Incorrect Resource Transfer Between Spheres | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Improper Authentication | |
Improper Authorization | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Missing Authorization | |
Missing Authorization | |
Information Exposure | |
Missing Authorization | |
Truncation of Security-relevant Information | |
Information Exposure | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Improper Certificate Validation | |
Use of Insufficiently Random Values | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
HTTP Response Splitting | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |
Improper Certificate Validation | |