CVE-2024-24791 | |
Improper Validation of Integrity Check Value | |
Link Following | |
CVE-2024-24789 | |
Improper Input Validation | |
Directory Traversal | |
Directory Traversal | |
Link Following | |
CVE-2024-34156 | |
CVE-2024-34158 | |
CVE-2024-34155 | |
Cross-site Scripting (XSS) | |
Allocation of Resources Without Limits or Throttling | |
CVE-2023-39321 | |
CVE-2024-24783 | |
Information Exposure Through Log Files | |
CVE-2024-37298 | |
Memory Leak | |
CVE-2024-28180 | |
CVE-2023-45290 | |
CVE-2024-28176 | |
CVE-2024-24786 | |
Link Following | |
CVE-2023-39326 | |
Information Exposure | |
Resource Exhaustion | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Resource Exhaustion | |
Arbitrary Code Injection | |
Allocation of Resources Without Limits or Throttling | |
Interpretation Conflict | |
Incorrect Authorization | |
Allocation of Resources Without Limits or Throttling | |
Integer Overflow or Wraparound | |
CVE-2023-24540 | |
CVE-2022-41723 | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Resource Exhaustion | |
Allocation of Resources Without Limits or Throttling | |
Information Exposure | |
Placement of User into Incorrect Group | |
Placement of User into Incorrect Group | |
CVE-2022-27191 | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Use of Insufficiently Random Values | |
Missing Authorization | |
Improper Locking | |
Improper Certificate Validation | |
Origin Validation Error | |