| Improper Removal of Sensitive Information Before Storage or Transfer | <6.6.10.7>=6.7.0.0, <6.7.3.1 |
| Directory Traversal | <6.6.10.7>=6.7.0.0, <6.7.3.1 |
| Missing Authorization | <6.6.10.7>=6.7.0.0, <6.7.3.1 |
| Incorrect Authorization | <6.6.10.7>=6.7.0.0, <6.7.3.1 |
| Server-side Request Forgery (SSRF) | <6.6.10.7>=6.7.0.0-dev, <6.7.3.1 |
| Insecure Default Initialization of Resource | <6.6.10.3>=6.7.0.0-rc1, <6.7.0.0-rc2 |
| SQL Injection | <6.6.10.3>=6.7.0.0-rc1, <6.7.0.0-rc2 |
| Information Exposure | <6.5.8.17>=6.6.0.0, <6.6.10.3>=6.7.0.0-rc1, <6.7.0.0-rc2 |
| Access Control Bypass | <6.5.8.17>=6.6.0.0, <6.6.10.3>=6.7.0.0-rc1, <6.7.0.0-rc2 |
| Improper Input Validation | <6.5.8.17>=6.6.0.0, <6.6.10.3>=6.7.0.0-rc1, <6.7.0.0-rc2 |
| Server-Side Template Injection | <6.5.8.13>=6.6.0.0, <6.6.5.1 |
| Server-Side Template Injection | <6.5.8.13>=6.6.0.0, <6.6.5.1 |
| SQL Injection | <6.5.8.13>=6.6.0.0, <6.6.5.1 |
| Improper Preservation of Permissions | <6.5.8.13>=6.6.0.0, <6.6.5.1 |
| Insufficient Session Expiration | >=6.3.5.0, <6.5.8.8>=6.6.0.0, <6.6.1.0 |
| SQL Injection | |
| Improper Access Control | |
| Incomplete List of Disallowed Inputs | |
| Arbitrary Code Execution | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| Improper Access Control | |
| Server-side Request Forgery (SSRF) | |
| Cross-site Scripting (XSS) | |
| Improper Access Control | |
| Webcache Poisoning | |
| Server-side Request Forgery (SSRF) | |
| Improper Input Validation | |
| Command Injection | |
| Access Restriction Bypass | |
| Privilege Escalation | |
| Information Exposure | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Information Exposure | |
| Information Exposure | |
| Privilege Escalation | |
| Information Exposure | |
| Server-side Request Forgery (SSRF) | |
| XML External Entity (XXE) Injection | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |