL Injection | |
| Insufficient Granularity of Access Control | |
| CVE-2023-2455 | |
| CVE-2023-2454 | |
| CVE-2022-41862 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Incomplete Cleanup | |
| SQL Injection | |
| Insufficiently Protected Credentials | |
| Information Exposure | |
| CVE-2021-32029 | |
| Information Exposure | |
| Out-of-Bounds | |
| Incorrect Authorization | |
| Information Exposure | |
| Insufficient Comparison | |
| SQL Injection | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Untrusted Search Path | |
| SQL Injection | |
| Missing Authorization | |
| SQL Injection | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Improper Access Control | |
| SQL Injection | |
| Incorrect Authorization | |
| SQL Injection | |
| Incorrect Permission Assignment for Critical Resource | |
| Improper Input Validation | |
| Incorrect Permission Assignment for Critical Resource | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Insufficiently Protected Credentials | |
| Missing Authorization | |
| Improper Authentication | |
| Information Exposure | |
| Information Exposure | |
| Missing Encryption of Sensitive Data | |