| Deserialization of Untrusted Data | |
| Insufficient Verification of Data Authenticity | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Improper Access Control | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Information Exposure | |
| Information Exposure | |
| CVE-2015-5319 | |
| Cross-site Request Forgery (CSRF) | |
| Information Exposure | |
| Improper Access Control | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Link Following | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Improper Authorization | |
| Arbitrary Code Injection | |
| Directory Traversal | |
| Incorrect Authorization | |
| Information Exposure | |
| Resource Exhaustion | |
| Cross-site Scripting (XSS) | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Improper Authorization | |
| Improper Authorization | |