| CVE-2025-5279 | |
| Allocation of Resources Without Limits or Throttling | |
| HTTP Request Smuggling | |
| SQL Injection | |
| CVE-2024-12797 | |
| Deserialization of Untrusted Data | |
| Incorrect Default Permissions | |
| SQL Injection | |
| Insufficient Session Expiration | |
| CVE-2024-12745 | |
| Improper Neutralization | |
| Protection Mechanism Failure | |
| Information Exposure Through Log Files | |
| CVE-2024-21272 | |
| Missing Release of Resource after Effective Lifetime | |
| Resource Exhaustion | |
| CVE-2024-52304 | |
| Information Exposure | |
| CVE-2024-45314 | |
| Improper Encoding or Escaping of Output | |
| CVE-2024-45034 | |
| Cross-site Scripting (XSS) | |
| CVE-2024-42367 | |
| Insufficient Session Expiration | |
| Arbitrary Code Injection | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Injection | |
| Insufficient Verification of Data Authenticity | |
| CVE-2024-37891 | |
| CVE-2024-25142 | |
| Race Condition | |
| CVE-2024-35195 | |