Use of Uninitialized Variable
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Insufficient Compartmentalization
| |
Insufficiently Protected Credentials
| |
Inefficient Regular Expression Complexity
| |
Improperly Controlled Sequential Memory Allocation
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Improper Input Validation
| |
Information Exposure Through Log Files
| |
Improper Input Validation
| |
Misinterpretation of Input
| |
Authentication Bypass
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Authorization Bypass Through User-Controlled Key
| |
Memory Leak
| |
Arbitrary Code Injection
| |
Improper Input Validation
| |
Misinterpretation of Input
| |
Improper Input Validation
| |
Information Exposure
| |
Directory Traversal
| |
Resource Exhaustion
| |
Information Exposure
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
CVE-2023-39321
| |
Cross-site Scripting (XSS)
| |
Allocation of Resources Without Limits or Throttling
| |
Cross-site Scripting (XSS)
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Authentication Bypass by Primary Weakness
| |
Inefficient Regular Expression Complexity
| |
Missing Synchronization
| |
Improper Access Control
| |
Resource Exhaustion
| |
Information Exposure
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Arbitrary Code Injection
| |
Resource Exhaustion
| |
Inefficient Regular Expression Complexity
| |
Inefficient Regular Expression Complexity
| |
Inefficient Regular Expression Complexity
| |
Cross-site Scripting (XSS)
| |
Resource Exhaustion
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
External Control of Assumed-Immutable Web Parameter
| |
Allocation of Resources Without Limits or Throttling
| |
Authentication Bypass by Primary Weakness
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Incorrect Implementation of Authentication Algorithm
| |
Information Exposure
| |
Inefficient Regular Expression Complexity
| |
Improper Authentication
| |
CVE-2022-39201
| |
Insufficiently Protected Credentials
| |
Improper Verification of Cryptographic Signature
| |
CVE-2022-41715
| |
HTTP Request Smuggling
| |
Authentication Bypass
| |
Inefficient Regular Expression Complexity
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Information Exposure
| |
Improper Authentication
| |
Improperly Controlled Sequential Memory Allocation
| |
Improperly Controlled Sequential Memory Allocation
| |
Improperly Controlled Sequential Memory Allocation
| |
Improperly Controlled Sequential Memory Allocation
| |
Improperly Controlled Sequential Memory Allocation
| |
Improperly Controlled Sequential Memory Allocation
| |
Improperly Controlled Sequential Memory Allocation
| |
HTTP Request Smuggling
| |
Directory Traversal
| |
Open Redirect
| |
Insufficient Entropy
| |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| |
Missing Release of Resource after Effective Lifetime
| |
Cross-site Scripting (XSS)
| |
Incorrect Authorization
| |
Cross-site Scripting (XSS)
| |
Cross-site Request Forgery (CSRF)
| |
Information Exposure
| |