| Use of Insufficiently Random Values | <2.5.1+dfsg-1ubuntu0.1+esm5 |
| OS Command Injection | <2.5.1+dfsg-1ubuntu0.1+esm5 |
| CVE-2022-3697 | <2.5.1+dfsg-1ubuntu0.1+esm2 |
| Information Exposure Through Log Files | |
| Externally Controlled Reference to a Resource in Another Sphere | |
| Arbitrary Code Injection | |
| Exposure of Resource to Wrong Sphere | |
| Exposure of Resource to Wrong Sphere | <2.5.1+dfsg-1ubuntu0.1+esm1 |
| Information Exposure Through Log Files | |
| CVE-2023-5764 | <2.5.1+dfsg-1ubuntu0.1+esm2 |
| Information Exposure Through Log Files | <2.5.1+dfsg-1ubuntu0.1+esm5 |
| Arbitrary Command Injection | <2.5.1+dfsg-1ubuntu0.1+esm1 |
| Information Exposure | |
| Time-of-check Time-of-use (TOCTOU) | |
| Exposure of Resource to Wrong Sphere | <2.5.1+dfsg-1ubuntu0.1+esm1 |
| Information Exposure | <2.5.1+dfsg-1ubuntu0.1+esm5 |
| Information Exposure | |
| Improper Input Validation | <2.5.1+dfsg-1ubuntu0.1+esm5 |
| Information Exposure | |
| Directory Traversal | |
| Information Exposure | |
| Missing Encryption of Sensitive Data | |
| Untrusted Search Path | |
| Improper Input Validation | |
| Information Exposure Through Log Files | |