Session Fixation | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Out-of-bounds Write | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Missing Authorization | |
Cross-site Scripting (XSS) | |
Missing Authorization | |
Improper Authentication | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Time-of-check Time-of-use (TOCTOU) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |