CVE-2023-44487 | |
Inefficient Regular Expression Complexity | |
Untrusted Search Path | |
OS Command Injection | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
OS Command Injection | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Use After Free | |
Use After Free | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Information Exposure | |
CVE-2021-44907 | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Inefficient Regular Expression Complexity | |
Directory Traversal | |
Link Following | |
CVE-2021-23343 | |
Link Following | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
CVE-2019-9513 | |
Resource Exhaustion | |
Allocation of Resources Without Limits or Throttling | |
Improper Privilege Management | |
Directory Traversal | |
Symlink Following | |
CVE-2019-15606 | |
HTTP Request Smuggling | |
Improper Certificate Validation | |
Integer Overflow or Wraparound | |
Integer Underflow | |
Improper Enforcement of Message or Data Structure | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Buffer Overflow | |
Information Exposure Through Log Files | |
HTTP Request Smuggling | |
Use After Free | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
CVE-2021-22884 | |
Missing Release of Resource after Effective Lifetime | |
Improper Certificate Validation | |
NULL Pointer Dereference | |
CVE-2021-27290 | |
Inefficient Regular Expression Complexity | |
Out-of-bounds Read | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |