| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | <1.3.9>=2.0.0, <2.1.3>=2.2.0, <2.2.3 |
| Cross-site Scripting (XSS) | <1.3.8>=2.0.0, <2.1.2>=2.2.0, <2.2.2 |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | <1.3.9>=2.1.0, <2.1.3>=2.2.0, <2.2.3 |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Missing Authorization | |
| Insecure Storage of Sensitive Information | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Incorrect Authorization | |
| CSV Injection | |
| Incorrect Authorization | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Command Injection | |
| SQL Injection | |
| Incorrect Authorization | |
| Cross-site Request Forgery (CSRF) | <1.3.11>=2.0.0, <2.3.3>=2.4.0, <2.4.1 |
| Weak Password Recovery Mechanism for Forgotten Password | >=1.3.0-rc.2, <1.3.10>=2.0.0, <2.2.4>=2.3.0, <2.3.1 |
| Insecure Direct Object References | |
| Cross-site Scripting (XSS) | |
| Authentication Bypass Using an Alternate Path or Channel | |
| Exposure of Sensitive Information to an Unauthorized Actor | |
| Cross-site Scripting | |
| Authentication Bypass | |
| Information Exposure | |
| Information Exposure | |