| Resource Exhaustion | |
| Resource Exhaustion | |
| HTTP Request Smuggling | |
| Detection of Error Condition Without Action | |
| Buffer Under-read | |
| Resource Exhaustion | |
| Covert Timing Channel | |
| Information Exposure | |
| Improper Validation of Integrity Check Value | |
| Arbitrary Code Injection | |
| Resource Exhaustion | |
| Inefficient Regular Expression Complexity | |
| CVE-2023-30589 | |
| CVE-2023-30581 | |
| CVE-2023-30590 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Out-of-bounds Write | |
| Use of Insufficiently Random Values | |
| Resource Exhaustion | |
| Use of Insufficiently Random Values | |
| Untrusted Search Path | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Improper Input Validation | |
| Inefficient Regular Expression Complexity | |
| Resource Exhaustion | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Reliance on Reverse DNS Resolution for a Security-Critical Action | |
| Inefficient Regular Expression Complexity | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Improper Check or Handling of Exceptional Conditions | |
| HTTP Request Smuggling | |
| Open Redirect | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Open Redirect | |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Resource Exhaustion | |
| Link Following | |
| Link Following | |
| Directory Traversal | |
| Directory Traversal | |
| Improper Input Validation | |
| Improper Input Validation | |
| Use After Free | |
| Cross-site Scripting (XSS) | |
| Use After Free | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Improper Input Validation | |
| Resource Exhaustion | |
| Use After Free | |
| HTTP Request Smuggling | |
| Resource Exhaustion | |
| Modification of Assumed-Immutable Data (MAID) | |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | |
| Out-of-Bounds | |
| Resource Exhaustion | |
| Allocation of Resources Without Limits or Throttling | |
| Resource Exhaustion | |
| Out-of-bounds Read | |
| Resource Exhaustion | |