| Directory Traversal | |
| LDAP Injection | |
| SQL Injection | |
| Replay Attack | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Timing Attack | |
| XML External Entity (XXE) Injection | |
| Improper Validation of Syntactic Correctness of Input | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Access Control | |
| Improper Input Validation | |
| Improper Input Validation | |
| Arbitrary Command Injection | |
| Resource Management Errors | |
| Out-of-bounds Read | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Improper Authentication | |
| CVE-2019-11494 | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Directory Traversal | |
| Out-of-Bounds | [,2.2.36.3)[2.3.0,2.3.5.1) |
| Access Restriction Bypass | |
| Directory Traversal | |
| Buffer Overflow | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Improper Authentication | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Certificate Validation | |
| Directory Traversal | |
| Use After Free | |
| Out-of-bounds Read | |
| Improper Input Validation | |
| Information Exposure | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Out-of-bounds Read | |
| Access Restriction Bypass | |
| Improper Certificate Validation | [1.1.0,2.2.36.1)[2.3.0,2.3.4.1) |
| Denial of Service (DoS) | |
| Incorrect Comparison | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Improper Authentication | |
| Access Restriction Bypass | |
| Out-of-bounds Write | [,2.2.36.4)[2.3.0,2.3.7.2) |