Cross-site Scripting (XSS) | |
Overly Permissive CORS | |
Improper Privilege Management | |
Access Restriction Bypass | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Denial of Service (DoS) | |
Incorrectly Specified Destination in a Communication Channel | |
Improper Handling of Values | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Improper Verification of Source of a Communication Channel | |
Improper Authentication | |
Improper Authentication | |
Access Restriction Bypass | |
Authorization Bypass | |
Access Restriction Bypass | |
Improper Verification of Source of a Communication Channel | |
Access Control Bypass | |
Comparison of Object References Instead of Object Contents | |
Insufficient Granularity of Access Control | |
Improper Authorization | |
Improper Authorization | |
Incorrect Use of Privileged APIs | |
Access Control Bypass | |
Improper Privilege Management | |
Access Control Bypass | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Information Exposure | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Sensitive Cookie in HTTPS Session Without "Secure" Attribute | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |