| CVE-2025-30189 |  | 
| CVE-2024-23185 |  | 
| CVE-2024-23184 |  | 
| Improper Authentication |  | 
| Arbitrary Command Injection |  | 
| Directory Traversal |  | 
| Insufficient Comparison |  | 
| Improper Input Validation |  | 
| CVE-2020-24386 |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Uncontrolled Recursion |  | 
| Use After Free |  | 
| NULL Pointer Dereference |  | 
| Improper Input Validation |  | 
| Out-of-bounds Write |  | 
| CVE-2019-11499 |  | 
| CVE-2019-11494 |  | 
| CVE-2019-10691 |  | 
| Out-of-Bounds |  | 
| Improper Certificate Validation |  | 
| Improper Input Validation |  | 
| Resource Exhaustion |  | 
| Information Exposure |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Improper Certificate Validation |  | 
| Improper Input Validation |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Input Validation |  | 
| Configuration |  | 
| Improper Input Validation |  | 
| Directory Traversal |  | 
| Access Restriction Bypass |  | 
| CVE-2010-3780 |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Resource Management Errors |  | 
| Access Restriction Bypass |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Directory Traversal |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Credentials Management |  | 
| Configuration |  | 
| Access Restriction Bypass |  | 
| CVE-2007-4211 |  | 
| CVE-2007-2231 |  | 
| CVE-2006-5973 |  | 
| CVE-2006-2414 |  | 
| Out-of-Bounds |  |