| Resource Exhaustion | |
| Improper Certificate Validation | |
| Unprotected Alternate Channel | |
| Reversible One-Way Hash | |
| Resource Exhaustion | |
| CVE-2024-21386 | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Resource Exhaustion | |
| CVE-2024-21386 | |
| Resource Exhaustion | |
| Improper Certificate Validation | |
| Unprotected Alternate Channel | |
| Reversible One-Way Hash | |
| CVE-2023-36558 | |
| Arbitrary Code Injection | |
| Resource Exhaustion | |
| CVE-2024-21386 | |
| CVE-2023-36558 | |
| Arbitrary Code Injection | |
| CVE-2023-36558 | |
| Arbitrary Code Injection | |
| Resource Exhaustion | |
| Improper Certificate Validation | |
| Unprotected Alternate Channel | |
| Reversible One-Way Hash | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| CVE-2024-38095 | |
| Resource Exhaustion | |
| CVE-2024-38095 | |
| Resource Exhaustion | |
| CVE-2023-35390 | |
| Resource Exhaustion | |
| CVE-2024-38095 | |
| Race Condition | |
| CVE-2024-38095 | |
| Resource Exhaustion | |
| CVE-2023-35390 | |
| Resource Exhaustion | |
| CVE-2023-35390 | |
| Race Condition | |
| Resource Exhaustion | |
| CVE-2023-33128 | |
| CVE-2023-29337 | |
| CVE-2023-29331 | |
| CVE-2023-24936 | |
| CVE-2023-33128 | |
| CVE-2023-29337 | |
| CVE-2023-29331 | |
| CVE-2023-24936 | |
| Race Condition | |
| Resource Exhaustion | |
| CVE-2024-21386 | |
| Resource Exhaustion | |
| CVE-2024-21386 | |
| Resource Exhaustion | |
| Improper Certificate Validation | |
| Unprotected Alternate Channel | |
| Reversible One-Way Hash | |
| CVE-2023-33128 | |
| CVE-2023-29337 | |
| CVE-2023-29331 | |
| CVE-2023-24936 | |
| Resource Exhaustion | |
| CVE-2024-21386 | |
| CVE-2023-36558 | |
| Arbitrary Code Injection | |
| Resource Exhaustion | |
| Improper Certificate Validation | |
| Unprotected Alternate Channel | |
| Reversible One-Way Hash | |
| Resource Exhaustion | |
| Improper Certificate Validation | |
| Unprotected Alternate Channel | |
| Reversible One-Way Hash | |
| Resource Exhaustion | |
| CVE-2024-21386 | |
| CVE-2023-36558 | |
| Arbitrary Code Injection | |
| CVE-2023-36558 | |
| Arbitrary Code Injection | |
| CVE-2023-36558 | |
| Arbitrary Code Injection | |
| Resource Exhaustion | |
| Improper Certificate Validation | |
| Unprotected Alternate Channel | |
| Reversible One-Way Hash | |
| Resource Exhaustion | |
| Stack-based Buffer Overflow | |
| Resource Exhaustion | |
| Stack-based Buffer Overflow | |
| Resource Exhaustion | |
| CVE-2023-35390 | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| CVE-2023-35390 | |
| Race Condition | |
| Resource Exhaustion | |
| Race Condition | |
| CVE-2023-33128 | |
| CVE-2023-29337 | |
| CVE-2023-29331 | |
| CVE-2023-24936 | |
| CVE-2023-33128 | |
| CVE-2023-29337 | |
| CVE-2023-29331 | |
| CVE-2023-24936 | |
| Resource Exhaustion | |
| CVE-2023-35390 | |
| Race Condition | |
| CVE-2023-33128 | |
| CVE-2023-29337 | |
| CVE-2023-29331 | |
| CVE-2023-24936 | |
| Resource Exhaustion | |
| CVE-2023-35390 | |
| Stack-based Buffer Overflow | |
| CVE-2023-33128 | |
| CVE-2023-29337 | |
| CVE-2023-29331 | |
| CVE-2023-24936 | |
| Information Exposure Through Caching | |
| Race Condition | |
| Information Exposure Through Caching | |
| XML External Entity (XXE) Injection | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Information Exposure Through Caching | |
| XML External Entity (XXE) Injection | |
| Stack-based Buffer Overflow | |
| Improper Cross-boundary Removal of Sensitive Data | |
| XML External Entity (XXE) Injection | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Information Exposure Through Caching | |
| Resource Exhaustion | |
| Information Exposure Through Caching | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| XML External Entity (XXE) Injection | |
| Information Exposure Through Caching | |
| XML External Entity (XXE) Injection | |
| Information Exposure Through Caching | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Incorrect Behavior Order: Early Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Allocation of Resources Without Limits or Throttling | |
| Incorrect Behavior Order: Early Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Allocation of Resources Without Limits or Throttling | |
| Incorrect Behavior Order: Early Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| XML External Entity (XXE) Injection | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Exposure of Private Information ('Privacy Violation') | |
| XML External Entity (XXE) Injection | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Incorrect Behavior Order: Early Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Allocation of Resources Without Limits or Throttling | |
| Exposure of Private Information ('Privacy Violation') | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| CVE-2024-38095 | |
| CVE-2024-38095 | |
| CVE-2024-38095 | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Incorrect Behavior Order: Early Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Allocation of Resources Without Limits or Throttling | |
| Incorrect Behavior Order: Early Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Allocation of Resources Without Limits or Throttling | |
| Incorrect Behavior Order: Early Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Allocation of Resources Without Limits or Throttling | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Cross-site Scripting (XSS) | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| Algorithmic Complexity | |
| CVE-2024-38095 | |
| Resource Exhaustion | |
| CVE-2024-21386 | |
| Resource Exhaustion | |
| CVE-2023-36558 | |
| Arbitrary Code Injection | |
| Resource Exhaustion | |
| Improper Certificate Validation | |
| Unprotected Alternate Channel | |
| Reversible One-Way Hash | |
| Resource Exhaustion | |
| Race Condition | |
| Resource Exhaustion | |
| CVE-2023-35390 | |
| CVE-2023-33128 | |
| CVE-2023-29337 | |
| CVE-2023-29331 | |
| CVE-2023-24936 | |
| Stack-based Buffer Overflow | |
| Resource Exhaustion | |
| Information Exposure Through Caching | |
| XML External Entity (XXE) Injection | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Incorrect Behavior Order: Early Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Allocation of Resources Without Limits or Throttling | |
| Exposure of Private Information ('Privacy Violation') | |
| CVE-2024-38095 | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| CVE-2024-21386 | |
| Resource Exhaustion | |
| Unprotected Alternate Channel | |
| Improper Certificate Validation | |
| CVE-2023-36558 | |
| Arbitrary Code Injection | |
| Reversible One-Way Hash | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| CVE-2023-35390 | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| Race Condition | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-33128 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29337 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-29331 | |
| CVE-2023-24936 | |
| CVE-2023-24936 | |
| CVE-2023-24936 | |
| CVE-2023-24936 | |
| Inefficient Regular Expression Complexity | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Information Exposure Through Caching | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| Open Redirect | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Exposure of Private Information ('Privacy Violation') | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Incorrect Behavior Order: Early Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |