|
Information Exposure Through Log Files
| |
|
Cross-site Scripting (XSS)
| |
|
Cross-site Scripting (XSS)
| |
|
Cross-site Scripting (XSS)
| |
|
Information Exposure
| |
|
SQL Injection
| |
|
Information Exposure
| |
|
Deserialization of Untrusted Data
| |
|
Cross-site Scripting (XSS)
| |
|
Cross-site Scripting (XSS)
| |
|
XML External Entity (XXE) Injection
| |
|
Information Exposure
| |
|
Use of a Broken or Risky Cryptographic Algorithm
| |
|
Improper Access Control
| |
|
Missing Required Cryptographic Step
| |
|
Missing Required Cryptographic Step
| |
|
Information Exposure
| |
|
Covert Timing Channel
| |
|
Incorrect Calculation
| |
|
Missing Required Cryptographic Step
| |
|
Missing Required Cryptographic Step
| |
|
Missing Required Cryptographic Step
| |
|
Directory Traversal
| |
|
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
| |
|
Improper Certificate Validation
| |
|
CVE-2013-6668
| |
|
Information Exposure
| |
|
Improper Input Validation
| |
|
Information Exposure
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Cross-site Scripting (XSS)
| |
|
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
| |
|
Omission of Security-relevant Information
| |
|
Information Exposure
| |
|
Incomplete Blacklist
| |
|
Cross-site Scripting (XSS)
| |
|
HTTP Request Smuggling
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Improper Input Validation
| |
|
Resource Exhaustion
| |
|
HTTP Response Splitting
| |
|
Out-of-Bounds
| |
|
CVE-2016-6346
| |
|
Access Restriction Bypass
| |
|
Improper Data Handling
| |
|
Improper Data Handling
| |
|
Algorithmic Complexity
| |