| Resource Exhaustion |  | 
| Improper Validation of Integrity Check Value |  | 
| Directory Traversal |  | 
| Missing Authorization |  | 
| Protection Mechanism Failure |  | 
| Protection Mechanism Failure |  | 
| Resource Exhaustion |  | 
| Improper Access Control |  | 
| Resource Exhaustion |  | 
| Arbitrary Argument Injection |  | 
| Directory Traversal |  | 
| Cross-site Scripting (XSS) |  | 
| Integer Overflow or Wraparound |  | 
| Integer Overflow or Wraparound |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Creation of Temporary File With Insecure Permissions |  | 
| Creation of Temporary File With Insecure Permissions |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Creation of Temporary File With Insecure Permissions |  | 
| Creation of Temporary File With Insecure Permissions |  | 
| Permissive Regular Expression |  | 
| Permissive Regular Expression |  | 
| Creation of Temporary File With Insecure Permissions |  | 
| Creation of Temporary File With Insecure Permissions |  | 
| Improper Validation of Syntactic Correctness of Input |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Incomplete Cleanup |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Files or Directories Accessible to External Parties |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Resource Exhaustion |  | 
| Deserialization of Untrusted Data |  | 
| Insufficient Verification of Data Authenticity |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Access Control |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Directory Traversal |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| CVE-2015-5319 |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Information Exposure |  | 
| Improper Access Control |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Link Following |  | 
| Access Restriction Bypass |  | 
| Cross-site Scripting (XSS) |  | 
| Information Exposure |  | 
| Improper Authorization |  | 
| Arbitrary Code Injection |  | 
| Directory Traversal |  | 
| Incorrect Authorization |  | 
| Information Exposure |  | 
| Resource Exhaustion |  | 
| Cross-site Scripting (XSS) |  | 
| Null Byte Interaction Error (Poison Null Byte) |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Improper Input Validation |  | 
| Access Restriction Bypass |  | 
| Information Exposure | <0:2.107.3.1525883128-1.el7  | 
| Incorrect Regular Expression | <0:2.235.2.1597220898-1.el7  | 
| Arbitrary Code Injection | <0:2.150.2.1549032159-1.el7  | 
| Arbitrary Code Injection | <0:2.150.2.1549032159-1.el7  | 
| Information Exposure |  | 
| Information Exposure |  | 
| CVE-2016-3726 |  | 
| CVE-2016-3726 |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Access Restriction Bypass |  | 
| Access Restriction Bypass |  | 
| Code |  | 
| Code |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Improper Input Validation | <0:2.89.4.1519670652-1.el7  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authentication |  | 
| Cross-site Scripting (XSS) | <0:2.150.2.1549032159-1.el7  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | <0:2.138.4.1544416383-1.el7  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Improper Authorization | <0:2.89.4.1519670652-1.el7  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion | <0:2.138.4.1544416383-1.el7  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation | <0:2.138.4.1544416383-1.el7  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Link Following |  | 
| Link Following |  | 
| Link Following |  | 
| Link Following |  | 
| Link Following |  | 
| Link Following |  | 
| Link Following |  | 
| Link Following |  | 
| Link Following | <0:2.138.4.1544416383-1.el7  | 
| Link Following |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Deserialization of Untrusted Data | <0:2.204.2.1585048146-1.el7  | 
| Information Exposure | <0:2.138.2.1542054911-1.el7  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation | <0:2.138.2.1542054911-1.el7  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion | <0:2.138.2.1542054911-1.el7  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure | <0:2.138.2.1542054911-1.el7  | 
| Information Exposure |  | 
| Static Code Injection | <0:2.150.2.1549032159-1.el7  | 
| Static Code Injection | <0:2.150.2.1549032159-1.el7  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication | <0:2.138.2.1542054911-1.el7  | 
| Static Code Injection | <0:2.150.2.1549032159-1.el7  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation | <0:2.150.2.1549032159-1.el7  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation | <0:2.150.2.1549032159-1.el7  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Session Fixation |  | 
| Cross-site Scripting (XSS) | <0:2.164.2.1555422716-1.el7  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Static Code Injection | <0:2.150.2.1549032159-1.el7  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication | <0:2.164.2.1555422716-1.el7  | 
| Improper Input Validation | <0:2.138.2.1542054911-1.el7  | 
| Incorrect Privilege Assignment |  | 
| Incorrect Privilege Assignment |  | 
| Incorrect Privilege Assignment |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) | <0:2.138.2.1542054911-1.el7  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal | <0:2.138.2.1542054911-1.el7  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Improper Resource Shutdown or Release |  | 
| Improper Resource Shutdown or Release |  | 
| Information Exposure |  | 
| Improper Resource Shutdown or Release |  | 
| Improper Resource Shutdown or Release |  | 
| Creation of Temporary File With Insecure Permissions |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Link Following | <0:2.319.3.1650348949-1.el7  | 
| Incorrect Behavior Order: Early Validation | <0:2.319.3.1650348949-1.el7  | 
| Incorrect Behavior Order: Early Validation | <0:2.319.3.1650348949-1.el7  | 
| Link Following | <0:2.319.3.1650348949-1.el7  | 
| Link Following | <0:2.319.3.1650348949-1.el7  | 
| Incorrect Behavior Order: Early Validation | <0:2.319.3.1650348949-1.el7  | 
| OS Command Injection | <0:2.319.3.1650348949-1.el7  | 
| Information Exposure | <0:2.319.3.1650348949-1.el7  | 
| Insufficiently Protected Credentials | <0:2.319.3.1650348949-1.el7  | 
| Link Following | <0:2.319.3.1650348949-1.el7  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| OS Command Injection | <0:2.319.3.1650348949-1.el7  | 
| OS Command Injection | <0:2.319.3.1650348949-1.el7  | 
| OS Command Injection | <0:2.319.2.1644411558-1.el7  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| Cross-site Request Forgery (CSRF) | <0:2.319.2.1644411558-1.el7  | 
| Directory Traversal | <0:2.303.3.1637698110-1.el7  | 
| Directory Traversal | <0:2.303.3.1637698110-1.el7  | 
| Directory Traversal | <0:2.303.3.1637698110-1.el7  | 
| Improper Input Validation |  | 
| Incorrect Default Permissions | <0:2.303.3.1637698110-1.el7  | 
| Link Following | <0:2.303.3.1637698110-1.el7  | 
| Session Fixation |  | 
| Incorrect Default Permissions | <0:2.303.3.1637698110-1.el7  | 
| Improper Preservation of Permissions |  | 
| Improper Preservation of Permissions |  | 
| Link Following | <0:2.303.3.1637698110-1.el7  | 
| Directory Traversal | <0:2.303.3.1637698110-1.el7  | 
| Incorrect Authorization | <0:2.303.3.1637698110-1.el7  | 
| Incorrect Default Permissions | <0:2.303.3.1637698110-1.el7  | 
| Directory Traversal | <0:2.303.3.1637698110-1.el7  | 
| Improper Preservation of Permissions | <0:2.303.3.1637698110-1.el7  | 
| Improper Input Validation |  | 
| Incorrect Default Permissions | <0:2.303.3.1637698110-1.el7  | 
| Improper Preservation of Permissions | <0:2.289.1.1624365627-1.el7  | 
| Improper Preservation of Permissions | <0:2.277.3.1623846768-1.el7  | 
| Cross-site Request Forgery (CSRF) | <0:2.277.3.1623846768-1.el7  | 
| Cross-site Request Forgery (CSRF) | <0:2.289.1.1624365627-1.el7  | 
| Directory Traversal |  | 
| Directory Traversal | <0:2.263.3.1612434332-1.el7  | 
| Improper Input Validation | <0:2.263.3.1612434332-1.el7  | 
| Improper Input Validation | <0:2.263.3.1612433584-1.el7  | 
| Improper Check for Dropped Privileges |  | 
| Incorrect Authorization |  | 
| Link Following | <0:2.303.3.1637698110-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.263.3.1612433584-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.263.3.1612434332-1.el7  | 
| Incorrect Authorization | <0:2.263.3.1612433584-1.el7  | 
| Incorrect Authorization | <0:2.263.3.1612434332-1.el7  | 
| XML External Entity (XXE) Injection | <0:2.289.1.1624365627-1.el7  | 
| XML External Entity (XXE) Injection | <0:2.277.3.1623846768-1.el7  | 
| Allocation of Resources Without Limits or Throttling | <0:2.263.3.1612433584-1.el7  | 
| Allocation of Resources Without Limits or Throttling | <0:2.263.3.1612434332-1.el7  | 
| Improper Input Validation | <0:2.263.3.1612434332-1.el7  | 
| Improper Input Validation | <0:2.263.3.1612433584-1.el7  | 
| Improper Preservation of Permissions | <0:2.289.1.1624365627-1.el7  | 
| Improper Preservation of Permissions | <0:2.277.3.1623846768-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.263.3.1612433584-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.263.3.1612434332-1.el7  | 
| Deserialization of Untrusted Data | <0:2.263.3.1612434332-1.el7  | 
| Deserialization of Untrusted Data | <0:2.263.3.1612433584-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.263.3.1612433584-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.263.3.1612434332-1.el7  | 
| Link Following | <0:2.263.3.1612434332-1.el7  | 
| Link Following | <0:2.263.3.1612433584-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.263.3.1612433584-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.263.3.1612434332-1.el7  | 
| Missing Authorization | <0:2.263.3.1612433584-1.el7  | 
| Missing Authorization | <0:2.263.3.1612433584-1.el7  | 
| Information Exposure | <0:2.263.3.1612433584-1.el7  | 
| Missing Authorization | <0:2.263.3.1612433584-1.el7  | 
| Covert Timing Channel | <0:2.263.3.1612433584-1.el7  | 
| Resource Exhaustion | <0:2.235.2.1597220898-1.el7  | 
| Static Code Injection | <0:2.150.2.1549032159-1.el7  | 
| Insufficiently Protected Credentials | <0:2.235.2.1597220898-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.150.2.1549032159-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.150.2.1549032159-1.el7  | 
| Cross-site Request Forgery (CSRF) | <0:2.150.2.1549032159-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.176.3.1568229898-1.el7  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) | <0:2.176.3.1569349414-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.176.3.1569349414-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.176.3.1568229898-1.el7  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Information Exposure | <0:2.176.2.1563461785-1.el7  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure | <0:2.176.2.1563460897-1.el7  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) | <0:2.176.2.1563460897-1.el7  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) | <0:2.176.2.1563461785-1.el7  | 
| Directory Traversal |  | 
| Directory Traversal | <0:2.176.2.1563460897-1.el7  | 
| Directory Traversal | <0:2.176.2.1563461785-1.el7  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600414805-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600415953-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600415514-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600414805-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600415953-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600415514-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600414805-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600415953-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600415514-1.el7  | 
| Integer Overflow or Wraparound |  | 
| API Abuse | <0:2.204.2.1583446818-1.el7  | 
| API Abuse | <0:2.204.2.1580891656-1.el7  | 
| Information Exposure | <0:2.204.2.1583446818-1.el7  | 
| Information Exposure | <0:2.204.2.1580891656-1.el7  | 
| Information Exposure | <0:2.204.2.1583446818-1.el7  | 
| Information Exposure | <0:2.204.2.1580891656-1.el7  | 
| Covert Timing Channel | <0:2.204.2.1583446818-1.el7  | 
| Covert Timing Channel | <0:2.204.2.1580891656-1.el7  | 
| Covert Timing Channel | <0:2.204.2.1583446818-1.el7  | 
| Covert Timing Channel | <0:2.204.2.1580891656-1.el7  | 
| Insufficient Control of Network Message Volume (Network Amplification) | <0:2.204.2.1580891656-1.el7  | 
| Insufficient Control of Network Message Volume (Network Amplification) | <0:2.204.2.1583446818-1.el7  | 
| Authentication Bypass by Primary Weakness | <0:2.204.2.1580891656-1.el7  | 
| Authentication Bypass by Primary Weakness | <0:2.204.2.1583446818-1.el7  | 
| OS Command Injection | <0:2.204.2.1583849753-1.el7  | 
| OS Command Injection | <0:2.204.1.1581951349-1.el7  | 
| OS Command Injection | <0:2.204.1.1581950993-1.el7  | 
| Incorrect Authorization |  | 
| Resource Exhaustion | <0:2.235.5.1600415514-1.el7  | 
| Resource Exhaustion | <0:2.235.2.1597312414-1.el7  | 
| Incomplete Blacklist | <0:2.164.2.1555422716-1.el7  | 
| Insufficiently Protected Credentials | <0:2.164.2.1555422716-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597220898-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597220898-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597220898-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597220898-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600415514-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597312065-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597312414-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597312065-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597312414-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600415514-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597220898-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597312065-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597220898-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600415514-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597312414-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.5.1600415514-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597312414-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597312065-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.235.2.1597220898-1.el7  | 
| XML External Entity (XXE) Injection | <0:2.263.3.1612433584-1.el7  | 
| XML External Entity (XXE) Injection | <0:2.263.3.1612433584-1.el7  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) | <0:2.176.4.1578402941-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.204.1.1578490170-1.el7  | 
| Information Exposure | <0:2.176.4.1578402941-1.el7  | 
| Information Exposure |  | 
| Information Exposure | <0:2.204.1.1578490170-1.el7  | 
| Information Exposure |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) | <0:2.204.1.1578490170-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.176.4.1578402941-1.el7  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) | <0:2.204.1.1578490170-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.176.4.1578402941-1.el7  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) | <0:2.176.4.1578402941-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.204.1.1578490170-1.el7  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) | <0:2.204.1.1578490170-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.176.4.1578402941-1.el7  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Insufficient Resource Pool |  | 
| Insufficient Resource Pool |  | 
| Cross-site Scripting (XSS) | <0:2.222.1.1591349991-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.222.1.1591351066-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.222.1.1591351669-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.222.1.1591349991-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.222.1.1591351066-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.222.1.1591351669-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.222.1.1591351066-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.222.1.1591349991-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.222.1.1591351669-1.el7  | 
| Cross-site Request Forgery (CSRF) | <0:2.222.1.1591351066-1.el7  | 
| Cross-site Request Forgery (CSRF) | <0:2.222.1.1591349991-1.el7  | 
| Cross-site Request Forgery (CSRF) | <0:2.222.1.1591351669-1.el7  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Buffer Overflow |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Out-of-bounds Write |  | 
| Resource Exhaustion | <0:2.319.3.1650348949-1.el7  | 
| Resource Exhaustion |  | 
| Operation on a Resource after Expiration or Release | <0:2.235.5.1600414805-1.el7  | 
| Operation on a Resource after Expiration or Release | <0:2.235.5.1600415514-1.el7  | 
| Operation on a Resource after Expiration or Release | <0:2.235.5.1600415953-1.el7  | 
| Use of Insufficiently Random Values | <0:2.204.1.1578490170-1.el7  | 
| Out-of-bounds Read | <0:2.150.2.1549032159-1.el7  | 
| Resource Exhaustion | <0:2.150.2.1549032159-1.el7  | 
| Out-of-bounds Read | <0:2.150.2.1549032159-1.el7  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Heap-based Buffer Overflow | <0:2.204.1.1581950993-1.el7  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Insecure Temporary File | <0:2.263.3.1612434332-1.el7  | 
| Insecure Temporary File | <0:2.263.3.1612433584-1.el7  | 
| Cross-site Scripting (XSS) | <0:2.204.2.1580891656-1.el7  | 
| Insufficient Session Expiration |  | 
| Information Exposure |  | 
| Resource Exhaustion |  | 
| Incorrect Default Permissions |  | 
| Incorrect Default Permissions |  | 
| Resource Exhaustion | <0:2.289.1.1624365627-1.el7  | 
| Resource Exhaustion | <0:2.277.3.1623846768-1.el7  | 
| Sensitive Information Uncleared Before Release | <0:2.277.3.1623846768-1.el7  | 
| Sensitive Information Uncleared Before Release | <0:2.289.1.1624365627-1.el7  | 
| Insecure Temporary File | <0:2.289.1.1624365627-1.el7  | 
| Insecure Temporary File | <0:2.277.3.1623846768-1.el7  | 
| Insecure Temporary File | <0:2.263.3.1612433584-1.el7  | 
| Insecure Temporary File | <0:2.263.3.1612434332-1.el7  |