| SQL Injection | |
| CVE-2025-26699 | |
| CVE-2024-53907 | |
| CVE-2024-27351 | |
| Improper Validation of Specified Quantity in Input | |
| Improper Validation of Specified Quantity in Input | |
| Resource Exhaustion | |
| Allocation of Resources Without Limits or Throttling | |
| Directory Traversal | |
| Improper Input Validation | |
| CVE-2021-45115 | |
| Directory Traversal | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Uncontrolled Recursion | |
| SQL Injection | |
| CVE-2025-13473 | |
| CVE-2025-14550 | |
| CVE-2026-1285 | |
| CVE-2026-1312 | |
| CVE-2026-1287 | |
| CVE-2026-1207 | |
| CVE-2025-64460 | |
| CVE-2025-13372 | |
| CVE-2024-41989 | |
| CVE-2024-45230 | |
| Improper Validation of Specified Quantity in Input | |
| CVE-2024-41990 | |
| CVE-2024-45231 | |
| CVE-2024-56374 | |
| CVE-2025-32873 | |
| CVE-2025-64459 | |
| Directory Traversal | |
| Improper Output Neutralization for Logs | |