CVE-2024-36466 | |
CVE-2024-36464 | |
CVE-2024-42330 | |
CVE-2024-36463 | |
CVE-2024-22117 | |
CVE-2024-36468 | |
CVE-2024-42331 | |
CVE-2024-42333 | |
CVE-2024-42328 | |
CVE-2024-42329 | |
CVE-2024-42332 | |
CVE-2024-36467 | |
CVE-2024-42327 | |
CVE-2024-42326 | |
CVE-2024-36460 | |
CVE-2024-22123 | |
CVE-2024-22122 | |
CVE-2024-22116 | |
CVE-2024-36461 | |
CVE-2024-22114 | |
CVE-2024-22120 | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Reliance on Cookies without Validation and Integrity Checking | |
Arbitrary Code Injection | |
Improper Check for Unusual or Exceptional Conditions | |
Arbitrary Code Injection | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Files or Directories Accessible to External Parties | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Validation of Array Index | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Allocation of Resources Without Limits or Throttling | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Incorrect Authorization | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Incorrect Permission Assignment for Critical Resource | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
CVE-2020-11800 | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Inadequate Encryption Strength | |
Authorization Bypass Through User-Controlled Key | |
Information Exposure | |
Open Redirect | |
SQL Injection | |
CVE-2017-2825 | |
Information Exposure | |
XML External Entity (XXE) Injection | |
OS Command Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
CVE-2014-1685 | |
Improper Authentication | |
Cryptographic Issues | |
Arbitrary Code Injection | |
Improper Authentication | |
Access Restriction Bypass | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Out-of-Bounds | |
SQL Injection | |
Access Restriction Bypass | |
Out-of-Bounds | |
OS Command Injection | |
CVE-2008-1353 | |
Configuration | |
CVE-2007-0640 | |
CVE-2006-6692 | |
CVE-2006-6693 | |