CVE-2024-22018 | |
CVE-2024-22020 | |
CVE-2024-36137 | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Authentication Bypass | |
Improper Input Validation | |
Information Exposure | |
CVE-2024-27983 | |
Improper Input Validation | |
Out-of-Bounds | |
CVE-2024-27982 | |
Improper Input Validation | |
CVE-2023-32006 | |
Incorrect Authorization | |
OS Command Injection | |
Arbitrary Code Injection | |
CVE-2023-32002 | |
CVE-2017-15896 | |
CVE-2023-23919 | |
Information Exposure | |
Buffer Overflow | |
Buffer Overflow | |
HTTP Request Smuggling | |
Directory Traversal | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Improper Certificate Validation | |
Insufficient Verification of Data Authenticity | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Improper Input Validation | |
HTTP Request Smuggling | |
Information Exposure | |
Improper Certificate Validation | |
CVE-2023-39333 | |
Directory Traversal | |
Symlink Following | |
Untrusted Search Path | |
Symlink Following | |
Improper Certificate Validation | |
CVE-2023-32559 | |
CVE-2021-22884 | |
HTTP Request Smuggling | |
Resource Exhaustion | |
Inefficient Regular Expression Complexity | |
Improper Input Validation | |
Improper Certificate Validation | |
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | |
CVE-2019-15606 | |
Buffer Overflow | |
Directory Traversal | |
Allocation of Resources Without Limits or Throttling | |
Improper Certificate Validation | |
Resource Exhaustion | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Resource Exhaustion | |
Allocation of Resources Without Limits or Throttling | |
HTTP Request Smuggling | |
Improper Enforcement of Message or Data Structure | |
Use After Free | |
Improper Certificate Validation | |
Allocation of Resources Without Limits or Throttling | |
Cross-site Scripting (XSS) | |
Use of a Broken or Risky Cryptographic Algorithm | |
Allocation of Resources Without Limits or Throttling | |
Resource Exhaustion | |
Out-of-bounds Write | |
Resource Exhaustion | |
Improper Input Validation | |
HTTP Request Smuggling | |
Use After Free | |
Integer Underflow | |
Resource Exhaustion | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Use of a Broken or Risky Cryptographic Algorithm | |