| CVE-2025-14177 | |
| Integer Overflow or Wraparound | |
| CVE-2025-14180 | |
| CVE-2025-6491 | |
| CVE-2025-1220 | |
| CVE-2025-1735 | |
| CVE-2025-1734 | |
| Interpretation Conflict | |
| CVE-2025-1736 | |
| CVE-2025-1219 | |
| CVE-2025-1861 | |
| Integer Overflow or Wraparound | |
| Arbitrary Code Injection | |
| CVE-2024-8929 | |
| Out-of-bounds Write | |
| CVE-2024-8932 | |
| CVE-2024-8927 | |
| HTTP Request Smuggling | |
| CVE-2024-9026 | |
| OS Command Injection | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| CVE-2024-2756 | |
| CVE-2024-3096 | |
| XML External Entity (XXE) Injection | |
| Out-of-Bounds | |
| Use of Insufficiently Random Values | |
| Allocation of Resources Without Limits or Throttling | |
| Resource Exhaustion | |
| Use of Password Hash With Insufficient Computational Effort | |
| CVE-2022-31631 | |