Cryptographic Issues | |
Improper Input Validation | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Improper Input Validation | |
Cryptographic Issues | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Link Following | |
CVE-2009-4492 | |
Numeric Errors | |
Numeric Errors | |
Improper Authentication | |
Resource Management Errors | |
Access Restriction Bypass | |
Resource Management Errors | |
Improper Input Validation | |
Directory Traversal | |
Improper Authentication | |
Improper Input Validation | |
Resource Management Errors | |
Numeric Errors | |
Integer Overflow or Wraparound | |
Resource Management Errors | |
Numeric Errors | |
Numeric Errors | |
Numeric Errors | |
Improper Authentication | |
Improper Authentication | |
CVE-2007-1558 | |