Improper Validation of Syntactic Correctness of Input | |
Improper Validation of Syntactic Correctness of Input | |
Arbitrary Code Injection | |
Resource Exhaustion | |
Incorrect Authorization | |
SQL Injection | |
SQL Injection | |
Resource Exhaustion | |
SQL Injection | |
Resource Exhaustion | |
Cross-site Request Forgery (CSRF) | |
Resource Exhaustion | |
Race Condition | |
Resource Exhaustion | |
Deserialization of Untrusted Data | |
Information Exposure | |
Information Exposure | |
Improper Authentication | |
Improper Authentication | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Improper Authorization | |
Resource Exhaustion | |
Improper Authentication | |
Improper Authentication | |
Authentication Bypass | |
Authentication Bypass | |
Server-Side Request Forgery (SSRF) | |
Server-Side Request Forgery (SSRF) | |
Resource Exhaustion | |
Resource Exhaustion | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Improper Input Validation | |
Improper Input Validation | |
OS Command Injection | |
OS Command Injection | |
OS Command Injection | |
Improper Authorization | |
Improper Authorization | |
Authentication Bypass by Primary Weakness | |
Authentication Bypass by Primary Weakness | |
Use of Insufficiently Random Values | |
Use of Insufficiently Random Values | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
LDAP Injection | |
LDAP Injection | |
LDAP Injection | |
LDAP Injection | |
LDAP Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Improper Neutralization of Special Elements | |
Improper Neutralization of Special Elements | |
Improper Neutralization of Special Elements | |
Improper Neutralization of Special Elements | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Neutralization of Special Elements | |
Improper Neutralization of Special Elements | |
Improper Neutralization of Special Elements | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Improper Neutralization of Special Elements | |
Improper Neutralization of Special Elements | |
Improper Neutralization of Special Elements | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Uncaught Exception | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Cleartext Transmission of Sensitive Information | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Incorrect Use of Privileged APIs | |
Incorrect Use of Privileged APIs | |
Incorrect Use of Privileged APIs | |
Incorrect Use of Privileged APIs | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Deserialization of Untrusted Data | |
Unchecked Return Value | |
Incorrect Authorization | |
Allocation of Resources Without Limits or Throttling | |
Resource Exhaustion | |
Resource Exhaustion | |
Improper Resource Shutdown or Release | |
SQL Injection | |
SQL Injection | |
Arbitrary Code Injection | |
Improper Input Validation | |
Insufficient Resource Pool | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Improper Input Validation | |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Out-of-bounds Write | |
Incomplete Documentation of Program Execution | |
Incomplete Documentation of Program Execution | |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Deserialization of Untrusted Data | |
SQL Injection | |
Deserialization of Untrusted Data | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Incomplete Cleanup | |
Incomplete Cleanup | |
Improper Authentication | |
Improper Authentication | |
Information Exposure | |
Information Exposure | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Static Code Injection | |
Static Code Injection | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Static Code Injection | |
Static Code Injection | |
Static Code Injection | |
Static Code Injection | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Arbitrary Argument Injection | |
Arbitrary Argument Injection | |
Arbitrary Argument Injection | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Resource Exhaustion | |
Resource Exhaustion | |
Missing Release of Resource after Effective Lifetime | |
Missing Release of Resource after Effective Lifetime | |
Resource Exhaustion | |
Resource Exhaustion | |
Use After Free | |
Use After Free | |
Information Exposure | |
Information Exposure | |
Directory Traversal | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Use of a Broken or Risky Cryptographic Algorithm | |
Static Code Injection | |
Static Code Injection | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Static Code Injection | |
Static Code Injection | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Information Exposure | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Out-of-Bounds | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Insufficient Session Expiration | |
OS Command Injection | |
OS Command Injection | |
Information Exposure | |
Resource Exhaustion | |
Information Exposure | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Information Exposure | |
Information Exposure | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Incorrect Default Permissions | |
Incorrect Default Permissions | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Improper Authorization | |
Improper Authorization | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Static Code Injection | |
Static Code Injection | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Resource Exhaustion | |
Resource Exhaustion | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Resource Exhaustion | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Resource Exhaustion | |
Resource Exhaustion | |
Static Code Injection | |
Static Code Injection | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |
Deserialization of Untrusted Data | |