| CVE-2025-22871 | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Validation of Integrity Check Value | |
| Information Exposure Through Log Files | |
| CVE-2024-24791 | |
| CVE-2024-24788 | |
| CVE-2024-34156 | |
| CVE-2024-24783 | |
| Memory Leak | |
| CVE-2024-24786 | |
| CVE-2024-28180 | |
| Information Exposure | |
| CVE-2023-39326 | |
| CVE-2023-39321 | |
| Cross-site Scripting (XSS) | |
| Resource Exhaustion | |
| Cross-site Scripting (XSS) | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Interpretation Conflict | |
| Resource Exhaustion | |
| Integer Overflow or Wraparound | |
| Allocation of Resources Without Limits or Throttling | |
| Resource Exhaustion | |
| Arbitrary Code Injection | |
| CVE-2022-41723 | |
| CVE-2023-24540 | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2021-33198 | |
| Use of Insufficiently Random Values | |
| Improper Locking | |