|
Incomplete Cleanup
| |
|
Improper Input Validation
| |
|
Resource Exhaustion
| |
|
Information Exposure
| |
|
Off-by-one Error
| |
|
Information Exposure
| |
|
Allocation of Resources Without Limits or Throttling
| |
|
Arbitrary Code Injection
| |
|
Incomplete Documentation of Program Execution
| |
|
Sensitive Information Uncleared Before Release
| |
|
Time-of-check Time-of-use (TOCTOU)
| |
|
XML External Entity (XXE) Injection
| |
|
Access Restriction Bypass
| |
|
Information Exposure
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Session Fixation
| |
|
Incorrect Privilege Assignment
| |
|
Access Restriction Bypass
| |
|
Link Following
| |
|
Error Handling
| |
|
HTTP Request Smuggling
| |
|
Access Restriction Bypass
| |
|
Files or Directories Accessible to External Parties
| |
|
Authentication Bypass
| |
|
Improper Authentication
| |
|
Directory Traversal
| |
|
Improper Authentication
| |
|
Improper Authentication
| |
|
Resource Management Errors
| |
|
Access Restriction Bypass
| |
|
Improper Access Control
| |
|
Improper Input Validation
| |
|
Improper Access Control
| |
|
Resource Management Errors
| |
|
Numeric Errors
| |
|
Access Restriction Bypass
| |
|
Information Exposure
| |
|
Cryptographic Issues
| |
|
Access Restriction Bypass
| |
|
Improper Authentication
| |
|
Improper Input Validation
| |
|
Access Restriction Bypass
| |
|
Cross-site Scripting (XSS)
| |
|
Cross-site Scripting (XSS)
| |
|
CVE-2010-3718
| |
|
Resource Exhaustion
| |
|
Resource Management Errors
| |
|
CVE-2010-4476
| |
|
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
|
XML External Entity (XXE) Injection
| |
|
Integer Overflow or Wraparound
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
HTTP Request Smuggling
| |
|
Information Exposure
| |
|
Improper Access Control
| |
|
Security Features
| |
|
Information Exposure
| |
|
Deserialization of Untrusted Data
| |
|
Security Features
| |
|
Deserialization of Untrusted Data
| |
|
Access Restriction Bypass
| |
|
Improper Authorization
| |
|
Information Exposure
| |
|
Session Fixation
| |
|
Improper Access Control
| |
|
CVE-2011-4084
| |
|
Cross-site Scripting (XSS)
| |
|
Configuration
| |
|
Information Exposure
| |