Use of Uninitialized Variable
| |
Improper Input Validation
| |
Improperly Controlled Sequential Memory Allocation
| |
Uncontrolled Recursion
| |
Uncontrolled Recursion
| |
Resource Exhaustion
| |
Improper Input Validation
| |
Allocation of Resources Without Limits or Throttling
| |
Information Exposure Through Log Files
| |
Improper Input Validation
| |
Improper Validation of Integrity Check Value
| |
Memory Leak
| |
Improper Privilege Management
| |
Improper Handling of Highly Compressed Data (Data Amplification)
| |
Resource Exhaustion
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Improper Input Validation
| |
Improper Input Validation
| |
Truncation of Security-relevant Information
| |
Information Exposure
| |
Resource Exhaustion
| |
CVE-2023-39321
| |
Cross-site Scripting (XSS)
| |
Allocation of Resources Without Limits or Throttling
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Resource Exhaustion
| |
HTTP Response Splitting
| |
Improper Handling of Unicode Encoding
| |
Improper Handling of Unicode Encoding
| |
Improper Handling of Unicode Encoding
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Resource Exhaustion
| |
Arbitrary Code Injection
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Resource Exhaustion
| |
Placement of User into Incorrect Group
| |
Time-of-check Time-of-use (TOCTOU)
| |
Allocation of Resources Without Limits or Throttling
| |
Link Following
| |
Directory Traversal
| |
Algorithmic Complexity
| |
CVE-2022-41715
| |
Allocation of Resources Without Limits or Throttling
| |
HTTP Request Smuggling
| |
Resource Exhaustion
| |
Placement of User into Incorrect Group
| |
Placement of User into Incorrect Group
| |
Resource Exhaustion
| |
Information Exposure
| |
Improperly Controlled Sequential Memory Allocation
| |
Improperly Controlled Sequential Memory Allocation
| |
Improperly Controlled Sequential Memory Allocation
| |
Improperly Controlled Sequential Memory Allocation
| |
Improperly Controlled Sequential Memory Allocation
| |
Improperly Controlled Sequential Memory Allocation
| |
HTTP Request Smuggling
| |
Improper Input Validation
| |
Insufficient Entropy
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Information Exposure
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Improper Input Validation
| |
Origin Validation Error
| |
Improper Input Validation
| |
Improper Locking
| |
Improper Validation of Array Index
| |
Improper Validation of Array Index
| |