Use of Hard-coded Credentials | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Information Exposure | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Open Redirect | |
Use of a Broken or Risky Cryptographic Algorithm | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Weak Password Recovery Mechanism for Forgotten Password | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
SQL Injection | |
SQL Injection | |
Information Exposure | |
Improper Input Validation | |
Improper Privilege Management | |
Race Condition | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Improper Input Validation | |
SQL Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
SQL Injection | |
SQL Injection | |
Access Restriction Bypass | |
CVE-2015-7684 | |
Access Restriction Bypass | |
Directory Traversal | |
SQL Injection | |
CVE-2013-2225 | |
SQL Injection | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Arbitrary Code Injection | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Link Following | |
Directory Traversal | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
CVE-2008-7220 | |
CVE-2007-3215 | |
CVE-2007-2383 | |