Improper Authorization | |
Incorrect Authorization | |
Improper Authentication | |
Incorrect Permission Assignment for Critical Resource | |
Authentication Bypass | |
CVE-2022-22934 | |
Exposure of Resource to Wrong Sphere | |
Improper Authentication | |
Arbitrary Command Injection | |
Arbitrary Command Injection | |
Arbitrary Code Injection | |
Insufficient Session Expiration | |
Cleartext Storage of Sensitive Information | |
Arbitrary Code Injection | |
Improper Authentication | |
Directory Traversal | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Arbitrary Command Injection | |
Improper Input Validation | |
CVE-2020-16846 | |
Incorrect Permission Assignment for Critical Resource | |
Improper Input Validation | |
Improper Input Validation | |
Arbitrary Command Injection | |
Improper Authentication | |
Directory Traversal | |
Improper Restriction of Excessive Authentication Attempts | |
CVE-2017-7893 | |
Directory Traversal | |
Improper Input Validation | |
Information Exposure | |
CVE-2017-5200 | |
Improper Authentication | |
Directory Traversal | |
Information Exposure Through Debug Log Files | |
Information Exposure | |
Improper Access Control | |
Improper Authentication | |
Information Exposure | |
Improper Access Control | |
Link Following | |
Improper Input Validation | |
Improper Authentication | |
Access Restriction Bypass | |
CVE-2013-4437 | |
Access Restriction Bypass | |
Arbitrary Code Injection | |