| Information Exposure | |
| Deserialization of Untrusted Data | |
| Exposure of Sensitive Information to an Unauthorized Actor | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cross-site Scripting | |
| Cross-site Scripting | |
| Improper Privilege Management | |
| Insecure Permissions | |
| SQL Injection | |
| Improper Access Control | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | <1.7.8.10>=8.0.0, <8.0.5>=8.1.0, <8.1.1 |
| Arbitrary Code Execution | <1.7.8.10>=8.0.0, <8.0.5>=8.1.0, <8.1.1 |
| Directory Traversal | |
| Improper Access Control | |
| Arbitrary Code Injection | |
| SQL Injection | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Information Exposure | |
| SQL Injection | |
| Arbitrary Code Injection | |
| SQL Injection | |