Insertion of Sensitive Information into Log File | |
Improper Restriction of Excessive Authentication Attempts | |
Acceptance of Extraneous Untrusted Data With Trusted Data | |
Improper Preservation of Permissions | [,2.1.0p40)[2.2.0-rc1,2.2.0p23) |
Insertion of Sensitive Information into Log File | [,2.0.0p36)[2.1.0p0,2.1.0p27)[2.2.0b0,2.2.0b7) |
Uncontrolled Search Path Element | |
Cross-Site Request Forgery (CSRF) | |
Improper Neutralization of Delimiters | |
Improper Neutralization of Delimiters | |
Information Exposure | [2.1.0,2.1.0p28)[2.2.0-rc1,2.2.0b8) |
Privilege Escalation | [,1.6.0p29)[2.0.0,2.0.0p25)[2.1.0,2.1.0b10) |
Improper Input Validation | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | [,1.2.4p4)[1.2.54,1.2.5i4) |
Information Exposure | |
Remote Code Execution (RCE) | |
Access Restriction Bypass | |
Remote Code Execution (RCE) | |
Symlink Attack | |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Cross-site Scripting (XSS) | [,1.2.8p25)[1.4.09,1.4.0p9)[1.5.01,1.5.0i1) |