Information Exposure Through Log Files
| |
CVE-2024-24791
| |
CVE-2024-24790
| |
CVE-2024-24789
| |
CVE-2024-24788
| |
Use of Uninitialized Variable
| |
Cross-site Scripting (XSS)
| |
CVE-2024-34156
| |
CVE-2024-1313
|
<0:9.2.10-16.el9_4.alma.1
|
Memory Leak
|
<0:9.2.10-16.el9_4.alma.1
|
Resource Exhaustion
| |
Allocation of Resources Without Limits or Throttling
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Improper Input Validation
| |
CVE-2022-39201
| |
Insufficiently Protected Credentials
| |
Improper Verification of Cryptographic Signature
| |
Cross-site Scripting (XSS)
| |
CVE-2023-44487
| |
Allocation of Resources Without Limits or Throttling
| |
Authentication Bypass
| |
Authorization Bypass Through User-Controlled Key
| |
Cross-site Request Forgery (CSRF)
| |
Cross-site Scripting (XSS)
| |
CVE-2022-21673
| |
Cross-site Scripting (XSS)
| |
Authentication Bypass
| |
Incorrect Authorization
| |
Improper Authentication
| |
CVE-2022-27664
| |
CVE-2022-32148
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
HTTP Request Smuggling
| |
CVE-2022-41715
| |
HTTP Request Smuggling
| |
Allocation of Resources Without Limits or Throttling
| |