All of the vulnerabilities arise from improper input validations.
Source: Threadpost