Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | <1.3.9>=2.0.0, <2.1.3>=2.2.0, <2.2.3 |
Cross-site Scripting (XSS) | <1.3.8>=2.0.0, <2.1.2>=2.2.0, <2.2.2 |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | <1.3.9>=2.1.0, <2.1.3>=2.2.0, <2.2.3 |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Missing Authorization | |
Insecure Storage of Sensitive Information | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Incorrect Authorization | |
CSV Injection | |
Incorrect Authorization | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Command Injection | |
SQL Injection | |
Incorrect Authorization | |
Cross-site Request Forgery (CSRF) | <1.3.11>=2.0.0, <2.3.3>=2.4.0, <2.4.1 |
Weak Password Recovery Mechanism for Forgotten Password | >=1.3.0-rc.2, <1.3.10>=2.0.0, <2.2.4>=2.3.0, <2.3.1 |
Insecure Direct Object References | |
Cross-site Scripting (XSS) | |
Authentication Bypass Using an Alternate Path or Channel | |
Exposure of Sensitive Information to an Unauthorized Actor | |
Cross-site Scripting | |
Authentication Bypass | |
Information Exposure | |
Information Exposure | |