Information Exposure | |
Deserialization of Untrusted Data | |
Exposure of Sensitive Information to an Unauthorized Actor | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Scripting | |
Cross-site Scripting | |
Improper Privilege Management | |
Insecure Permissions | |
SQL Injection | |
Improper Access Control | |
Improper Input Validation | |
Cross-site Scripting (XSS) | <1.7.8.10>=8.0.0, <8.0.5>=8.1.0, <8.1.1 |
Arbitrary Code Execution | <1.7.8.10>=8.0.0, <8.0.5>=8.1.0, <8.1.1 |
Directory Traversal | |
Improper Access Control | |
Arbitrary Code Injection | |
SQL Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Information Exposure | |
SQL Injection | |
Arbitrary Code Injection | |
SQL Injection | |