| Deserialization of Untrusted Data | |
| Denial of Service (DoS) | |
| Directory Traversal | >=2.7.6, <2.7.9>=3.0.0, <3.0.3 |
| Arbitrary Code Injection | >=2.6.0, <2.7.9>=3.0.0, <3.0.2 |
| Arbitrary Code Injection | >=2.6.0, <2.7.9>=3.0.0, <3.0.3 |
| Arbitrary Code Injection | >=2.6.0, <2.7.9>=3.0.0, <3.0.3 |
| Man-in-the-Middle (MitM) | |
| Arbitrary Code Execution | |
| Directory Traversal | |
| Arbitrary Code Injection | |
| Denial of Service (DoS) | |
| Improper Verification of Cryptographic Signature | |
| Man-in-the-Middle (MitM) | |
| Out-of-Bounds | |
| Regular Expression Denial of Service (ReDoS) | <1.8.23.2>=1.8.24, <1.8.27>=2.0.0, <2.0.10>=2.1.0, <2.1.5 |
| Directory Traversal | |
| Improper Input Validation | |
| Man-in-the-Middle (MitM) | |
| Arbitrary Code Execution | |
| Deserialization of Untrusted Data | |
| Infinite Loop | |
| DNS Hijack Attack | >=2.0.0, <2.0.17>=2.2.0, <2.2.5>=2.4.0, <2.4.8 |
| Cross-site Scripting (XSS) | |