| OS Command Injection | |
| External Control of File Name or Path | |
| Arbitrary Argument Injection | |
| Link Following | |
| External Control of File Name or Path | |
| Improper Neutralization | |
| Improper Input Validation | |
| Improperly Implemented Security Check for Standard | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| External Control of File Name or Path | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Neutralization | |
| Improper Neutralization | |
| Improper Process Control | |
| Symlink Following | |
| Unrestricted Upload of File with Dangerous Type | |
| Directory Traversal | |
| UNIX Hard Link | |
| ALAS2-2024-2535 | |
| CVE-2023-25652 | |
| Arbitrary Code Injection | |
| Directory Traversal | |
| Resource Leak | |
| Improperly Implemented Security Check for Standard | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| External Control of File Name or Path | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Out-of-bounds Write | |
| Link Following | |
| Uncontrolled Search Path Element | |
| Uncontrolled Search Path Element | |
| Link Following | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| OS Command Injection | |
| CVE-2019-1387 | |
| CVE-2019-1353 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use of Incorrectly-Resolved Name or Reference | |
| CVE-2019-1348 | |
| Improper Input Validation | |
| Untrusted Search Path | |
| Arbitrary Argument Injection | |
| Out-of-bounds Read | |
| Directory Traversal | |