CVE-2024-25641
| |
CVE-2024-27082
| |
CVE-2024-29894
| |
CVE-2024-34340
| |
CVE-2024-31445
| |
CVE-2024-31443
| |
CVE-2024-31460
| |
CVE-2024-31459
| |
CVE-2024-31444
| |
CVE-2024-31458
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
PHP Remote File Inclusion
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Deserialization of Untrusted Data
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Open Redirect
| |
SQL Injection
| |
Improper Input Validation
| |
OS Command Injection
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Incorrect Authorization
| |
Cross-site Scripting (XSS)
| |
Authorization Bypass Through User-Controlled Key
| |
OS Command Injection
| |
Improper Authentication
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Request Forgery (CSRF)
| |
Improper Preservation of Permissions
| |
OS Command Injection
| |
OS Command Injection
| |
Cross-site Scripting (XSS)
| |
Improper Input Validation
| |
Out-of-bounds Write
| |
SQL Injection
| |
Authorization Bypass Through User-Controlled Key
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Access Restriction Bypass
| |
Arbitrary Code Injection
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Exposure of Resource to Wrong Sphere
| |
OS Command Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
CVE-2017-12065
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Access Restriction Bypass
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Arbitrary Code Injection
| |
Cross-site Scripting (XSS)
| |
CVE-2014-2328
| |
Cross-site Request Forgery (CSRF)
| |
CVE-2014-2709
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Arbitrary Code Injection
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Improper Input Validation
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
SQL Injection
| |
Access Restriction Bypass
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Information Exposure
| |
Arbitrary Code Injection
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
CVE-2007-3113
| |
CVE-2007-3112
| |
CVE-2006-6799
| |
Cross-site Scripting (XSS)
| |
CVE-2006-0410
| |
SQL Injection
| |
CVE-2006-0147
| |
CVE-2005-2149
| |
CVE-2005-2148
| |
CVE-2005-1524
| |
CVE-2005-1526
| |
CVE-2005-1525
| |
CVE-2004-1736
| |
CVE-2004-1737
| |
CVE-2002-1478
| |
CVE-2002-1477
| |
CVE-2002-1479
| |