Allocation of Resources Without Limits or Throttling | |
CVE-2023-40339 | |
Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Open Redirect | |
Session Fixation | |
Improper Certificate Validation | |
Missing Authorization | |
Cross-site Scripting (XSS) | |
CVE-2023-32261 | |
Incorrect Permission Assignment for Critical Resource | |
CVE-2023-32262 | |
Missing Authorization | |
Cross-site Request Forgery (CSRF) | |
Files or Directories Accessible to External Parties | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Incorrect Privilege Assignment | |
Uncontrolled Recursion | |
Resource Exhaustion | |
Uncontrolled Recursion | |
Improper Input Validation | |
Directory Traversal | |
Incorrect Privilege Assignment | |
Cross-site Scripting (XSS) | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Reversible One-Way Hash | |
Reversible One-Way Hash | |
Reversible One-Way Hash | |
Creation of Temporary File With Insecure Permissions | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Information Exposure | |
Inappropriate Encoding for Output Context | |
Inappropriate Encoding for Output Context | |
Inappropriate Encoding for Output Context | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Inappropriate Encoding for Output Context | |
Inappropriate Encoding for Output Context | |
Inappropriate Encoding for Output Context | |
Insufficiently Protected Credentials | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Key Exchange without Entity Authentication | |
Key Exchange without Entity Authentication | |
Key Exchange without Entity Authentication | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Interaction Error | |
Interaction Error | |
Files or Directories Accessible to External Parties | |
Files or Directories Accessible to External Parties | |
Files or Directories Accessible to External Parties | |
Files or Directories Accessible to External Parties | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Files or Directories Accessible to External Parties | |
Files or Directories Accessible to External Parties | |
Cross-site Scripting (XSS) | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Cross-site Request Forgery (CSRF) | |
Incorrect Default Permissions | |
Authentication Bypass | |
Authentication Bypass | |
Authentication Bypass | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Server-Side Request Forgery (SSRF) | |
Race Condition | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
Incorrect Behavior Order: Early Validation | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Missing Authorization | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Incorrect Permission Assignment for Critical Resource | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Insufficiently Protected Credentials | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
Incorrect Permission Assignment for Critical Resource | |
Cross-site Request Forgery (CSRF) | |
Missing Authorization | |
Deserialization of Untrusted Data | |
Arbitrary Code Injection | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Improper Input Validation | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |
Improper Certificate Validation | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Information Exposure | |
Improper Input Validation | |
Improper Verification of Cryptographic Signature | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Cross-site Scripting (XSS) | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Improper Input Validation | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Improper Check for Dropped Privileges | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Cross-site Scripting (XSS) | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Missing Authorization | |
Improper Output Neutralization for Logs | |
Improper Validation of Certificate with Host Mismatch | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Missing Authorization | |
Information Exposure | |
Missing Authorization | |
Missing Authorization | |
Directory Traversal | |
Static Code Injection | |
Insufficiently Protected Credentials | |
Cross-site Scripting (XSS) | |
Resource Exhaustion | |
Cross-site Scripting (XSS) | |
Insufficiently Protected Credentials | |
Cross-site Request Forgery (CSRF) | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Improper Access Control | |
Improper Input Validation | |
Incorrect Type Conversion or Cast | |
Deserialization of Untrusted Data | |
CVE-2022-33980 | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
XML External Entity (XXE) Injection | |
Insufficiently Protected Credentials | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Insufficient Resource Pool | |
Insufficient Resource Pool | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Incorrect Authorization | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Arbitrary Code Injection | |
Improper Privilege Management | |
Improper Neutralization | |
Buffer Overflow | |
HTTP Request Smuggling | |
Improper Input Validation | |
Incorrect Authorization | |
Improper Certificate Validation | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Stack-based Buffer Overflow | |
Resource Exhaustion | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Out-of-bounds Write | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Arbitrary Command Injection | |
Arbitrary Command Injection | |
Arbitrary Command Injection | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Information Exposure | |
Resource Exhaustion | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Improper Input Validation | |
Incorrect Default Permissions | |
Improper Cross-boundary Removal of Sensitive Data | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Validation of Certificate with Host Mismatch | |
Incorrect Calculation | |
Incorrect Calculation | |
Improper Certificate Validation | |
Race Condition | |
Race Condition | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Information Exposure | |