Improper Certificate Validation | |
Directory Traversal | |
Cross-site Scripting (XSS) | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
SQL Injection | |
Cleartext Transmission of Sensitive Information | |
Uncontrolled Recursion | |
Resource Exhaustion | |
Resource Exhaustion | |
SQL Injection | |
Directory Traversal | |
Server-Side Request Forgery (SSRF) | |
Directory Traversal | |
HTTP Request Smuggling | |
SQL Injection | |
Weak Password Recovery Mechanism for Forgotten Password | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Allocation of Resources Without Limits or Throttling | |
Improper Input Validation | |
Open Redirect | |
Incorrect Regular Expression | |
Incorrect Regular Expression | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Open Redirect | |
Open Redirect | |
Access Restriction Bypass | |
Use of Hard-coded Credentials | |