| SQL Injection | |
| Missing Authorization | |
| Exposure of Sensitive System Information to an Unauthorized Control Sphere | |
| SQL Injection | |
| Incorrect Default Permissions | |
| Improper Authorization | |
| SQL Injection | |
| Improper Authorization | |
| SQL Injection | |
| Arbitrary File Read | |
| Incorrect Authorization | [,3.1.2)[4.0.0rc1,4.0.0rc2) |
| Cross-site Scripting (XSS) | |
| Improper Authorization | |
| Insertion of Sensitive Information into Log File | |
| Improper Authorization | |
| Incorrect Authorization | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Uncontrolled Resource Consumption ('Resource Exhaustion') | |
| SQL Injection | |
| Incorrect Authorization | |
| Allocation of Resources Without Limits or Throttling | |
| Incorrect Default Permissions | |
| Open Redirect | |
| Cross-site Scripting (XSS) | |
| Incorrect Authorization | |
| Information Exposure | |
| Information Exposure | |
| Improper Preservation of Permissions | |
| Improper Input Validation | |
| Deserialization of Untrusted Data | |
| Server-side Request Forgery (SSRF) | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Access Restriction Bypass | |
| Server-side Request Forgery (SSRF) | |
| Information Exposure | |
| Insecure Default Initialization of Resource | |
| Access Restriction Bypass | |
| Open Redirect | |
| Cross-site Request Forgery (CSRF) | |
| Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') | |
| Improper Access Control | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| SQL Injection | |
| Insufficiently Protected Credentials | |
| Improper Output Neutralization for Logs | |
| Improper Output Neutralization for Logs | |
| Insufficiently Protected Credentials | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Open Redirect | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Insecure Defaults | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |