| CVE-2025-21490 | |
| Reachable Assertion | |
| CVE-2022-32089 | |
| Use After Free | |
| SQL Injection | |
| CVE-2021-46662 | |
| Use After Free | |
| CVE-2022-27449 | |
| Out-of-bounds Write | |
| CVE-2022-27446 | |
| CVE-2022-32084 | |
| CVE-2022-27444 | |
| Use After Free | |
| CVE-2021-46663 | |
| Use After Free | |
| SQL Injection | |
| CVE-2022-27445 | |
| Use After Free | |
| Reachable Assertion | |
| Use After Free | |
| SQL Injection | |
| SQL Injection | |
| Buffer Overflow | |
| CVE-2022-27452 | |
| Reachable Assertion | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| Use After Free | |
| SQL Injection | |
| Use After Free | |
| SQL Injection | |
| Resource Exhaustion | |
| CVE-2021-46659 | |
| CVE-2021-46665 | |
| NULL Pointer Dereference | |
| Improper Locking | |
| Use of Externally-Controlled Format String | |
| Improper Locking | |
| CVE-2022-27451 | |
| CVE-2020-14765 | |
| CVE-2020-14789 | |
| CVE-2019-2627 | |
| CVE-2021-2372 | |
| SQL Injection | |
| CVE-2021-2389 | |
| CVE-2020-14776 | |
| OS Command Injection | |
| CVE-2020-14812 | |
| CVE-2018-3277 | |
| CVE-2018-3185 | |
| CVE-2021-46661 | |
| CVE-2018-3143 | |
| CVE-2018-3200 | |
| Improper Input Validation | |
| CVE-2019-2805 | |
| CVE-2021-2166 | |
| CVE-2019-2739 | |
| Integer Overflow or Wraparound | |
| CVE-2019-2740 | |
| Stack-based Buffer Overflow | |
| CVE-2019-2758 | |
| Improper Locking | |
| CVE-2020-2760 | |
| CVE-2019-2974 | |
| Improper Locking | |
| CVE-2019-2737 | |
| CVE-2021-2154 | |
| CVE-2020-2812 | |
| Heap-based Buffer Overflow | |
| CVE-2020-2752 | |
| CVE-2018-2761 | |
| CVE-2019-2938 | |
| CVE-2019-2614 | |
| CVE-2019-2628 | |
| CVE-2018-3162 | |
| Numeric Errors | |
| CVE-2018-3173 | |
| CVE-2018-2777 | |
| CVE-2019-2510 | |
| CVE-2018-3174 | |
| CVE-2018-3282 | |
| CVE-2018-2766 | |
| CVE-2018-2771 | |
| CVE-2018-2781 | |
| CVE-2020-2814 | |
| CVE-2018-2813 | |
| CVE-2020-2574 | |
| CVE-2018-2759 | |
| CVE-2019-2537 | |
| CVE-2018-2784 | |
| CVE-2018-2755 | |
| CVE-2018-3284 | |
| CVE-2018-2786 | |
| CVE-2018-2819 | |
| CVE-2018-2817 | |
| CVE-2023-22084 | |
| Use After Free | |
| Information Exposure | |
| CVE-2024-21096 | |
| CVE-2018-2782 | |
| Improper Privilege Management | |
| CVE-2017-3238 | |
| CVE-2018-3251 | |
| CVE-2017-3312 | |
| CVE-2018-3156 | |
| CVE-2017-3318 | |
| CVE-2017-3291 | |
| CVE-2017-3244 | |
| CVE-2017-3265 | |
| Link Following | |
| CVE-2017-3243 | |
| CVE-2018-2810 | |
| CVE-2018-2787 | |
| CVE-2017-3317 | |
| Improper Input Validation | |