| Insufficient Granularity of Access Control | <12.2.11+dfsg1-2.1+deb10u1 |
| Improper Authentication | <12.2.11+dfsg1-2.1+deb10u1 |
| Improper Input Validation | <12.2.11+dfsg1-2.1+deb10u1 |
| Improper Input Validation | <12.2.11+dfsg1-2.1+deb10u1 |
| Improper Authentication | <12.2.11+dfsg1-2.1+deb10u1 |
| Insufficiently Protected Credentials | <12.2.11+dfsg1-2.1+deb10u1 |
| Cleartext Storage of Sensitive Information | <12.2.11+dfsg1-2.1+deb10u1 |
| HTTP Response Splitting | <12.2.11+dfsg1-2.1+deb10u1 |
| NULL Pointer Dereference | <12.2.11+dfsg1-2.1+deb10u1 |
| Cross-site Scripting (XSS) | <12.2.11+dfsg1-2.1+deb10u1 |
| Resource Exhaustion | <12.2.11+dfsg1-2.1+deb10u1 |
| Improper Handling of Exceptional Conditions | <12.2.11+dfsg1-2.1+deb10u1 |
| Information Exposure | |
| Incorrect Permission Assignment for Critical Resource | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use of Externally-Controlled Format String | |
| Information Exposure | |
| Improper Input Validation | |
| CVE-2015-5245 | |