Improper Access Control | |
Missing Authorization | |
Improper Access Control | |
Improper Access Control | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Improper Certificate Validation | |
Use of Hard-coded Credentials | |
Improper Input Validation | |
Improper Input Validation | |
Improper Access Control | |
Improper Access Control | |
Improper Input Validation | |
Improper Input Validation | |
Incorrect Privilege Assignment | |
Incorrect Privilege Assignment | |
Directory Traversal | |
Directory Traversal | |
Deserialization of Untrusted Data | |
Cross-site Scripting (XSS) | |
Arbitrary Command Injection | |
Information Exposure Through Log Files | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Resource Exhaustion | |
Information Exposure | |
Information Exposure | |
Resource Exhaustion | |
Cross-site Request Forgery (CSRF) | |
Resource Exhaustion | |
Open Redirect | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Eval Injection | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
OS Command Injection | |
Improper Authorization | |
Improper Authorization | |
Directory Traversal | |
OS Command Injection | |
OS Command Injection | |
Improper Authorization | |
Improper Authorization | |
Expected Behavior Violation | |
Expected Behavior Violation | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
HTTP Response Splitting | |
Improper Authorization | |
Improper Authorization | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Resource Exhaustion | |
Resource Exhaustion | |
Man-in-the-Middle (MitM) | |
Man-in-the-Middle (MitM) | |
Reliance on Untrusted Inputs in a Security Decision | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Incorrect Authorization | |
Insecure Temporary File | |
Improper Authentication | |
Improper Authentication | |
Improper Initialization | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Arbitrary Argument Injection | |
Arbitrary Argument Injection | |
Arbitrary Argument Injection | |
Arbitrary Argument Injection | |
Arbitrary Argument Injection | |
Arbitrary Argument Injection | |
Arbitrary Argument Injection | |
Arbitrary Argument Injection | |
Directory Traversal | |
Directory Traversal | |
Insecure Temporary File | |
Insecure Temporary File | |