Incorrect Permission Assignment for Critical Resource
| |
Cross-site Scripting (XSS)
| |
Improper Input Validation
| |
Improper Input Validation
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Improper Input Validation
| |
Improper Encoding or Escaping of Output
| |
Session Fixation
| |
Directory Traversal
| |
Brute Force
| |
Allocation of Resources Without Limits or Throttling
| |
Arbitrary File Upload
| |
Authentication Bypass by Primary Weakness
| |
Cross-site Request Forgery (CSRF)
| |
Arbitrary Code Injection
| |
Arbitrary Code Injection
| |
Directory Traversal
| |
Arbitrary Command Injection
| |
Improper Authorization
| |
Cross-site Request Forgery (CSRF)
| |
Improper Input Validation
| |
Cross-site Request Forgery (CSRF)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Arbitrary Code Execution
| |
Information Exposure
| |
Information Exposure
| |