Cross-site Scripting (XSS) | |
Improper Input Validation | |
Incorrect Privilege Assignment | |
Improper Authentication | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure | |
Information Exposure | |
Untrusted Search Path | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Improper Input Validation | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Improper Output Neutralization for Logs | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Arbitrary Argument Injection | |
Arbitrary Argument Injection | |
OS Command Injection | |
OS Command Injection | |
Insecure Temporary File | |
Insecure Temporary File | |
Improper Output Neutralization for Logs | |
Improper Authentication | |
Improper Output Neutralization for Logs | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Insufficiently Protected Credentials | |
Improper Output Neutralization for Logs | |
Improper Output Neutralization for Logs | |
Improper Verification of Cryptographic Signature | |
Improper Verification of Cryptographic Signature | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Insecure Temporary File | |
Insecure Temporary File | |
Information Exposure | |
Information Exposure | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Directory Traversal | |
Insecure Temporary File | |
Insecure Temporary File | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Missing Authorization | |
Missing Authorization | |
Improper Authentication | |