Information Exposure
| |
Cross-site Scripting (XSS)
| |
Allocation of Resources Without Limits or Throttling
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |
Arbitrary Code Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Insufficient Session Expiration
| |
Cross-site Scripting (XSS)
| |
Deserialization of Untrusted Data
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Command Injection
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Information Exposure
| |
Cross-site Scripting (XSS)
| |
Improper Authorization
| |
Improper Access Control
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Directory Traversal
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Improper Access Control
| |
SQL Injection
| |
Information Exposure
| |
Cross-site Scripting (XSS)
| |
Directory Traversal
| |
SQL Injection
| |
SQL Injection
| |
Command Injection
| |
Authentication Bypass
| |
Directory Traversal
| |
Insufficient Input Validation
| |
Insufficient Input Validation
| |
Arbitrary File Read
| |
Command Injection
| |
SQL Injection
| |
Cross-site Scripting (XSS)
| |