Cross-site Scripting (XSS) | |
Improper Authentication | |
Cross-site Scripting (XSS) | |
Insufficiently Protected Credentials | |
Resource Management Errors | |
Resource Management Errors | |
Cross-site Scripting (XSS) | |
Security Features | |
Directory Traversal | |
Arbitrary Code Execution | |
Improper Input Validation | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Cross-site Request Forgery (CSRF) | |
Improper Input Validation | |
XML External Entity (XXE) Injection | |
Information Exposure | |
Access Restriction Bypass | |
Command Injection | |
Cross-site Scripting (XSS) | |
CVE-2015-5184 | |
Improper Certificate Validation | |
Cross-site Scripting (XSS) | |
Improper Authentication | [,2.16.0)[5.15.0,5.15.14)[5.16.0,5.16.1) |
Cross-site Scripting (XSS) | [,5.15.14)[5.16.0,5.16.1) |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Information Exposure | [,2.10.7)[2.11.0,2.11.12)[2.12.0,2.12.4) |
CVE-2015-5183 | |
Improper Authentication | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | [,5.11.4)[5.12.0,5.12.3)[5.13.0,5.13.2) |
Improper Input Validation | |