| CVE-2025-8713 | |
| CVE-2025-8715 | |
| CVE-2025-8714 | |
| CVE-2025-4207 | |
| CVE-2025-1094 | |
| Insufficient Verification of Data Authenticity | |
| CVE-2024-10976 | |
| Externally Controlled Reference to a Resource in Another Sphere | |
| CVE-2024-10978 | |
| Time-of-check Time-of-use (TOCTOU) | |
| CVE-2024-0985 | |
| Missing Authorization | |
| Information Exposure | |
| Improper Authentication | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Read | |
| Insufficient Comparison | |
| Information Exposure | |
| Missing Encryption of Sensitive Data | |
| SQL Injection | |
| SQL Injection | |
| Missing Authorization | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Insufficient Granularity of Access Control | |
| Information Exposure | |
| Information Exposure | |
| SQL Injection | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| CVE-2022-41862 | |
| Improper Access Control | |
| Out-of-Bounds | |
| Untrusted Search Path | |
| SQL Injection | |
| Information Exposure | |
| SQL Injection | |
| CVE-2023-5870 | |
| Out-of-bounds Write | |
| Incorrect Permission Assignment for Critical Resource | |
| CVE-2023-5868 | |
| Insufficiently Protected Credentials | |
| Information Exposure | |
| Incorrect Authorization | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Incorrect Permission Assignment for Critical Resource | |
| CVE-2023-2454 | |
| CVE-2023-2455 | |
| SQL Injection | |
| Information Exposure | |
| Insufficiently Protected Credentials | |
| CVE-2021-32029 | |
| Incomplete Cleanup | |
| Information Exposure | |
| SQL Injection | |
| Incorrect Authorization | |