|
CVE-2024-31208
| |
|
CVE-2023-43796
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Improper Authorization
| |
|
Cleartext Storage of Sensitive Information
| |
|
Improper Authentication
| |
|
Incorrect Authorization
| |
|
Information Exposure
| |
|
Improper Input Validation
| |
|
Resource Exhaustion
| |
|
Missing Release of Resource after Effective Lifetime
| |
|
Improper Handling of Exceptional Conditions
| |
|
Uncontrolled Recursion
| |
|
Directory Traversal
| |
|
Information Exposure
| |
|
Information Exposure
| |
|
Resource Exhaustion
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Open Redirect
| |
|
Cross-site Scripting (XSS)
| |
|
Arbitrary Code Injection
| |
|
Resource Exhaustion
| |
|
Open Redirect
| |
|
Resource Exhaustion
| |
|
Arbitrary Code Injection
| |
|
Cross-site Scripting (XSS)
| |
|
Insufficient Verification of Data Authenticity
| |
|
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
| |
|
Key Management Errors
| |
|
Improper Verification of Cryptographic Signature
| |
|
CVE-2018-12423
| |
|
CVE-2018-12291
| |
|
Improper Input Validation
| |