Improper Validation of Specified Type of Input | |
Unquoted Search Path or Element | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Resource Exhaustion | |
Inefficient Regular Expression Complexity | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Expected Behavior Violation | |
CVE-2024-6923 | |
Race Condition | |
Symlink Following | |
Symlink Following | |
Symlink Following | |
Multiple Interpretations of UI Input | |
Symlink Following | |
Multiple Interpretations of UI Input | |
Symlink Following | |
Multiple Interpretations of UI Input | |
Symlink Following | |
Symlink Following | |
Expected Behavior Violation | |
Multiple Interpretations of UI Input | |
Symlink Following | |
Multiple Interpretations of UI Input | |
Symlink Following | |
Multiple Interpretations of UI Input | |
Symlink Following | |
Multiple Interpretations of UI Input | |
Symlink Following | |
Symlink Following | |
Multiple Interpretations of UI Input | |
Improper Input Validation | |
Resource Exhaustion | |
Use After Free | |
Improper Input Validation | |
Resource Exhaustion | |
Use After Free | |
Improper Input Validation | |
Resource Exhaustion | |
Use After Free | |
Improper Input Validation | |
Resource Exhaustion | |
Use After Free | |
Improper Input Validation | |
Resource Exhaustion | |
Use After Free | |
Resource Exhaustion | |
Incorrect Type Conversion or Cast | |
Directory Traversal | |
Improper Input Validation | |
Resource Exhaustion | |
Use After Free | |
Resource Exhaustion | |
Incorrect Type Conversion or Cast | |
Directory Traversal | |
Improper Input Validation | |
Resource Exhaustion | |
Use After Free | |
Resource Exhaustion | |
Incorrect Type Conversion or Cast | |
Directory Traversal | |
Improper Input Validation | |
Resource Exhaustion | |
Use After Free | |
Resource Exhaustion | |
Incorrect Type Conversion or Cast | |
Directory Traversal | |
Resource Exhaustion | |
Use After Free | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Uncontrolled Recursion | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Directory Traversal | |
Incorrect Type Conversion or Cast | |
Incorrect Type Conversion or Cast | |
Incorrect Type Conversion or Cast | |
Incorrect Type Conversion or Cast | |
Incorrect Type Conversion or Cast | |
Open Redirect | |
Open Redirect | |
Open Redirect | |
Open Redirect | |
Open Redirect | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Unchecked Return Value | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Buffer Overflow | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Eval Injection | |
Eval Injection | |
Eval Injection | |
Eval Injection | |
Eval Injection | |
Eval Injection | |
Eval Injection | |
Eval Injection | |
Eval Injection | |
Eval Injection | |
Eval Injection | |
Eval Injection | |
Eval Injection | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
Exposed Dangerous Method or Function | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Encoding Error | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Improper Handling of Highly Compressed Data (Data Amplification) | |