Deserialization of Untrusted Data
| |
Denial of Service (DoS)
| |
Directory Traversal
|
>=2.7.6, <2.7.9
>=3.0.0, <3.0.3
|
Arbitrary Code Injection
|
>=2.6.0, <2.7.9
>=3.0.0, <3.0.2
|
Arbitrary Code Injection
|
>=2.6.0, <2.7.9
>=3.0.0, <3.0.3
|
Arbitrary Code Injection
|
>=2.6.0, <2.7.9
>=3.0.0, <3.0.3
|
Man-in-the-Middle (MitM)
| |
Arbitrary Code Execution
| |
Denial of Service (DoS)
| |
Cross-site Scripting (XSS)
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Directory Traversal
| |
Infinite Loop
| |
Man-in-the-Middle (MitM)
| |
DNS Hijack Attack
|
>=2.0.0, <2.0.17
>=2.2.0, <2.2.5
>=2.4.0, <2.4.8
|
Man-in-the-Middle (MitM)
| |
Regular Expression Denial of Service (ReDoS)
|
<1.8.23.2
>=1.8.24, <1.8.27
>=2.0.0, <2.0.10
>=2.1.0, <2.1.5
|
Arbitrary Code Injection
| |
Directory Traversal
| |
Deserialization of Untrusted Data
| |
Arbitrary Code Execution
| |
Improper Verification of Cryptographic Signature
| |