Improper Access Control | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Authorization | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Improper Input Validation | |
Allocation of Resources Without Limits or Throttling | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Missing Required Cryptographic Step | |
Missing Required Cryptographic Step | |
Missing Required Cryptographic Step | |
Missing Required Cryptographic Step | |
Missing Required Cryptographic Step | |
Missing Required Cryptographic Step | |
Missing Required Cryptographic Step | |
Missing Required Cryptographic Step | |
Missing Required Cryptographic Step | |
Improper Authorization | |