Algorithmic Complexity | |
Algorithmic Complexity | |
Algorithmic Complexity | |
Algorithmic Complexity | |
Algorithmic Complexity | |
Algorithmic Complexity | |
Algorithmic Complexity | |
Algorithmic Complexity | |
Algorithmic Complexity | |
Algorithmic Complexity | |
Use After Free | |
Algorithmic Complexity | |
Algorithmic Complexity | |
Information Exposure | |
CVE-2024-38095 | |
CVE-2024-35264 | |
CVE-2024-30105 | |
Deadlock | |
Out-of-Bounds | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
CVE-2024-21386 | |
Improper Certificate Validation | |
Unprotected Alternate Channel | |
Resource Exhaustion | |
Arbitrary Code Injection | |
CVE-2023-36558 | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
CVE-2023-35390 | |
CVE-2023-35390 | |
CVE-2023-35390 | |
CVE-2023-35390 | |
CVE-2023-35390 | |
CVE-2023-35390 | |
CVE-2023-35390 | |
CVE-2023-35390 | |
CVE-2023-35390 | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
Race Condition | |
CVE-2023-32032 | |
CVE-2023-32032 | |
CVE-2023-32032 | |
CVE-2023-32032 | |
CVE-2023-32032 | |
CVE-2023-33128 | |
CVE-2023-33128 | |
CVE-2023-33128 | |
CVE-2023-33128 | |
CVE-2023-33128 | |
CVE-2023-33128 | |
CVE-2023-33128 | |
CVE-2023-33128 | |
CVE-2023-33128 | |
CVE-2023-29337 | |
CVE-2023-29337 | |
CVE-2023-29337 | |
CVE-2023-29337 | |
CVE-2023-29337 | |
CVE-2023-29337 | |
CVE-2023-29337 | |
CVE-2023-29337 | |
CVE-2023-29337 | |
CVE-2023-29331 | |
CVE-2023-29331 | |
CVE-2023-29331 | |
CVE-2023-29331 | |
CVE-2023-29331 | |
CVE-2023-29331 | |
CVE-2023-29331 | |
CVE-2023-29331 | |
CVE-2023-29331 | |
CVE-2023-24936 | |
CVE-2023-24936 | |
CVE-2023-24936 | |
CVE-2023-24936 | |
CVE-2023-24936 | |
Inefficient Regular Expression Complexity | |
Information Exposure Through Caching | |
Information Exposure Through Caching | |
Information Exposure Through Caching | |
Information Exposure Through Caching | |
Information Exposure Through Caching | |
Information Exposure Through Caching | |
Information Exposure Through Caching | |
Information Exposure Through Caching | |
Information Exposure Through Caching | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Improper Cross-boundary Removal of Sensitive Data | |
Cross-site Scripting (XSS) | |
Exposure of Private Information ('Privacy Violation') | |
Exposure of Private Information ('Privacy Violation') | |
Exposure of Private Information ('Privacy Violation') | |
Exposure of Private Information ('Privacy Violation') | |
Exposure of Private Information ('Privacy Violation') | |
Exposure of Private Information ('Privacy Violation') | |
Exposure of Private Information ('Privacy Violation') | |
Exposure of Private Information ('Privacy Violation') | |
Exposure of Private Information ('Privacy Violation') | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Reliance on Cookies without Validation and Integrity Checking | |
Reliance on Cookies without Validation and Integrity Checking | |
Reliance on Cookies without Validation and Integrity Checking | |
Reliance on Cookies without Validation and Integrity Checking | |
Reliance on Cookies without Validation and Integrity Checking | |
Reliance on Cookies without Validation and Integrity Checking | |
Reliance on Cookies without Validation and Integrity Checking | |
Reliance on Cookies without Validation and Integrity Checking | |
Reliance on Cookies without Validation and Integrity Checking | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Improper Use of Validation Framework | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Use of Validation Framework | |
Improper Handling of Case Sensitivity | |
Information Exposure | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Open Redirect | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Deadlock | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Reliance on Untrusted Inputs in a Security Decision | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |