| CVE-2025-14010 | |
| Improper Input Validation | |
| Incorrect Authorization | |
| Information Exposure Through Log Files | |
| Improper Encoding or Escaping of Output | |
| CVE-2023-5764 | |
| Directory Traversal | |
| CVE-2023-4237 | |
| CVE-2022-3697 | |
| Arbitrary Command Injection | |
| Information Exposure | |
| Information Exposure Through Log Files | <2.10.7+merged+base+2.10.8+dfsg-1 |
| Information Exposure | <2.10.7+merged+base+2.10.8+dfsg-1 |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Improper Verification of Cryptographic Signature | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Exposure of Resource to Wrong Sphere | |
| Use of Insufficiently Random Values | |
| Directory Traversal | |
| Arbitrary Code Injection | |
| Exposure of Resource to Wrong Sphere | |
| Information Exposure Through Log Files | |
| Information Exposure | |
| Incorrect Permission Assignment for Critical Resource | |
| Directory Traversal | |
| Exposure of Resource to Wrong Sphere | |
| OS Command Injection | |
| Information Exposure | |
| Directory Traversal | |
| Arbitrary Argument Injection | |
| Information Exposure | |
| Always-Incorrect Control Flow Implementation | |
| OS Command Injection | |
| Externally Controlled Reference to a Resource in Another Sphere | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure | |
| Improper Input Validation | |
| Information Exposure | |
| Directory Traversal | |
| Information Exposure | |
| Missing Encryption of Sensitive Data | |
| Untrusted Search Path | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure Through Log Files | |
| Arbitrary Command Injection | |
| Key Management Errors | |
| Insufficiently Protected Credentials | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Insufficiently Protected Credentials | |
| Information Exposure | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| Improper Input Validation | |
| Key Management Errors | |
| Improper Input Validation | |
| Information Exposure Through Log Files | |
| Improper Input Validation | |
| Link Following | |
| Link Following | |
| Insufficient Verification of Data Authenticity | |
| Access Restriction Bypass | |