|
Improper Input Validation
| |
|
Information Exposure Through Log Files
| |
|
Misinterpretation of Input
| |
|
Improper Validation of Integrity Check Value
| |
|
Memory Leak
| |
|
Race Condition
| |
|
Improper Handling of Highly Compressed Data (Data Amplification)
| |
|
SQL Injection
| |
|
SQL Injection
| |
|
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
|
Arbitrary Code Injection
| |
|
Improper Input Validation
| |
|
Misinterpretation of Input
| |
|
Improper Input Validation
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Resource Exhaustion
| |
|
CVE-2023-39321
| |
|
Cross-site Scripting (XSS)
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Cross-site Scripting (XSS)
| |
|
Cross-site Scripting (XSS)
| |
|
Resource Exhaustion
| |
|
HTTP Response Splitting
| |
|
Improper Handling of Unicode Encoding
| |
|
Improper Handling of Unicode Encoding
| |
|
Improper Handling of Unicode Encoding
| |
|
Resource Exhaustion
| |
|
Arbitrary Code Injection
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
HTTP Request Smuggling
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Algorithmic Complexity
| |
|
CVE-2022-41715
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
HTTP Request Smuggling
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Information Exposure
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
HTTP Request Smuggling
| |
|
Improper Input Validation
| |