CVE-2024-26144 | |
CVE-2023-38037 | |
CVE-2023-28362 | |
CVE-2023-28120 | |
CVE-2023-23913 | |
Inefficient Regular Expression Complexity | |
Inefficient Regular Expression Complexity | |
CVE-2022-44566 | |
Inefficient Regular Expression Complexity | |
Improper Enforcement of Message or Data Structure | |
Deserialization of Untrusted Data | |
Cross-site Scripting (XSS) | <2:5.2.2.1+dfsg-1+deb10u4 |
Cross-site Scripting (XSS) | <2:5.2.2.1+dfsg-1+deb10u4 |
Arbitrary Code Injection | <2:5.2.2.1+dfsg-1+deb10u4 |
Improper Cross-boundary Removal of Sensitive Data | <2:5.2.2.1+dfsg-1+deb10u4 |
Information Exposure | <2:5.2.2.1+dfsg-1+deb10u3 |
CVE-2021-22904 | <2:5.2.2.1+dfsg-1+deb10u3 |
Resource Exhaustion | <2:5.2.2.1+dfsg-1+deb10u3 |
Cross-site Scripting (XSS) | <2:5.2.2.1+dfsg-1+deb10u2 |
Arbitrary Code Injection | |
Deserialization of Untrusted Data | <2:5.2.2.1+dfsg-1+deb10u2 |
Cross-site Request Forgery (CSRF) | <2:5.2.2.1+dfsg-1+deb10u2 |
Unrestricted Upload of File with Dangerous Type | <2:5.2.2.1+dfsg-1+deb10u2 |
Cross-site Request Forgery (CSRF) | <2:5.2.2.1+dfsg-1+deb10u2 |
Deserialization of Untrusted Data | <2:5.2.2.1+dfsg-1+deb10u2 |
Cross-site Scripting (XSS) | <2:5.2.2.1+dfsg-1+deb10u1 |
Improper Input Validation | |
Allocation of Resources Without Limits or Throttling | |
CVE-2019-5418 | |
Deserialization of Untrusted Data | |
CVE-2018-16477 | |
Missing Encryption of Sensitive Data | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
Improper Access Control | |
Cross-site Scripting (XSS) | |
Directory Traversal | |
Improper Input Validation | |
Improper Input Validation | |
Security Features | |
Directory Traversal | |
Resource Management Errors | |
Improper Access Control | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
CVE-2015-3227 | |
Directory Traversal | |
Directory Traversal | |
Access Restriction Bypass | |
SQL Injection | |
SQL Injection | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
CVE-2013-0277 | |
CVE-2013-0333 | |
Access Restriction Bypass | |
Improper Input Validation | |
Information Exposure | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Cross-site Request Forgery (CSRF) | |
SQL Injection | |
Race Condition | |
Information Exposure | |
CVE-2007-5380 | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
CVE-2006-4112 | |