Cross-site Scripting (XSS) | |
Insufficient Verification of Data Authenticity | |
Allocation of Resources Without Limits or Throttling | |
Information Exposure | |
Allocation of Resources Without Limits or Throttling | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
HTTP Request Smuggling | |
Improper Authentication | |
Resource Exhaustion | |
Use After Free | |
Buffer Overflow | |
Files or Directories Accessible to External Parties | |
Authentication Bypass | |
Improper Authentication | |
Cross-site Request Forgery (CSRF) | |
Allocation of Resources Without Limits or Throttling | |
Improper Authentication | |
Directory Traversal | |
Improper Input Validation | |
CVE-2015-5346 | |
Improper Input Validation | |
Improper Authentication | |
Encoding Error | |
NULL Pointer Dereference | |
Improper Authentication | |
Out-of-bounds Read | |
Open Redirect | |
Cross-site Scripting (XSS) | |