SQL Injection | |
Cleartext Storage of Sensitive Information | |
Insufficient Verification of Data Authenticity | |
Deserialization of Untrusted Data | |
Improper Input Validation | |
Insecure Temporary File | |
Insufficiently Protected Credentials | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Authorization | |
Improper Authorization | |
Cross-site Scripting (XSS) | |
Information Exposure Through Log Files | |
Information Exposure | |
Improper Access Control | |
Use of Insufficiently Random Values | |
Incorrect Permission Assignment for Critical Resource | |
Improper Input Validation | |
Improper Access Control | |
Cross-site Scripting (XSS) | |
CVE-2013-6668 | |
Information Exposure | |
Improper Input Validation | |
Omission of Security-relevant Information | |
Integer Overflow or Wraparound | |
Resource Exhaustion | |
Access Restriction Bypass | |
Improper Data Handling | |
Improper Data Handling | |
Algorithmic Complexity | |