| Expected Behavior Violation | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Improper Authorization | |
| Missing Authentication for Critical Function | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Information Exposure | |
| Missing Release of Resource after Effective Lifetime | |
| Resource Exhaustion | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| CVE-2015-1850 | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Enforcement of Behavioral Workflow | |
| Improper Enforcement of Behavioral Workflow | |
| Information Exposure | <1:18.2.1-0.20190509150817.8e130e2.el7ost |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure Through Log Files | |
| Information Exposure Through Log Files | |
| Open Redirect | |
| Open Redirect | |
| Resource Exhaustion | |
| Files or Directories Accessible to External Parties | |
| Information Exposure | |
| Information Exposure | |