| CVE-2025-64459 | |
| Directory Traversal | |
| SQL Injection | |
| SQL Injection | |
| Improper Output Neutralization for Logs | |
| CVE-2025-32873 | |
| Improper Input Validation | |
| CVE-2021-45115 | |
| Directory Traversal | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| SQL Injection | |
| Uncontrolled Recursion | |
| Directory Traversal | |
| Allocation of Resources Without Limits or Throttling | |
| Resource Exhaustion | |
| Improper Validation of Specified Quantity in Input | |
| Improper Validation of Specified Quantity in Input | |
| CVE-2024-27351 | |
| CVE-2024-41990 | |
| CVE-2024-41989 | |
| Improper Validation of Specified Quantity in Input | |
| CVE-2024-45230 | |
| CVE-2024-45231 | |
| CVE-2024-53907 | |
| CVE-2024-56374 | |
| CVE-2025-26699 | |