Undertow Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Undertow Uncontrolled Resource Consumption Vulnerability
Undertow Uncontrolled Resource Consumption Vulnerability
Undertow Uncontrolled Resource Consumption Vulnerability
Undertow Uncontrolled Resource Consumption Vulnerability
Undertow Unchecked Return Value Vulnerability
Undertow Exposure of Resource to Wrong Sphere Vulnerability
Undertow Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
Jolokia Cross-Site Request Forgery (CSRF) Vulnerability
Grafana Server-Side Request Forgery (SSRF) Vulnerability
Grafana Missing Authentication for Critical Function Vulnerability
Grafana Improper Authentication Vulnerability
Grafana Incorrect Permission Assignment for Critical Resource Vulnerability
Grafana Improper Authentication Vulnerability
Grafana Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Grafana Cross-Site Request Forgery (CSRF) Vulnerability
Grafana URL Redirection to Untrusted Site (Open Redirect) Vulnerability
Grafana Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Grafana Improper Authentication Vulnerability
Grafana Incorrect Authorization Vulnerability
Grafana Insufficiently Protected Credentials Vulnerability
Grafana Improper Verification of Cryptographic Signature Vulnerability
Grafana Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) Vulnerability
Grafana Improper Input Validation Vulnerability
Grafana Exposure of Sensitive Information to an Unauthorized Actor Vulnerability