| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Server-Side Request Forgery (SSRF) | |
| Server-Side Request Forgery (SSRF) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Access Control | |
| Improper Access Control | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Improper Authorization | |
| Improper Authorization | |
| Information Exposure | |
| Information Exposure | |
| Improperly Implemented Security Check for Standard | |
| Improperly Implemented Security Check for Standard | |
| Resource Exhaustion | |
| Information Exposure | |
| Information Exposure | |
| Resource Exhaustion | |
| Cross-site Request Forgery (CSRF) | |
| Resource Exhaustion | |
| Open Redirect | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Eval Injection | |
| Improper Input Validation | |
| Improper Input Validation | |
| Information Exposure | |
| OS Command Injection | |
| Improper Authorization | |
| Improper Authorization | |
| Directory Traversal | |
| OS Command Injection | |
| OS Command Injection | |
| Improper Authorization | |
| Improper Authorization | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| HTTP Response Splitting | |
| Cross-site Scripting (XSS) | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |