Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | <8.5.18>=9.0.0RC1, <9.3.3 |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | <8.5.18>=9.0.0RC1, <9.3.3 |
Cross-site Scripting | |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | <8.5.16>=9.0.0RC1, <9.2.8 |
Cross-site Scripting (XSS) | <8.5.16>=9.0.0RC1, <9.2.8 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | <8.5.16>=9.0.0RC1, <9.2.8 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | <8.5.16>=9.0.0RC1, <9.2.8 |
Cross-site Scripting (XSS) | <8.5.16>=9.0.0RC1, <9.2.8 |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Cross-Site Request Forgery (CSRF) | |
Cross-Site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-Site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Incorrect Default Permissions | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Weak Password Requirements | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Sensitive Cookie in HTTPS Session Without "Secure" Attribute | |
Cross-site Scripting (XSS) | |
Authentication Bypass | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | <8.5.10>=9.0.0RC1, <9.1.3 |
Cross-site Scripting (XSS) | <8.5.10>=9.0.0RC1, <9.1.3 |
Cross-site Scripting (XSS) | <8.5.10>=9.0.0RC1, <9.1.3 |
Cross-site Scripting (XSS) | <8.5.10>=9.0.0RC1, <9.1.3 |
Cross-site Scripting (XSS) | <8.5.10>=9.0.0RC1, <9.1.3 |
Information Exposure | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
XML External Entity (XXE) Injection | |
Session Fixation | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Insecure Permissions | |
Access Restriction Bypass | |
Arbitrary Code Execution | |
Server-side Request Forgery (SSRF) | |
Privilege Escalation | |
Access Restriction Bypass | |
Server-side Request Forgery (SSRF) | |
Server-side Request Forgery (SSRF) | |
Open Redirect | |
Improper Input Validation | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Deserialization of Untrusted Data | |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Unrestricted Upload of File with Dangerous Type | |
Improper Input Validation | |
Server Side Request Forgery (SSRF) | |
Information Exposure | |