Uncontrolled Recursion | |
Information Exposure | |
Improper Control of Document Type Definition | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Deserialization of Untrusted Data | |
Resource Exhaustion | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Directory Traversal | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Out-of-bounds Write | |
Deserialization of Untrusted Data | |
Files or Directories Accessible to External Parties | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
CVE-2022-33980 | |
CVE-2022-33980 | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Race Condition | |
Race Condition | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Improper Output Neutralization for Logs | |
Improper Output Neutralization for Logs | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Improperly Implemented Security Check for Standard | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Insufficient Entropy | |
Uncontrolled Recursion | |
Uncontrolled Recursion | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Improper Validation of Integrity Check Value | |
Deserialization of Untrusted Data | |
Resource Exhaustion | |
Uncontrolled Recursion | |
Insecure Default Initialization of Resource | |
Improper Verification of Cryptographic Signature | |
Improper Verification of Cryptographic Signature | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Improper Access Control | |
Improper Access Control | |
Trust Boundary Violation | |
Trust Boundary Violation | |
Directory Traversal | |
Directory Traversal | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Plaintext Storage of a Password | |
Plaintext Storage of a Password | |
Improper Output Neutralization for Logs | |
Improper Output Neutralization for Logs | |
Static Code Injection | |
Static Code Injection | |
Static Code Injection | |
Static Code Injection | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Static Code Injection | |
Static Code Injection | |
Static Code Injection | |
Cross-site Scripting (XSS) | |
Improper Check for Dropped Privileges | |
Improper Check for Dropped Privileges | |
Static Code Injection | |
Static Code Injection | |
Static Code Injection | |
Static Code Injection | |
Static Code Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Directory Traversal | |
Interaction Error | |
Cross-site Scripting (XSS) | |
Key Exchange without Entity Authentication | |
Protection Mechanism Failure | |
Information Exposure | |
Information Exposure | |
Missing Authorization | |
Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Exposure of Resource to Wrong Sphere | |
Cross-site Request Forgery (CSRF) | |
Directory Traversal | |
Directory Traversal | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Reversible One-Way Hash | |
Reversible One-Way Hash | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Cross-site Scripting (XSS) | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Missing Authorization | |
Cross-site Request Forgery (CSRF) | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Protection Mechanism Failure | |
Improper Input Validation | |
Inappropriate Encoding for Output Context | |
Open Redirect | |
Open Redirect | |
Session Fixation | |
Session Fixation | |
Information Exposure | |
Inappropriate Encoding for Output Context | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
CVE-2023-40339 | |
CVE-2023-40339 | |
Cross-site Request Forgery (CSRF) | |
Improper Input Validation | |
Arbitrary Argument Injection | |
Directory Traversal | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |