Use of Uninitialized Variable
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Insufficient Compartmentalization
| |
Insufficiently Protected Credentials
| |
Inefficient Regular Expression Complexity
| |
Improperly Controlled Sequential Memory Allocation
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Improper Input Validation
| |
Information Exposure Through Log Files
| |
Improper Input Validation
| |
Misinterpretation of Input
| |
Resource Exhaustion
| |
Authentication Bypass
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Arbitrary Code Injection
| |
Arbitrary Code Injection
| |
Improper Input Validation
| |
Misinterpretation of Input
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Resource Exhaustion
| |
Information Exposure
| |
Information Exposure
| |
CVE-2023-39321
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Allocation of Resources Without Limits or Throttling
| |
Resource Exhaustion
| |
Insufficient Entropy
| |
Improper Input Validation
| |
Memory Leak
| |
Authorization Bypass Through User-Controlled Key
| |
Directory Traversal
| |