| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Deserialization of Untrusted Data | |
| Cross-site Request Forgery (CSRF) | |
| Improper Input Validation | |
| Improper Handling of Inconsistent Structural Elements | |
| Allocation of Resources Without Limits or Throttling | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Link Following | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Deserialization of Untrusted Data | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |