| Information Exposure | |
| Authentication Bypass by Primary Weakness | |
| Improper Certificate Validation | |
| Information Exposure | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improperly Implemented Security Check for Standard | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Information Exposure | |
| Authentication Bypass by Primary Weakness | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improper Certificate Validation | |
| Authentication Bypass by Primary Weakness | |
| Improperly Implemented Security Check for Standard | |
| Improper Certificate Validation | |
| Information Exposure | |
| Authentication Bypass by Primary Weakness | |
| Improper Certificate Validation | |
| Improperly Implemented Security Check for Standard | |
| Improper Certificate Validation | |
| Information Exposure | |
| Improper Certificate Validation | |
| Authentication Bypass by Primary Weakness | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Creation of Temporary File in Directory with Incorrect Permissions | |
| Directory Traversal | |
| Creation of Temporary File in Directory with Incorrect Permissions | |
| Creation of Temporary File in Directory with Incorrect Permissions | |
| Creation of Temporary File in Directory with Incorrect Permissions | |
| Creation of Temporary File in Directory with Incorrect Permissions | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Arbitrary Argument Injection | |
| Arbitrary Argument Injection | |
| Arbitrary Argument Injection | |
| Arbitrary Argument Injection | |
| Arbitrary Argument Injection | |
| CVE-2026-0858 | |
| CVE-2026-0858 | |
| CVE-2026-0858 | |
| CVE-2026-0858 | |
| CVE-2026-0858 | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Link Following | |
| Incomplete Blacklist | |
| Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element | |
| Incomplete Blacklist | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Link Following | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Incomplete Blacklist | |
| Link Following | |
| Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element | |
| Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element | |
| Link Following | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Incomplete Blacklist | |
| Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element | |
| Link Following | |
| Incomplete Blacklist | |
| Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Allocation of Resources Without Limits or Throttling | |
| HTTP Request Smuggling | |
| Logging of Excessive Data | |
| HTTP Request Smuggling | |
| Logging of Excessive Data | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Directory Traversal | |
| Allocation of Resources Without Limits or Throttling | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Allocation of Resources Without Limits or Throttling | |
| Directory Traversal | |
| HTTP Request Smuggling | |
| Logging of Excessive Data | |
| Logging of Excessive Data | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| HTTP Request Smuggling | |
| Directory Traversal | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Allocation of Resources Without Limits or Throttling | |
| Directory Traversal | |
| HTTP Request Smuggling | |
| Logging of Excessive Data | |
| HTTP Request Smuggling | |
| Directory Traversal | |
| HTTP Request Smuggling | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| HTTP Request Smuggling | |
| Time-of-check Time-of-use (TOCTOU) | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| Time-of-check Time-of-use (TOCTOU) | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| Improper Authentication | |
| Improper Authentication | |
| Protection Mechanism Failure | |
| Protection Mechanism Failure | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Protection Mechanism Failure | |
| Protection Mechanism Failure | |
| Time-of-check Time-of-use (TOCTOU) | |
| Protection Mechanism Failure | |
| Inefficient Regular Expression Complexity | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Missing Reference to Active Allocated Resource | |
| Missing Reference to Active Allocated Resource | |
| Missing Reference to Active Allocated Resource | |
| Missing Reference to Active Allocated Resource | |
| Missing Reference to Active Allocated Resource | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Open Redirect | |
| Open Redirect | |
| Open Redirect | |
| Open Redirect | |
| Open Redirect | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Expired Pointer Dereference | |
| Expired Pointer Dereference | |
| Expired Pointer Dereference | |
| Expired Pointer Dereference | |
| Expired Pointer Dereference | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |