| Information Exposure | [,1362.1364.v4cf2dc5d8776)[1365.v4778ca_84b_de5,1365.1367.va_3b_b_89f8a_95b_)[1366.vd44b_49a_5c85c,1368.vb_b_402e3547e7) |
| Improper Non-Trusted Input Validation | |
| Creation of Chained Constructor Invocation | |
| Incorrect Permission Assignment for Critical Resource | |
| Incorrect Permission Assignment for Critical Resource | |
| Access Restriction Bypass | |
| Cross-site Request Forgery (CSRF) | |
| Use of Weak Hash | |
| Protection Mechanism Failure | |
| Protection Mechanism Failure | |
| Protection Mechanism Failure | |
| Sandbox Bypass | |
| Cross-site Scripting (XSS) | |
| Sandbox Bypass | |
| Sandbox Bypass | |
| Sandbox Bypass | |
| Sandbox Bypass | |
| Sandbox Bypass | |
| Sandbox Bypass | |
| Sandbox Bypass | |
| Sandbox Bypass | |
| Sandbox Bypass | |
| Arbitrary Code Execution | |
| Arbitrary Code Execution | |
| Sandbox Bypass | |
| Arbitrary Code Execution | |
| Arbitrary File Read | |