Improper Authorization | |
SQL Injection | |
Cross-site Scripting | |
SQL Injection | |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | |
Cross-Site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Information Exposure | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
Cross-Site Request Forgery (CSRF) | |
Improper Control of Generation of Code ('Code Injection') | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Access Control | |
Cross-site Scripting (XSS) | |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | |
Arbitrary File Upload | |
Remote Code Execution (RCE) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Inadequate Encryption Strength | |
Cross-site Scripting (XSS) | |
Arbitrary File Upload | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Arbitrary Command Injection | |
SQL Injection | |
Privilege Escalation | |
Arbitrary Code Execution | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Access Control Bypass | |
Arbitrary Code Injection | |
Business Logic Error | |
Improper Access Control | |
Business Logic Errors | |
SQL Injection | |
Business Logic Errors | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Improper Access Control | |
Improper Authentication | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Remote Code Execution (RCE) | |
Arbitrary File Upload | |
Privilege Escalation | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Arbitrary File Upload | |
Cross-site Scripting (XSS) | |
Improper Access Control | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Arbitrary Code Execution | |
SQL Injection | |
Cross-site Scripting (XSS) | |
SQL Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |