CVE-2024-27983 | |
CVE-2024-27982 | |
Server-Side Request Forgery (SSRF) | |
CVE-2024-22025 | |
CVE-2024-22019 | |
CVE-2023-46809 | |
CVE-2023-44487 | |
Insufficient Verification of Data Authenticity | |
CVE-2023-32559 | |
CVE-2023-32002 | |
CVE-2023-32006 | |
CVE-2023-30590 | |
CVE-2023-30589 | |
CVE-2023-30581 | |
Incorrect Authorization | |
Inefficient Regular Expression Complexity | |
Untrusted Search Path | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
OS Command Injection | |
OS Command Injection | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Information Exposure | |
CVE-2021-44907 | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Information Exposure Through Log Files | |
Buffer Overflow | |
HTTP Request Smuggling | |
NULL Pointer Dereference | |
Resource Exhaustion | |
HTTP Request Smuggling | |
Use After Free | |
CVE-2021-22884 | |
Missing Release of Resource after Effective Lifetime | |
Integer Overflow or Wraparound | |
Improper Certificate Validation | |
NULL Pointer Dereference | |
CVE-2021-27290 | |
Inefficient Regular Expression Complexity | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Out-of-bounds Read | |
Use After Free | |
Improper Input Validation | |
Use After Free | |
Improper Certificate Validation | |
Cross-site Scripting (XSS) | |
Symlink Following | |
Improper Handling of Case Sensitivity | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Inefficient Regular Expression Complexity | |
Directory Traversal | |
Link Following | |
CVE-2021-23343 | |