HTTP Response Splitting | |
Improper Authentication | |
Reachable Assertion | |
Excessive Platform Resource Consumption within a Loop | |
Improper Access Control | |
Improper Output Neutralization for Logs | |
Session Fixation | |
Authentication Bypass | |
Allocation of Resources Without Limits or Throttling | |
Incorrect Authorization | |
Information Exposure | |
NULL Pointer Dereference | |
Incorrect Default Permissions | |
Improper Input Validation | |
Detection of Error Condition Without Action | |
Resource Exhaustion | |
Improper Validation of Certificate with Host Mismatch | |
Missing Release of Resource after Effective Lifetime | |
Improper Certificate Validation | |
Misinterpretation of Input | |
Inclusion of Functionality from Untrusted Control Sphere | |
Improper Encoding or Escaping of Output | |
Improper Input Validation | |
NULL Pointer Dereference | |
Inclusion of Functionality from Untrusted Control Sphere | |
Improper Encoding or Escaping of Output | |
Improper Encoding or Escaping of Output | |
Improper Encoding or Escaping of Output | |
Detection of Error Condition Without Action | |
Resource Exhaustion | |
Improper Validation of Certificate with Host Mismatch | |
Missing Release of Resource after Effective Lifetime | |
Improper Certificate Validation | |
Misinterpretation of Input | |
Missing Required Cryptographic Step | |
Missing Encryption of Sensitive Data | |
Information Exposure | |
Out-of-bounds Read | |
Cross-site Scripting (XSS) | |