| Deserialization of Untrusted Data | <7.0.56-3+really7.0.100-1+deb8u1 |
| HTTP Request Smuggling | <7.0.56-3+really7.0.100-1 |
| HTTP Request Smuggling | <7.0.56-3+really7.0.100-1 |
| Improper Input Validation | <7.0.56-3+really7.0.100-1 |
| Insufficiently Protected Credentials | |
| Session Fixation | |
| Cross-site Scripting (XSS) | |
| Open Redirect | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Certificate Validation | |
| Insecure Default Initialization of Resource | |
| CVE-2018-1304 | |
| CVE-2018-1305 | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Security Features | |
| Error Handling | |
| Improper Access Control | |
| Information Exposure | |
| Security Features | |
| Access Restriction Bypass | |
| Improper Handling of Exceptional Conditions | |
| Information Exposure | |
| Exposure of Resource to Wrong Sphere | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Link Following | |
| Improper Input Validation | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Input Validation | |
| Improper Access Control | |
| Improper Input Validation | |
| CVE-2015-5346 | |
| Directory Traversal | |
| Directory Traversal | |
| Access Restriction Bypass | |
| Information Exposure | |
| Access Restriction Bypass | |
| Cross-site Request Forgery (CSRF) | |
| Improper Access Control | |
| Resource Management Errors | |
| Improper Data Handling | |
| Arbitrary Code Injection | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Access Restriction Bypass | |
| Numeric Errors | |
| Access Restriction Bypass | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Authentication | |
| Information Exposure | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| CVE-2012-5568 | |
| Improper Authentication | |
| Access Restriction Bypass | |
| Improper Authentication | |
| Improper Input Validation | |
| Numeric Errors | |
| Information Exposure | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Cryptographic Issues | |
| Improper Authentication | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| CVE-2011-2481 | |
| Improper Input Validation | |
| Information Exposure | |