| Information Exposure | <2.3.1-2~ubuntu16.04.16+esm12 |
| Inefficient Regular Expression Complexity | |
| Resource Exhaustion | |
| HTTP Request Smuggling | <2.3.1-2~ubuntu16.04.16+esm11 |
| CVE-2024-47220 | <2.3.1-2~ubuntu16.04.16+esm11 |
| Improper Cross-boundary Removal of Sensitive Data | <2.3.1-2~ubuntu16.04.16+esm10 |
| Allocation of Resources Without Limits or Throttling | <2.3.1-2~ubuntu16.04.16+esm10 |
| Inefficient Regular Expression Complexity | <2.3.1-2~ubuntu16.04.16+esm10 |
| CVE-2024-27281 | <2.3.1-2~ubuntu16.04.16+esm9 |
| Resource Exhaustion | <2.3.1-2~ubuntu16.04.16+esm11 |
| Resource Exhaustion | <2.3.1-2~ubuntu16.04.16+esm11 |
| CVE-2024-39908 | <2.3.1-2~ubuntu16.04.16+esm11 |
| Inefficient Regular Expression Complexity | <2.3.1-2~ubuntu16.04.16+esm10 |
| CVE-2024-35176 | <2.3.1-2~ubuntu16.04.16+esm11 |
| Inefficient Regular Expression Complexity | <2.3.1-2~ubuntu16.04.16+esm8 |
| Inefficient Regular Expression Complexity | <2.3.1-2~ubuntu16.04.16+esm7 |
| Inefficient Regular Expression Complexity | <2.3.1-2~ubuntu16.04.16+esm7 |
| Arbitrary Code Injection | <2.3.1-2~ubuntu16.04.16+esm4 |
| Out-of-bounds Read | <2.3.1-2~ubuntu16.04.16+esm3 |
| Inefficient Regular Expression Complexity | <2.3.1-2~ubuntu16.04.16+esm2 |
| Reliance on Cookies without Validation and Integrity Checking | <2.3.1-2~ubuntu16.04.16+esm2 |
| Arbitrary Command Injection | <2.3.1-2~ubuntu16.04.16+esm1 |
| Exposure of Resource to Wrong Sphere | <2.3.1-2~ubuntu16.04.16+esm1 |
| Inadequate Encryption Strength | <2.3.1-2~ubuntu16.04.16+esm1 |
| XML External Entity (XXE) Injection | |
| HTTP Request Smuggling | |
| Improper Input Validation | |
| Improper Authentication | |
| Arbitrary Code Injection | |
| CVE-2019-15845 | |
| Arbitrary Code Injection | |
| Directory Traversal | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Argument Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| CVE-2018-16396 | |
| CVE-2018-16395 | |
| Directory Traversal | |
| Directory Traversal | |
| HTTP Response Splitting | |
| Improper Input Validation | |
| Resource Exhaustion | |
| Use of Externally-Controlled Format String | |
| Deserialization of Untrusted Data | |
| Improper Verification of Cryptographic Signature | |
| Link Following | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Directory Traversal | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| OS Command Injection | |
| Deserialization of Untrusted Data | |
| Out-of-Bounds | |
| Improper Authentication | |
| Use of Externally-Controlled Format String | |
| Improper Input Validation | |
| Origin Validation Error | |
| Arbitrary Code Injection | |
| Improper Input Validation | |
| Out-of-Bounds | |
| CRLF Injection | |
| Inadequate Encryption Strength | |