Resource Exhaustion | |
Out-of-bounds Write | |
Incorrect Authorization | |
Resource Exhaustion | |
Resource Exhaustion | |
Insufficient Session Expiration | |
Information Exposure | |
Resource Exhaustion | |
Information Exposure | |
Improper Validation of Syntactic Correctness of Input | |
Allocation of Resources Without Limits or Throttling | |
Files or Directories Accessible to External Parties | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Resource Exhaustion | |
Improper Access Control | |
Missing Authorization | |
Missing Authorization | |
Improper Access Control | |
Resource Exhaustion | |
Resource Exhaustion | |
Cleartext Transmission of Sensitive Information | |
Unprotected Transport of Credentials | |
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Input Validation | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Incomplete Cleanup | |
Integer Overflow or Wraparound | |
Insufficient Granularity of Access Control | |
Allocation of Resources Without Limits or Throttling | |
Improper Privilege Management | |
Open Redirect | |
Cross-site Request Forgery (CSRF) | |
Allocation of Resources Without Limits or Throttling | |
Resource Exhaustion | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Information Exposure | |
Information Exposure | |
Insufficient Resource Pool | |
Resource Exhaustion | |
Improper Validation of Integrity Check Value | |
Improper Access Control | |
Improper Access Control | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Deserialization of Untrusted Data | |
Incorrect Authorization | |
Creation of Temporary File With Insecure Permissions | |
Creation of Temporary File With Insecure Permissions | |
Creation of Temporary File With Insecure Permissions | |
Creation of Temporary File With Insecure Permissions | |
Creation of Temporary File With Insecure Permissions | |
Creation of Temporary File With Insecure Permissions | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Input Validation | |
Missing Required Cryptographic Step | |
Missing Required Cryptographic Step | |
Cross-site Scripting (XSS) | |
Information Exposure Through Log Files | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Security Features | |
Security Features | |
Missing Authorization | |
Missing Authorization | |
Permissive Regular Expression | |
Permissive Regular Expression | |
Permissive Regular Expression | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Directory Traversal | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Authentication | |
Cross-site Scripting (XSS) | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Missing Authorization | |
Cross-site Scripting (XSS) | |
Improper Authorization | |
Missing Authorization | |
Improper Input Validation | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Creation of Temporary File With Insecure Permissions | |
Creation of Temporary File With Insecure Permissions | |
Creation of Temporary File With Insecure Permissions | |
Directory Traversal | |
Deserialization of Untrusted Data | |
CVE-2014-2063 | |
Insufficient Session Expiration | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Session Fixation | |
Incorrect Authorization | |
CVE-2014-2060 | |
Information Exposure | |
Directory Traversal | |
Improper Input Validation | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Insufficient Session Expiration | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Session Fixation | |
Session Fixation | |
Resource Exhaustion | |
Session Fixation | |
Resource Exhaustion | |
Session Fixation | |
Resource Exhaustion | |
Session Fixation | |
Resource Exhaustion | |
Session Fixation | |
Resource Exhaustion | |
Resource Exhaustion | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Deserialization of Untrusted Data | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Insufficiently Protected Credentials | |
Static Code Injection | |
Improper Check for Dropped Privileges | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Improper Preservation of Permissions | |
Improper Preservation of Permissions | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Information Exposure | |
Incorrect Authorization | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Resource Exhaustion | |
Cross-site Scripting (XSS) | |
Directory Traversal | |
Execution with Unnecessary Privileges | |
Improper Authorization | |
Improper Resource Shutdown or Release | |
Improper Resource Shutdown or Release | |
Improper Resource Shutdown or Release | |
Improper Resource Shutdown or Release | |
Incorrect Privilege Assignment | |
Incorrect Privilege Assignment | |
Cross-site Scripting (XSS) | |
Creation of Temporary File With Insecure Permissions | |
Incorrect Privilege Assignment | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Directory Traversal | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Arbitrary Argument Injection | |
Directory Traversal | |