| Information Exposure | |
| Authentication Bypass by Primary Weakness | |
| Improper Certificate Validation | |
| Information Exposure | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Improperly Implemented Security Check for Standard | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Information Exposure | |
| Authentication Bypass by Primary Weakness | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Improper Certificate Validation | |
| Authentication Bypass by Primary Weakness | |
| Improperly Implemented Security Check for Standard | |
| Improper Certificate Validation | |
| Information Exposure | |
| Authentication Bypass by Primary Weakness | |
| Improper Certificate Validation | |
| Improperly Implemented Security Check for Standard | |
| Improper Certificate Validation | |
| Information Exposure | |
| Improper Certificate Validation | |
| Authentication Bypass by Primary Weakness | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | |
| CVE-2026-31837 | |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | |
| CVE-2026-31837 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | |
| CVE-2026-31837 | |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | |
| CVE-2026-31837 | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | |
| CVE-2026-31837 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Creation of Temporary File in Directory with Incorrect Permissions | |
| Directory Traversal | |
| Creation of Temporary File in Directory with Incorrect Permissions | |
| Creation of Temporary File in Directory with Incorrect Permissions | |
| Creation of Temporary File in Directory with Incorrect Permissions | |
| Creation of Temporary File in Directory with Incorrect Permissions | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Directory Traversal | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Arbitrary Argument Injection | |
| Arbitrary Argument Injection | |
| Arbitrary Argument Injection | |
| Arbitrary Argument Injection | |
| Arbitrary Argument Injection | |
| CVE-2026-0858 | |
| CVE-2026-0858 | |
| CVE-2026-0858 | |
| CVE-2026-0858 | |
| CVE-2026-0858 | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Link Following | |
| Incomplete Blacklist | |
| Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element | |
| Incomplete Blacklist | |
| Link Following | |
| Incomplete Blacklist | |
| Link Following | |
| Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element | |
| Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element | |
| Link Following | |
| Incomplete Blacklist | |
| Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element | |
| Link Following | |
| Incomplete Blacklist | |
| Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Allocation of Resources Without Limits or Throttling | |
| HTTP Request Smuggling | |
| Logging of Excessive Data | |
| HTTP Request Smuggling | |
| Logging of Excessive Data | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Directory Traversal | |
| Allocation of Resources Without Limits or Throttling | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Allocation of Resources Without Limits or Throttling | |
| Directory Traversal | |
| HTTP Request Smuggling | |
| Logging of Excessive Data | |
| Logging of Excessive Data | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| HTTP Request Smuggling | |
| Directory Traversal | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Allocation of Resources Without Limits or Throttling | |
| Directory Traversal | |
| HTTP Request Smuggling | |
| Logging of Excessive Data | |
| HTTP Request Smuggling | |
| Directory Traversal | |
| HTTP Request Smuggling | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| HTTP Request Smuggling | |
| Time-of-check Time-of-use (TOCTOU) | |
| Inefficient Regular Expression Complexity | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Inefficient Regular Expression Complexity | |
| Time-of-check Time-of-use (TOCTOU) | |
| Excessive Platform Resource Consumption within a Loop | |
| Excessive Platform Resource Consumption within a Loop | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2025-58186 | |
| Allocation of Resources Without Limits or Throttling | |
| Inefficient Regular Expression Complexity | |
| Allocation of Resources Without Limits or Throttling | |
| Inefficient Regular Expression Complexity | |
| Improper Authentication | |
| CVE-2025-58186 | |
| Improper Authentication | |
| Protection Mechanism Failure | |
| CVE-2025-58186 | |
| Allocation of Resources Without Limits or Throttling | |
| Protection Mechanism Failure | |
| Improper Authentication | |
| Improper Authentication | |
| Improper Authentication | |
| Allocation of Resources Without Limits or Throttling | |
| Protection Mechanism Failure | |
| Allocation of Resources Without Limits or Throttling | |
| CVE-2025-58186 | |
| Protection Mechanism Failure | |
| Time-of-check Time-of-use (TOCTOU) | |
| Protection Mechanism Failure | |
| Excessive Platform Resource Consumption within a Loop | |
| Inefficient Regular Expression Complexity | |
| Time-of-check Time-of-use (TOCTOU) | |
| Allocation of Resources Without Limits or Throttling | |
| Excessive Platform Resource Consumption within a Loop | |
| Time-of-check Time-of-use (TOCTOU) | |
| CVE-2025-58186 | |
| Excessive Platform Resource Consumption within a Loop | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Missing Reference to Active Allocated Resource | |
| Missing Reference to Active Allocated Resource | |
| Missing Reference to Active Allocated Resource | |
| Missing Reference to Active Allocated Resource | |
| Missing Reference to Active Allocated Resource | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Uncaught Exception | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Output Neutralization for Logs | |
| Improper Output Neutralization for Logs | |
| Improper Output Neutralization for Logs | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Output Neutralization for Logs | |
| Improper Output Neutralization for Logs | |
| Allocation of Resources Without Limits or Throttling | |
| Open Redirect | |
| Open Redirect | |
| Open Redirect | |
| Open Redirect | |
| Open Redirect | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Expired Pointer Dereference | |
| Expired Pointer Dereference | |
| Expired Pointer Dereference | |
| Expired Pointer Dereference | |
| Expired Pointer Dereference | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Allocation of Resources Without Limits or Throttling | |
| Use of Uninitialized Resource | |
| Use of Uninitialized Resource | |
| Allocation of Resources Without Limits or Throttling | |
| Use of Uninitialized Resource | |
| Allocation of Resources Without Limits or Throttling | |
| Use of Uninitialized Resource | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Use of Uninitialized Resource | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |