| Cross-site Request Forgery (CSRF) | |
| Information Exposure | |
| Remote Code Execution (RCE) | |
| Cross-site Scripting (XSS) | |
| Unauthorized File Access | [,6.0.8)[7.0.0,7.0.6)[8.0.0,8.0.4) |
| Command Injection | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Improper Authentication | |
| Improper Authentication | |
| Remote Code Execution (RCE) | |
| Information Exposure | |
| SQL Injection | |
| Directory Traversal | |
| Cryptographic Issues | |
| Arbitrary Code Execution | |
| Information Exposure | |
| Improper Authentication | |
| Arbitrary Code Execution | |
| Directory Traversal | |
| Insecure Encryption | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Improper Input Validation | [4.0.0,4.0.14)[4.5.0,4.5.9)[5.0.0,5.0.4) |
| Session Fixation | |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Remote Code Execution (RCE) | |
| Arbitrary Code Execution | |
| Access Restriction Bypass | |
| Improper Authentication | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Access Restriction Bypass | |
| Information Exposure | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Cross-site Request Forgery (CSRF) | |
| SQL Injection | |
| Remote Code Execution (RCE) | |
| Arbitrary Code Execution | |
| Insufficiently Protected Credentials | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Arbitrary Code Execution | |
| Improper Access Control | |
| Denial of Service (DoS) | |
| Directory Traversal | |
| Arbitrary Code Execution | |
| Information Exposure | |
| Information Exposure | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Access Control | [9.0.0,9.0.6)[9.1.0,9.1.2) |
| Command Injection | |
| Privilege Escalation | |
| Cross-site Scripting (XSS) | [9.0.0,9.0.6)[9.1.0,9.1.2) |
| Cross-site Scripting (XSS) | [,8.2.11][9.0.0,9.0.10)(9.1.0,9.1.6)[10.0.0,10.0.2) |
| Cross-site Scripting (XSS) | [9.0.0,9.0.6)[9.1.0,9.1.2) |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Improper Authentication | [8.2.0,8.2.9)[9.0.0,9.0.4)[9.1.0,9.1.2) |
| Improper Authentication | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Cross-site Request Forgery (CSRF) | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Insufficiently Protected Credentials | |
| Information Exposure | |
| Access Restriction Bypass | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | [,2.11.2)[4.5.0,4.5.10)[5.0.0,5.0.5) |
| Server-side Request Forgery (SSRF) | |
| Arbitrary Code Injection | [5.0.0,5.0.19)[6.0.0,6.0.7)[7.0.0,7.0.5) |
| Cross-site Scripting (XSS) | |
| Resource Management Errors | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Improper Access Control | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Arbitrary Code Execution | |
| Improper Input Validation | [,7.0.9)[8.0.0,8.0.7)[8.1.0,8.1.2) |
| Directory Traversal | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Privilege Escalation | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Incorrect Authorization | |
| Directory Traversal | |
| Improper Input Validation | |
| Cross-site Request Forgery (CSRF) | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Improper Access Control | [9.0.0,9.0.6)[9.1.0,9.1.2) |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | [4.0.0,4.0.11)[4.5.0,4.5.6) |
| SQL Injection | |
| XML External Entity (XXE) Injection | |
| Access Restriction Bypass | |
| Information Exposure | |
| Access Restriction Bypass | [,7.0.8)[8.0.0,8.0.6)[8.1.0,8.1.1) |
| Access Restriction Bypass | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Insufficiently Protected Credentials | |
| Information Exposure | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| CRLF Injection | |
| Cross-site Scripting (XSS) | |
| Incorrect Authorization | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Access Control | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Improper Access Control | |
| Access Restriction Bypass | |