axios Improperly Controlled Modification of Object Prototype Attributes (Prototype Pollution) Vulnerability
Critical
axios Origin Validation Error Vulnerability
Critical
axios Permissive List of Allowed Inputs Vulnerability
Critical
axios Unintended Proxy or Intermediary (Confused Deputy) Vulnerability
Critical
axios Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability
Critical
axios Server-Side Request Forgery (SSRF) Vulnerability
High
axios Uncontrolled Resource Consumption Vulnerability
High
axios Improperly Controlled Modification of Object Prototype Attributes (Prototype Pollution) Vulnerability
High
axios Improper Neutralization of CRLF Sequences in HTTP Headers (HTTP Request/Response Splitting) Vulnerability
High
axios Server-Side Request Forgery (SSRF) Vulnerability
High
axios Uncontrolled Recursion Vulnerability
High
axios Allocation of Resources Without Limits or Throttling Vulnerability
High
axios Improper Input Validation Vulnerability
High
axios Server-Side Request Forgery (SSRF) Vulnerability
High
axios Improper Check for Unusual or Exceptional Conditions Vulnerability
High
axios Server-Side Request Forgery (SSRF) Vulnerability
Medium
axios Permissive List of Allowed Inputs Vulnerability
Medium
axios Improper Neutralization of CRLF Sequences in HTTP Headers (HTTP Request/Response Splitting) Vulnerability
Medium
axios Uncontrolled Resource Consumption Vulnerability
Medium
axios Cross-Site Request Forgery (CSRF) Vulnerability
Medium
axios Improper Neutralization of CRLF Sequences (CRLF Injection) Vulnerability
Medium
axios Allocation of Resources Without Limits or Throttling Vulnerability
Medium
axios Allocation of Resources Without Limits or Throttling Vulnerability
Medium
axios Improper Authentication Vulnerability
Medium
axios Improper Encoding or Escaping of Output Vulnerability
Low