| Improperly Controlled Modification of Dynamically-Determined Object Attributes | |
| SQL Injection | |
| Incorrect Authorization | |
| Authorization Bypass Through User-Controlled Key | |
| Missing Authorization | |
| Cross-site Request Forgery (CSRF) | |
| Improper Authentication | |
| Open Redirect | |
| LDAP Injection | |
| Missing Authorization | |
| Directory Traversal | |
| Directory Traversal | |
| SQL Injection | |
| Insufficient Session Expiration | |
| Cross-site Scripting (XSS) | |
| Authorization Bypass Through User-Controlled Key | |
| Weak Password Recovery Mechanism for Forgotten Password | |
| Deserialization of Untrusted Data | |
| Authorization Bypass Through User-Controlled Key | |
| Directory Traversal | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| CVE-2025-52576 | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Missing Authorization | |