| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Denial of Service (DoS) | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Use of GET Request Method With Sensitive Query Strings | |
| Memory Allocation with Excessive Size Value | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Access Control Bypass | |
| Denial of Service (DoS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Arbitrary Command Injection | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Cryptographic Issues | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Insecure Encryption | |
| Incorrect Authorization | |
| Denial of Service (DoS) | [0.14.0,0.14.3)[0.15.0,0.15.2)[0.16.0,0.16.3) |
| Denial of Service (DoS) | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Buffer Overflow | |
| Cryptographic Issues | |
| Cross-site Scripting (XSS) | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| Denial of Service (DoS) | |
| Improper Access Control | |
| Resource Management Errors | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Information Exposure | |
| Resource Management Errors | |
| Denial of Service (DoS) | |
| Resource Management Errors | |
| Information Exposure | |
| Denial of Service (DoS) | |