| CVE-2024-22020 |  | 
| CVE-2024-36137 |  | 
| Insufficient Verification of Data Authenticity |  | 
| Information Exposure |  | 
| HTTP Request Smuggling |  | 
| Improper Certificate Validation |  | 
| Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) |  | 
| HTTP Request Smuggling |  | 
| Cross-site Scripting (XSS) |  | 
| Use After Free |  | 
| Improper Certificate Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| HTTP Request Smuggling |  | 
| Improper Input Validation |  | 
| CVE-2025-23084 |  | 
| Out-of-Bounds |  | 
| CVE-2025-23083 |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Untrusted Search Path |  | 
| CVE-2023-23919 |  | 
| Arbitrary Code Injection |  | 
| Incorrect Authorization |  | 
| OS Command Injection |  | 
| Buffer Overflow |  | 
| Improper Certificate Validation |  | 
| CVE-2017-15896 |  | 
| Improper Certificate Validation |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| Authentication Bypass |  | 
| Improper Certificate Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| CVE-2021-22884 |  | 
| Out-of-bounds Write |  | 
| Integer Underflow |  | 
| HTTP Request Smuggling |  | 
| CVE-2025-23085 |  | 
| CVE-2023-32002 |  | 
| Use After Free |  | 
| CVE-2023-32559 |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Information Exposure |  | 
| Out-of-bounds Write |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Improper Enforcement of Message or Data Structure |  | 
| CVE-2024-22018 |  | 
| Improper Input Validation |  | 
| HTTP Request Smuggling |  | 
| Use of Insufficiently Random Values |  | 
| Information Exposure |  | 
| CVE-2024-27982 |  | 
| CVE-2024-27983 |  | 
| CVE-2019-15606 |  | 
| Inefficient Regular Expression Complexity |  | 
| Improper Certificate Validation |  | 
| Buffer Overflow |  | 
| CVE-2023-32006 |  | 
| HTTP Request Smuggling |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| CVE-2023-39333 |  | 
| Improper Input Validation |  | 
| Symlink Following |  | 
| Symlink Following |  | 
| Resource Exhaustion |  | 
| HTTP Request Smuggling |  | 
| Directory Traversal |  | 
| Resource Exhaustion |  | 
| Directory Traversal |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Buffer Overflow |  | 
| Resource Exhaustion |  | 
| Improper Input Validation |  | 
| Directory Traversal |  | 
| Resource Exhaustion |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  |