Resource Exhaustion | |
Improper Input Validation | |
HTTP Request Smuggling | |
Information Exposure | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Improper Authorization | |
Static Code Injection | |
Static Code Injection | |
Out-of-bounds Write | |
Static Code Injection | |
Session Fixation | |
Session Fixation | |
Static Code Injection | |
Static Code Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Incomplete Cleanup | |
HTTP Request Smuggling | |
Resource Exhaustion | |
Improper Input Validation | |
HTTP Request Smuggling | |
Improper Input Validation | |
Improper Input Validation | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Heap-based Buffer Overflow | |
Cryptographic Issues | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Improper Input Validation | |
Improper Input Validation | |