| CVE-2025-11261 | |
| CVE-2025-61655 | |
| CVE-2025-61656 | |
| CVE-2025-61654 | |
| CVE-2025-61657 | |
| CVE-2025-61639 | |
| CVE-2025-61646 | |
| CVE-2025-61638 | |
| CVE-2025-61652 | |
| CVE-2025-61642 | |
| CVE-2025-61635 | |
| CVE-2025-11175 | |
| CVE-2025-61636 | |
| CVE-2025-61634 | |
| CVE-2025-61641 | |
| CVE-2025-61653 | |
| CVE-2025-11173 | |
| CVE-2025-61643 | |
| CVE-2025-61637 | |
| CVE-2025-61640 | |
| CVE-2025-6591 | |
| CVE-2025-6590 | |
| CVE-2025-6594 | |
| CVE-2025-6589 | |
| CVE-2025-6592 | |
| CVE-2025-6597 | |
| CVE-2025-6596 | |
| CVE-2025-6593 | |
| CVE-2025-6927 | |
| CVE-2025-6595 | |
| CVE-2025-6926 | |
| CVE-2025-32072 | |
| CVE-2025-32696 | |
| CVE-2025-32700 | |
| CVE-2025-32699 | |
| CVE-2025-32698 | |
| CVE-2025-3469 | |
| CVE-2025-32697 | |
| CVE-2024-47913 | |
| CVE-2024-34506 | |
| CVE-2024-34507 | |
| Cross-site Scripting (XSS) | |
| CVE-2023-45359 | |
| CVE-2023-45362 | |
| Cross-site Scripting (XSS) | |
| CVE-2023-45361 | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Incorrect Permission Assignment for Critical Resource | |
| Cross-site Scripting (XSS) | |
| CVE-2023-36674 | |
| Cross-site Scripting (XSS) | |
| CVE-2023-29141 | |
| Inefficient Regular Expression Complexity | |
| Incorrect Permission Assignment for Critical Resource | |
| Information Exposure | |
| CVE-2022-41767 | |
| Cross-site Scripting (XSS) | |
| CVE-2022-34912 | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Information Exposure | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Uncontrolled Recursion | |
| Release of Invalid Pointer or Reference | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Incorrect Default Permissions | |
| Information Exposure | |
| Missing Authorization | |
| CVE-2021-44854 | |
| Improper Check for Unusual or Exceptional Conditions | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Incorrect Authorization | |
| Cross-site Scripting (XSS) | |
| Exposure of Resource to Wrong Sphere | |
| CVE-2021-30159 | |
| Exposure of Resource to Wrong Sphere | |
| Incorrect Permission Assignment for Critical Resource | |
| Cross-site Scripting (XSS) | |
| Missing Authorization | |
| Cross-site Scripting (XSS) | |
| Improper Authentication | |
| Cross-site Scripting (XSS) | |
| CVE-2021-27291 | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Improper Encoding or Escaping of Output | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Restriction of Excessive Authentication Attempts | |
| CVE-2020-25813 | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Improper Encoding or Escaping of Output | |
| Open Redirect | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| CVE-2019-12473 | |
| Cross-site Request Forgery (CSRF) | |
| CVE-2019-12467 | |
| Missing Authorization | |
| Missing Authentication for Critical Function | |
| Missing Authorization | |
| CVE-2019-12472 | |
| CVE-2019-12474 | |
| Cross-site Scripting (XSS) | |
| Improper Privilege Management | |
| Information Exposure Through Log Files | |
| Improper Authentication | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Session Fixation | |
| Improper Input Validation | |
| Use of Hard-coded Credentials | |
| CVE-2017-0371 | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Information Exposure | |
| Exposure of Resource to Wrong Sphere | |
| Improper Input Validation | |
| Open Redirect | |
| Arbitrary Code Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Incorrect Default Permissions | |
| Open Redirect | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2017-8812 | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Access Control | |
| Improper Access Control | |
| Information Exposure | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Improper Access Control | |
| Improper Access Control | |
| Improper Access Control | |
| Cross-site Scripting (XSS) | |
| Improper Access Control | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Credentials Management | |
| Improper Access Control | |
| Information Exposure | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Information Exposure | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cross-site Request Forgery (CSRF) | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Arbitrary Command Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| CVE-2012-5391 | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Authentication | |
| Race Condition | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| CVE-2013-4567 | |
| CVE-2013-4568 | |
| CVE-2013-2114 | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| CVE-2012-4885 | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Incorrect Default Permissions | |
| Information Exposure | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Information Exposure | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| CVE-2007-1054 | |
| Arbitrary Code Injection | |
| CVE-2007-0894 | |
| CVE-2007-0177 | |
| CVE-2006-1498 | |
| CVE-2006-0322 | |
| CVE-2005-4501 | |
| CVE-2005-3165 | |
| CVE-2005-3166 | |
| CVE-2005-3167 | |
| CVE-2005-2396 | |
| CVE-2005-2215 | |
| CVE-2005-1888 | |
| CVE-2005-0536 | |
| CVE-2005-0534 | |
| CVE-2005-1245 | |
| CVE-2005-0535 | |
| CVE-2004-2185 | |
| CVE-2004-1405 | |
| CVE-2004-2152 | |
| CVE-2004-2186 | |
| CVE-2004-2187 | |