Missing Authentication for Critical Function | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Improper Input Validation | |
Unrestricted Upload of File with Dangerous Type | |
Exposure of System Data to an Unauthorized Control Sphere | |
CVE-2024-31208 | |
CVE-2023-43796 | |
Allocation of Resources Without Limits or Throttling | |
Improper Authorization | |
Cleartext Storage of Sensitive Information | |
Improper Authentication | |
Incorrect Authorization | |
Information Exposure | |
Improper Input Validation | |
Resource Exhaustion | |
Missing Release of Resource after Effective Lifetime | |
Improper Handling of Exceptional Conditions | |
Uncontrolled Recursion | |
Directory Traversal | |
Information Exposure | |
Information Exposure | |
Resource Exhaustion | |
Improper Input Validation | |
Improper Input Validation | |
Open Redirect | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Resource Exhaustion | |
Open Redirect | |
Resource Exhaustion | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Insufficient Verification of Data Authenticity | |
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | |
Key Management Errors | |
Improper Verification of Cryptographic Signature | |
CVE-2018-12423 | |
CVE-2018-12291 | |
Improper Input Validation | |