| CVE-2025-40778 | |
| CVE-2024-11187 | |
| CVE-2024-1737 | |
| CVE-2024-1975 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2023-50868 | |
| CVE-2023-4408 | |
| Use After Free | |
| Out-of-bounds Write | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2022-2795 | |
| HTTP Request Smuggling | |
| Memory Leak | |
| Memory Leak | |
| CVE-2021-25219 | |
| Reachable Assertion | |
| Reachable Assertion | |
| Buffer Overflow | |
| Improper Privilege Management | |
| Improper Resource Shutdown or Release | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Incorrect Permission Assignment for Critical Resource | |
| Race Condition | |
| Allocation of Resources Without Limits or Throttling | |