CVE-2020-1774 | |
CVE-2020-1772 | |
Insufficient Entropy | |
CVE-2020-1769 | |
Information Exposure | |
CVE-2020-1767 | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Information Exposure | |
CVE-2018-11563 | |
CVE-2019-13458 | |
CVE-2019-12248 | |
Information Exposure | |
XML Injection | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Direct Request ('Forced Browsing') | |
Cross-site Scripting (XSS) | |
CVE-2018-16586 | |
Improper Input Validation | |
CVE-2018-14593 | |
SQL Injection | |
Improper Privilege Management | |
Information Exposure | |
Information Exposure | |
Unrestricted Upload of File with Dangerous Type | |
Information Exposure | |
Information Exposure | |
OS Command Injection | |
Arbitrary Code Injection | |
CVE-2017-15864 | |
Improper Input Validation | |
Improper Privilege Management | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2011-2746 | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Access Restriction Bypass | |
Cryptographic Issues | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Credentials Management | |
Improper Input Validation | |
Access Restriction Bypass | |
Cryptographic Issues | |
Access Restriction Bypass | |
Improper Input Validation | |
Information Exposure | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Cryptographic Issues | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Race Condition | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
OS Command Injection | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
SQL Injection | |
CVE-2008-7220 | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |