Cross-site Scripting | |
Cross-site Scripting (XSS) | |
Improper Control of Generation of Code ('Code Injection') | |
Cross-Site Request Forgery (CSRF) | |
Cross-site Scripting | |
SQL Injection | |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Remote Code Execution (RCE) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
CSV Injection | |
Session Fixation | |
Deserialization of Untrusted Data | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Arbitrary Code Execution | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Access Control | |
Cross-site Scripting (XSS) | |