| Cryptographic Issues | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Cryptographic Issues | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Link Following | |
| CVE-2009-4492 | |
| Numeric Errors | |
| Numeric Errors | |
| Improper Authentication | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Improper Input Validation | |
| Directory Traversal | |
| Improper Authentication | |
| Improper Input Validation | |
| Resource Management Errors | |
| Numeric Errors | |
| Integer Overflow or Wraparound | |
| Resource Management Errors | |
| Numeric Errors | |
| Numeric Errors | |
| Numeric Errors | |
| Improper Authentication | |
| Improper Authentication | |
| CVE-2007-1558 | |