Incorrect Implementation of Authentication Algorithm | |
Information Exposure | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Improper Authorization | |
Remote Code Execution (RCE) | |
SQL Injection | |
Improper Access Control | |
SQL Injection | |
Access Control Bypass | |
Access Control Bypass | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Access Control Bypass | |
Improper Privilege Management | |
Incorrect Authorization | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | >=9.4.0, <9.5.12>=10.0.0, <10.0.6 |
Cross-site Scripting (XSS) | >=0.6.0, <9.5.12>=10.0.0, <10.0.6 |
Cross-site Scripting (XSS) | >=0.70, <9.5.12>=10.0.0, <10.0.6 |
SQL Injection | >=9.3.0, <9.5.8>=10.0.0, <10.0.2 |
Cross-site Scripting (XSS) | |
SQL Injection | |
Insecure Permissions | |
Improper Access Control | |
Improper Access Control | |
Insecure Encryption | |