| CVE-2025-49643 | |
| CVE-2025-49641 | |
| CVE-2025-27231 | |
| CVE-2025-27236 | |
| CVE-2025-27233 | |
| CVE-2025-27240 | |
| CVE-2025-27234 | |
| CVE-2024-45699 | |
| CVE-2024-36469 | |
| CVE-2024-45700 | |
| CVE-2024-42325 | |
| CVE-2024-36466 | |
| CVE-2024-36464 | |
| CVE-2024-42330 | |
| CVE-2024-36463 | |
| CVE-2024-22117 | |
| CVE-2024-42331 | |
| CVE-2024-42333 | |
| Improper Encoding or Escaping of Output | |
| CVE-2024-36467 | |
| CVE-2024-42327 | |
| Insufficiently Protected Credentials | |
| Arbitrary Code Injection | |
| Arbitrary Command Injection | |
| Arbitrary Code Injection | |
| CVE-2024-36461 | |
| Improper Preservation of Permissions | |
| CVE-2024-22120 | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Arbitrary Code Injection | |
| Improper Check for Unusual or Exceptional Conditions | |
| Arbitrary Code Injection | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Files or Directories Accessible to External Parties | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Validation of Array Index | |
| Cross-site Scripting (XSS) | |
| Out-of-bounds Write | |
| Cross-site Scripting (XSS) | |
| Allocation of Resources Without Limits or Throttling | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Incorrect Authorization | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Authentication | |
| Incorrect Permission Assignment for Critical Resource | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| CVE-2020-11800 | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Inadequate Encryption Strength | |
| Authorization Bypass Through User-Controlled Key | |
| Information Exposure | |
| Open Redirect | |
| SQL Injection | |
| CVE-2017-2825 | |
| Information Exposure | |
| XML External Entity (XXE) Injection | |
| OS Command Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| CVE-2014-1685 | |
| Improper Authentication | |
| Cryptographic Issues | |
| Arbitrary Code Injection | |
| Improper Authentication | |
| Access Restriction Bypass | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| SQL Injection | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| OS Command Injection | |
| SQL Injection | |
| Access Restriction Bypass | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| CVE-2008-1353 | |
| Configuration | |
| CVE-2007-0640 | |
| CVE-2006-6693 | |
| CVE-2006-6692 | |