Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Arbitrary File Upload | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Arbitrary File Upload | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Open Redirect | |
Cross-site Request Forgery (CSRF) | |
Cryptographic Issues | |
Open Redirect | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Arbitrary File Upload | |
Arbitrary File Upload | |
Inadequate Encryption Strength | |
Cryptographic Weakness | |
Improper Access Control | |