|
Improper Input Validation
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Information Exposure Through Log Files
| |
|
Improper Input Validation
| |
|
Improper Validation of Integrity Check Value
| |
|
Memory Leak
| |
|
Improper Privilege Management
| |
|
Improper Handling of Highly Compressed Data (Data Amplification)
| |
|
Resource Exhaustion
| |
|
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Truncation of Security-relevant Information
| |
|
Information Exposure
| |
|
Resource Exhaustion
| |
|
CVE-2023-39321
| |
|
Cross-site Scripting (XSS)
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Cross-site Scripting (XSS)
| |
|
Cross-site Scripting (XSS)
| |
|
Resource Exhaustion
| |
|
HTTP Response Splitting
| |
|
Improper Handling of Unicode Encoding
| |
|
Improper Handling of Unicode Encoding
| |
|
Improper Handling of Unicode Encoding
| |
|
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
|
Resource Exhaustion
| |
|
Arbitrary Code Injection
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Resource Exhaustion
| |
|
Placement of User into Incorrect Group
| |
|
Time-of-check Time-of-use (TOCTOU)
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Link Following
| |
|
Directory Traversal
| |
|
Algorithmic Complexity
| |
|
CVE-2022-41715
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
HTTP Request Smuggling
| |
|
Resource Exhaustion
| |
|
Placement of User into Incorrect Group
| |
|
Placement of User into Incorrect Group
| |
|
Resource Exhaustion
| |
|
Information Exposure
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
Improperly Controlled Sequential Memory Allocation
| |
|
HTTP Request Smuggling
| |
|
Improper Input Validation
| |
|
Insufficient Entropy
| |
|
Use of a Broken or Risky Cryptographic Algorithm
| |
|
Information Exposure
| |
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
|
Improper Input Validation
| |
|
Origin Validation Error
| |
|
Improper Input Validation
| |
|
Improper Locking
| |
|
Improper Validation of Array Index
| |
|
Improper Validation of Array Index
| |