Link Following | |
Arbitrary Argument Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
Buffer Overflow | |
External Control of File Name or Path | |
Link Following | |
CVE-2024-32004 | |
Insufficiently Protected Credentials | |
CVE-2019-1353 | |
Integer Overflow or Wraparound | |
CVE-2019-1387 | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2019-1348 | |
CVE-2024-32465 | |
Directory Traversal | |
Improper Encoding or Escaping of Output | |
Arbitrary Code Injection | |
Improper Ownership Management | |
Link Following | |
Integer Overflow or Wraparound | |
Uncontrolled Search Path Element | |
CVE-2024-32020 | |
Improper Encoding or Escaping of Output | |
Insufficiently Protected Credentials | |
Link Following | |
Use of Externally-Controlled Format String | |
Use of Incorrectly-Resolved Name or Reference | |
Improper Input Validation | |
Directory Traversal | |
CVE-2024-32021 | |
Directory Traversal | |
Heap-based Buffer Overflow | |
Out-of-bounds Read | |
Link Following | |
Open Redirect | |
Arbitrary Argument Injection | |
Improper Input Validation | |
Improper Input Validation | |