296,147
Total vulnerabilities in the database
Unconventional URL paths would allow direct access to prefixed actions without setting the correct request parameters.
Software | From | Fixed in |
---|---|---|
![]() |
2.0.0 | 2.0.99 |
![]() |
2.1.0 | 2.1.99 |
![]() |
2.2.0 | 2.2.99 |
![]() |
2.3.0 | 2.3.99 |
![]() |
2.4.0 | 2.4.99 |
![]() |
2.5.0 | 2.5.9 |
![]() |
2.6.0 | 2.6.11 |
![]() |
2.7.0 | 2.7.2 |