Improper Authorization
| |
SQL Injection
| |
Cross-site Scripting
| |
SQL Injection
| |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
| |
Cross-Site Request Forgery (CSRF)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Improper Authentication
| |
Information Exposure
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
Cross-Site Request Forgery (CSRF)
| |
Improper Control of Generation of Code ('Code Injection')
| |
Cross-site Scripting (XSS)
| |
Improper Input Validation
| |
Improper Access Control
| |
Cross-site Scripting (XSS)
| |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
| |
Arbitrary File Upload
| |
Remote Code Execution (RCE)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Inadequate Encryption Strength
| |
Cross-site Scripting (XSS)
| |
Arbitrary File Upload
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Access Restriction Bypass
| |
Arbitrary Command Injection
| |
SQL Injection
| |
Privilege Escalation
| |
Arbitrary Code Execution
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Access Control Bypass
| |
Arbitrary Code Injection
| |
Business Logic Error
| |
Improper Access Control
| |
Business Logic Errors
| |
SQL Injection
| |
Business Logic Errors
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Arbitrary Code Injection
| |
Improper Access Control
| |
Improper Authentication
| |
Cross-site Scripting (XSS)
| |
Access Restriction Bypass
| |
Remote Code Execution (RCE)
| |
Arbitrary File Upload
| |
Privilege Escalation
| |
Cross-site Scripting (XSS)
| |
Arbitrary Code Injection
| |
Improper Input Validation
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Arbitrary File Upload
| |
Cross-site Scripting (XSS)
| |
Improper Access Control
| |
Cross-site Request Forgery (CSRF)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Arbitrary Code Execution
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |