CVE-2024-10979 | |
CVE-2024-10978 | |
CVE-2024-10977 | |
CVE-2024-10976 | |
Time-of-check Time-of-use (TOCTOU) | |
CVE-2024-0985 | |
Integer Overflow or Wraparound | |
CVE-2023-5868 | |
CVE-2023-5870 | |
SQL Injection | |
Insufficient Granularity of Access Control | |
CVE-2023-2455 | |
CVE-2023-2454 | |
CVE-2022-41862 | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Incomplete Cleanup | |
SQL Injection | |
Insufficiently Protected Credentials | |
Information Exposure | |
CVE-2021-32029 | |
Information Exposure | |
Out-of-Bounds | |
Incorrect Authorization | |
Information Exposure | |
Insufficient Comparison | |
SQL Injection | |
Use of a Broken or Risky Cryptographic Algorithm | |
Untrusted Search Path | |
SQL Injection | |
Missing Authorization | |
SQL Injection | |
Out-of-bounds Read | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Improper Access Control | |
SQL Injection | |
Incorrect Authorization | |
SQL Injection | |
Incorrect Permission Assignment for Critical Resource | |
Improper Input Validation | |
Information Exposure | |
Incorrect Permission Assignment for Critical Resource | |
Information Exposure | |
Information Exposure | |
Missing Authorization | |
Insufficiently Protected Credentials | |
Improper Authentication | |
Information Exposure | |
Missing Encryption of Sensitive Data | |
Information Exposure | |