| Incorrect Implementation of Authentication Algorithm | |
| Information Exposure | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Improper Authorization | |
| Remote Code Execution (RCE) | |
| SQL Injection | |
| Improper Access Control | |
| SQL Injection | |
| Access Control Bypass | |
| Access Control Bypass | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Access Control Bypass | |
| Improper Privilege Management | |
| Incorrect Authorization | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | >=9.4.0, <9.5.12>=10.0.0, <10.0.6 |
| Cross-site Scripting (XSS) | >=0.6.0, <9.5.12>=10.0.0, <10.0.6 |
| Cross-site Scripting (XSS) | >=0.70, <9.5.12>=10.0.0, <10.0.6 |
| SQL Injection | >=9.3.0, <9.5.8>=10.0.0, <10.0.2 |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Insecure Permissions | |
| Improper Access Control | |
| Improper Access Control | |
| Insecure Encryption | |