Use of Uninitialized Variable
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Insufficient Compartmentalization
| |
Insufficiently Protected Credentials
| |
Missing Required Cryptographic Step
| |
Missing Required Cryptographic Step
| |
Missing Required Cryptographic Step
| |
Improper Input Validation
| |
Authentication Bypass
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Misinterpretation of Input
| |
Improper Input Validation
| |
Arbitrary Code Injection
| |
Improper Input Validation
| |
Information Exposure
| |
Resource Exhaustion
| |
Information Exposure
| |
Allocation of Resources Without Limits or Throttling
| |
CVE-2023-39321
| |
Cross-site Scripting (XSS)
| |
Allocation of Resources Without Limits or Throttling
| |
Cross-site Scripting (XSS)
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Inefficient Regular Expression Complexity
| |
Resource Exhaustion
| |
Information Exposure
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Arbitrary Code Injection
| |
Resource Exhaustion
| |
Inefficient Regular Expression Complexity
| |
Inefficient Regular Expression Complexity
| |
Inefficient Regular Expression Complexity
| |
Resource Exhaustion
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
External Control of Assumed-Immutable Web Parameter
| |
Allocation of Resources Without Limits or Throttling
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Incorrect Implementation of Authentication Algorithm
| |
Information Exposure
| |
Inefficient Regular Expression Complexity
| |
CVE-2022-39201
| |
Insufficiently Protected Credentials
| |
Improper Verification of Cryptographic Signature
| |
Authentication Bypass
| |
Inefficient Regular Expression Complexity
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Inefficient Regular Expression Complexity
| |
Resource Exhaustion
| |
Directory Traversal
| |
Open Redirect
| |
Insufficient Entropy
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Arbitrary Argument Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Incorrect Permission Assignment for Critical Resource
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Incorrect Permission Assignment for Critical Resource
| |
Cross-site Scripting (XSS)
| |
Server-Side Request Forgery (SSRF)
| |
Improper Access Control
| |
Improper Certificate Validation
| |