CVE-2024-10979 | |
CVE-2024-10978 | |
CVE-2024-10977 | |
CVE-2024-10976 | |
Time-of-check Time-of-use (TOCTOU) | |
CVE-2024-0985 | |
CVE-2023-5870 | |
Integer Overflow or Wraparound | |
CVE-2023-5868 | |
CVE-2023-2455 | |
CVE-2023-2454 | |
CVE-2022-41862 | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Incomplete Cleanup | |
SQL Injection | |
Untrusted Search Path | |
SQL Injection | |
Use of a Broken or Risky Cryptographic Algorithm | |
Permissive Whitelist | |
Information Exposure | |
Out-of-bounds Read | |
CVE-2021-32028 | |
Integer Overflow or Wraparound | |
Information Exposure | |
Insufficiently Protected Credentials | |
SQL Injection | |