Information Exposure | |
Information Exposure | |
Missing Authorization | |
Missing Authorization | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
SQL Injection | |
SQL Injection | |
Execution with Unnecessary Privileges | |
Execution with Unnecessary Privileges | |
Out-of-Bounds | |
Out-of-Bounds | |
Information Exposure | |
Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Request Forgery (CSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Covert Timing Channel | |
Covert Timing Channel | |
Information Exposure | |
Information Exposure | |
Use After Free | |
Use After Free | |