Incorrect Permission Assignment for Critical Resource | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Encoding or Escaping of Output | |
Session Fixation | |
Directory Traversal | |
Brute Force | |
Allocation of Resources Without Limits or Throttling | |
Arbitrary File Upload | |
Authentication Bypass by Primary Weakness | |
Cross-site Request Forgery (CSRF) | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Directory Traversal | |
Arbitrary Command Injection | |
Improper Authorization | |
Cross-site Request Forgery (CSRF) | |
Improper Input Validation | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Arbitrary Code Execution | |
Information Exposure | |
Information Exposure | |