Arbitrary Code Injection | |
SQL Injection | |
OS Command Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2021-21440 | |
Incorrect Authorization | |
CVE-2021-21443 | |
Cross-site Scripting (XSS) | |
Improper Handling of Exceptional Conditions | |
Resource Exhaustion | |
Insufficient Session Expiration | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2020-1774 | |
Cross-site Scripting (XSS) | |
CVE-2020-1772 | |
Insufficient Entropy | |
CVE-2020-1769 | |
Information Exposure | |
CVE-2020-1767 | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Cross-site Scripting (XSS) | |
Information Exposure | |
CVE-2018-11563 | |
CVE-2019-13458 | |
CVE-2019-12248 | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
XML Injection | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Direct Request ('Forced Browsing') | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
CVE-2018-16586 | |
CVE-2018-14593 | |
SQL Injection | |
Improper Privilege Management | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Unrestricted Upload of File with Dangerous Type | |
Information Exposure | |
Information Exposure | |
OS Command Injection | |
Arbitrary Code Injection | |
CVE-2017-15864 | |
Improper Input Validation | |
Improper Privilege Management | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2011-2746 | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Credentials Management | |
Access Restriction Bypass | |
Cryptographic Issues | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Information Exposure | |
Improper Input Validation | |
Access Restriction Bypass | |
Improper Input Validation | |
Access Restriction Bypass | |
Cryptographic Issues | |
Access Restriction Bypass | |
Cryptographic Issues | |
Race Condition | |
Improper Input Validation | |
Access Restriction Bypass | |
Information Exposure | |
OS Command Injection | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
SQL Injection | |
CVE-2008-7220 | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |