Information Exposure | |
Incorrect Regular Expression | |
Improper Input Validation | |
Improper Authentication | |
Improper Authorization | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Incorrect Authorization | |
Allocation of Resources Without Limits or Throttling | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Deserialization of Untrusted Data | |
Cross-site Scripting (XSS) | |
Link Following | |
Cross-site Scripting (XSS) | |
Missing Authorization | |
Missing Authorization | |
Information Exposure | |
Missing Authorization | |
Covert Timing Channel | |
Covert Timing Channel | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Insufficiently Protected Credentials | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Truncation of Security-relevant Information | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Insecure Temporary File | |
Insecure Temporary File | |