| Insufficient Granularity of Access Control | |
| Insufficient Granularity of Access Control | |
| Use of Password Hash With Insufficient Computational Effort | |
| Cross-site Request Forgery (CSRF) | |
| Race Condition | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Resource Exhaustion | |
| Arbitrary Code Injection | |
| Information Exposure Through Log Files | |
| Permission Issues | |
| Improper Authorization | <0:4.4.0-14.0.1.el7_3.1.1 |
| Credentials Management | <0:4.4.0-14.0.1.el7_3.1.1 |
| Improper Access Control | |
| Security Features | <0:4.2.0-15.0.1.el7_2.6.1 |
| Cryptographic Issues | <0:4.2.0-15.0.1.el7_2.6.1 |
| Security Features | <0:4.2.0-15.0.1.el7_2.6.1 |
| Security Features | <0:4.2.0-15.0.1.el7_2.6.1 |
| Security Features | <0:4.2.0-15.0.1.el7_2.6.1 |
| CVE-2015-5370 | <0:4.2.0-15.0.1.el7_2.6.1 |
| Security Features | <0:4.2.0-15.0.1.el7_2.6.1 |
| Security Features | <0:4.2.0-15.0.1.el7_2.6.1 |