3 known vulnerabilities · sorted by CVSS score
User’s supplied input (usually a CRLF sequence) can be used to split a returning response into two responses.
Ability to enumerate the Oracle LDAP attributes for the current user by modifying the query used by the application
An authenticated user can supply malicious HTML and JavaScript code that will be executed in the client browser.