Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Privilege Management | |
Improper Certificate Validation | |
Deserialization of Untrusted Data | |
Code | |
Access Restriction Bypass | |
Link Following | |
CVE-2013-4761 | |
Access Restriction Bypass | |
Improper Input Validation | |
Access Restriction Bypass | |
CVE-2013-2274 | |
CVE-2013-1654 | |
CVE-2013-1640 | |
CVE-2013-1653 | |
Access Restriction Bypass | |
Improper Input Validation | |
CVE-2013-2275 | |
Access Restriction Bypass | |
Directory Traversal | |
Access Restriction Bypass | |
Information Exposure | |
Improper Authentication | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Access Restriction Bypass | |
CVE-2012-1987 | |
Arbitrary Command Injection | |
Directory Traversal | |
Link Following | |
Link Following | |
Access Restriction Bypass | |
Improper Input Validation | |
Link Following | |
Access Restriction Bypass | |