| Cross-site Scripting (XSS) | |
| Overly Permissive CORS | |
| Improper Privilege Management | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Denial of Service (DoS) | |
| Incorrectly Specified Destination in a Communication Channel | |
| Improper Handling of Values | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Improper Verification of Source of a Communication Channel | |
| Improper Authentication | |
| Improper Authentication | |
| Access Restriction Bypass | |
| Authorization Bypass | |
| Access Restriction Bypass | |
| Improper Verification of Source of a Communication Channel | |
| Access Control Bypass | |
| Comparison of Object References Instead of Object Contents | |
| Insufficient Granularity of Access Control | |
| Improper Authorization | |
| Improper Authorization | |
| Incorrect Use of Privileged APIs | |
| Access Control Bypass | |
| Improper Privilege Management | |
| Access Control Bypass | |
| Cross-site Scripting (XSS) | |
| Improper Authentication | |
| Information Exposure | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Sensitive Cookie in HTTPS Session Without "Secure" Attribute | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |