| Insecure Temporary File | |
| Cleartext Transmission of Sensitive Information | |
| HTTP Request Smuggling | |
| Uncontrolled Search Path Element | |
| Cross-site Scripting (XSS) | |
| Authentication Bypass | |
| Cross-site Scripting (XSS) | |
| Improper Privilege Management | |
| Cross-site Scripting (XSS) | |
| Heap-based Buffer Overflow | |
| Creation of Temporary File in Directory with Incorrect Permissions | |
| Buffer Over-read | |
| Heap-based Buffer Overflow | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Use After Free | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Information Exposure | |
| CVE-2024-38095 | |
| CVE-2024-35264 | |
| CVE-2024-30105 | |
| Deadlock | |
| Out-of-Bounds | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| CVE-2024-21386 | |
| Improper Certificate Validation | |
| Unprotected Alternate Channel | |
| Resource Exhaustion | |
| Arbitrary Code Injection | |
| CVE-2023-36558 | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| CVE-2023-32032 | |
| CVE-2023-32032 | |
| CVE-2023-32032 | |
| CVE-2023-32032 | |
| CVE-2023-32032 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-24936 | |
| CVE-2023-24936 | |
| CVE-2023-24936 | |
| CVE-2023-24936 | |
| CVE-2023-24936 | |
| Inefficient Regular Expression Complexity | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Cross-site Scripting (XSS) | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Use of Validation Framework | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Buffer Overflow | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Use of Validation Framework | |
| Improper Handling of Case Sensitivity | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Open Redirect | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Cleartext Transmission of Sensitive Information | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Missing Release of Resource after Effective Lifetime | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Improper Check for Dropped Privileges | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Uncontrolled Recursion | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Deadlock | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |