Incomplete Cleanup | |
Improper Input Validation | |
Resource Exhaustion | |
Information Exposure | |
Off-by-one Error | |
Information Exposure | |
Allocation of Resources Without Limits or Throttling | |
Arbitrary Code Injection | |
Incomplete Documentation of Program Execution | |
Sensitive Information Uncleared Before Release | |
Time-of-check Time-of-use (TOCTOU) | |
XML External Entity (XXE) Injection | |
Access Restriction Bypass | |
Information Exposure | |
Improper Input Validation | |
Improper Input Validation | |
Session Fixation | |
Incorrect Privilege Assignment | |
Access Restriction Bypass | |
Link Following | |
Error Handling | |
HTTP Request Smuggling | |
Access Restriction Bypass | |
Files or Directories Accessible to External Parties | |
Authentication Bypass | |
Improper Authentication | |
Directory Traversal | |
Improper Authentication | |
Improper Authentication | |
Resource Management Errors | |
Access Restriction Bypass | |
Improper Access Control | |
Improper Input Validation | |
Improper Access Control | |
Resource Management Errors | |
Numeric Errors | |
Access Restriction Bypass | |
Information Exposure | |
Cryptographic Issues | |
Access Restriction Bypass | |
Improper Authentication | |
Improper Input Validation | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2010-3718 | |
Resource Exhaustion | |
Resource Management Errors | |
CVE-2010-4476 | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
XML External Entity (XXE) Injection | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
HTTP Request Smuggling | |
Information Exposure | |
Improper Access Control | |
Security Features | |
Information Exposure | |
Deserialization of Untrusted Data | |
Security Features | |
Deserialization of Untrusted Data | |
Access Restriction Bypass | |
Improper Authorization | |
Information Exposure | |
Session Fixation | |
Improper Access Control | |
CVE-2011-4084 | |
Cross-site Scripting (XSS) | |
Configuration | |
Information Exposure | |