| Missing Authentication for Critical Function | <8.6.52>=9.0.0-alpha.1 <9.6.0-alpha.41 |
| Information Exposure | <8.6.51>=9.0.0-alpha.1 <9.6.0-alpha.40 |
| Information Exposure | <8.6.50>=9.0.0 <9.6.0-alpha.35 |
| Improperly Controlled Sequential Memory Allocation | <8.6.47>=9.0.0-alpha.1 <9.6.0-alpha.24 |
| Weak Authentication | <8.6.49>=9.0.0-alpha.1 <9.6.0-alpha.29 |
| Time-of-check Time-of-use (TOCTOU) Race Condition | <8.6.48>=9.0.0-alpha.1 <9.6.0-alpha.28 |
| Prototype Pollution | <8.6.44>=9.0.0-alpha.1 <9.6.0-alpha.20 |
| Improper Validation of Syntactic Correctness of Input | <8.6.43>=9.0.0-alpha.1 <9.6.0-alpha.19 |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | <8.6.42>=9.0.0-alpha.1 <9.6.0-alpha.17 |
| Uncontrolled Recursion | <8.6.45>=9.0.0-alpha.1 <9.6.0-alpha.21 |
| Cross-site Scripting (XSS) | <8.6.41>=9.0.0-alpha.1 <9.6.0-alpha.15 |
| Missing Authentication for Critical Function | <8.6.40>=9.0.0-alpha.1 <9.6.0-alpha.14 |
| Incorrect Authorization | <8.6.21>=9.0.0-alpha.1 <9.5.2-alpha.8 |
| Incorrect Authorization | <8.6.18>=9.0.0-alpha.1 <9.5.2-alpha.5 |
| Function Call With Incorrect Order of Arguments | >=8.0.2 <8.6.39>=9.0.0-alpha.1 <9.6.0-alpha.13 |
| Improper Neutralization of Special Elements in Data Query Logic | <8.6.38>=9.0.0-alpha.1 <9.6.0-alpha.12 |
| Race Condition | <8.6.37>=9.0.0-alpha.1 <9.6.0-alpha.11 |
| Information Exposure | <8.6.35>=9.0.0-alpha.1 <9.6.0-alpha.9 |
| SQL Injection | <8.6.36>=9.0.0-alpha.1 <9.6.0-alpha.10 |
| Missing Authorization | <8.6.20>=9.0.0-alpha.1 <9.5.2-alpha.7 |
| Insufficiently Protected Credentials | <8.6.22>=9.0.0-alpha.1 <9.5.2-alpha.9 |
| Allocation of Resources Without Limits or Throttling | <8.6.15>=9.0.0-alpha.1 <9.5.2-alpha.2 |
| SQL Injection | <8.6.31>=9.0.0-alpha.1 <9.6.0-alpha.5 |
| Incorrect Authorization | <8.6.16>=9.0.0-alpha.1 <9.5.2-alpha.3 |
| Improper Control of Interaction Frequency | <8.6.23>=9.0.0-alpha.1 <9.5.2-alpha.10 |
| Operation on a Resource after Expiration or Release | <8.6.33>=9.0.0-alpha.1 <9.6.0-alpha.7 |
| Improper Neutralization of Special Elements in Data Query Logic | <8.6.14>=9.0.0-alpha.1 <9.5.2-alpha.1 |
| Incorrect Authorization | <8.6.32>=9.0.0-alpha.1 <9.6.0-alpha.6 |
| Information Exposure | <8.6.34>=9.0.0-alpha.1 <9.6.0-alpha.8 |
| Cross-site Scripting (XSS) | <8.6.30>=9.0.0-alpha.1 <9.6.0-alpha.4 |
| LDAP Injection | <8.6.26>=9.0.0-alpha.1 <9.5.2-alpha.13 |
| Incorrect Authorization | <8.6.19>=9.0.0-alpha.1 <9.5.2-alpha.6 |
| Missing Authorization | <8.6.25>=9.0.0-alpha.1 <9.5.2-alpha.12 |
| SQL Injection | <8.6.29>=9.0.0-alpha.1 <9.6.0-alpha.3 |
| SQL Injection | <8.6.28>=9.0.0-alpha.1 <9.6.0-alpha.2 |
| Cross-site Scripting (XSS) | <8.6.17>=9.0.0 <9.5.2-alpha.4 |
| Prototype Pollution | >=9.0.0-alpha.1 <9.5.1-alpha.2<8.6.13 |
| Improper Check for Unusual or Exceptional Conditions | >=9.0.0-alpha.1 <9.5.1-alpha.1<8.6.12 |