Cross-site Scripting (XSS) | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2024-25641 | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Insufficient Comparison | |
Cross-site Scripting (XSS) | |
SQL Injection | |
SQL Injection | |
CVE-2024-31459 | |
Cross-site Scripting (XSS) | |
SQL Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
PHP Remote File Inclusion | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Deserialization of Untrusted Data | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Open Redirect | |
SQL Injection | |
Improper Input Validation | |
OS Command Injection | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Incorrect Authorization | |
Cross-site Scripting (XSS) | |
Authorization Bypass Through User-Controlled Key | |
OS Command Injection | |
Improper Authentication | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Request Forgery (CSRF) | |
Improper Preservation of Permissions | |
OS Command Injection | |
OS Command Injection | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Out-of-bounds Write | |
SQL Injection | |
Authorization Bypass Through User-Controlled Key | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Exposure of Resource to Wrong Sphere | |
Information Exposure | |
OS Command Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2017-12065 | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
CVE-2014-2328 | |
CVE-2014-2709 | |
Cross-site Request Forgery (CSRF) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
SQL Injection | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
SQL Injection | |
SQL Injection | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
SQL Injection | |
Information Exposure | |
SQL Injection | |
CVE-2007-3113 | |
CVE-2007-3112 | |
CVE-2006-6799 | |
Cross-site Scripting (XSS) | |
CVE-2006-0410 | |
CVE-2006-0147 | |
SQL Injection | |
CVE-2005-2148 | |
CVE-2005-2149 | |
CVE-2005-1524 | |
CVE-2005-1526 | |
CVE-2005-1525 | |
CVE-2004-1736 | |
CVE-2004-1737 | |
CVE-2002-1479 | |
CVE-2002-1477 | |
CVE-2002-1478 | |