Unchecked Return Value | |
Improper Input Validation | |
Improper Input Validation | |
CVE-2024-35296 | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
CVE-2023-44487 | |
HTTP Request Smuggling | |
Improper Input Validation | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Improper Check for Unusual or Exceptional Conditions | |
Cross-site Scripting (XSS) | |
Improper Check for Unusual or Exceptional Conditions | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
HTTP Request Smuggling | |
Improper Authentication | |
Improper Input Validation | |
Improper Authentication | |
Improper Input Validation | |
Improper Input Validation | |
Buffer Overflow | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Write | |
Improper Input Validation | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Information Exposure | |
Out-of-Bounds | |
Resource Exhaustion | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Improper Input Validation | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Resource Exhaustion | |
Information Exposure | |
Improper Input Validation | |
Resource Exhaustion | |
Exposure of Resource to Wrong Sphere | |
HTTP Request Smuggling | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-Bounds | |
Improper Access Control | |
CVE-2015-5206 | |
CVE-2015-5168 | |
Improper Input Validation | |
Resource Management Errors | |
Out-of-Bounds | |
CVE-2014-3525 | |
Out-of-Bounds | |