Deserialization of Untrusted Data | |
Denial of Service (DoS) | |
Directory Traversal | >=2.7.6, <2.7.9>=3.0.0, <3.0.3 |
Arbitrary Code Injection | >=2.6.0, <2.7.9>=3.0.0, <3.0.2 |
Arbitrary Code Injection | >=2.6.0, <2.7.9>=3.0.0, <3.0.3 |
Arbitrary Code Injection | >=2.6.0, <2.7.9>=3.0.0, <3.0.3 |
Man-in-the-Middle (MitM) | |
Infinite Loop | |
Improper Verification of Cryptographic Signature | |
Improper Input Validation | |
Regular Expression Denial of Service (ReDoS) | <1.8.23.2>=1.8.24, <1.8.27>=2.0.0, <2.0.10>=2.1.0, <2.1.5 |
Arbitrary Code Execution | |
Out-of-Bounds | |
Deserialization of Untrusted Data | |
Man-in-the-Middle (MitM) | |
Arbitrary Code Injection | |
Directory Traversal | |
DNS Hijack Attack | >=2.0.0, <2.0.17>=2.2.0, <2.2.5>=2.4.0, <2.4.8 |
Denial of Service (DoS) | |
Arbitrary Code Execution | |
Man-in-the-Middle (MitM) | |
Directory Traversal | |
Cross-site Scripting (XSS) | |