Cross-site Scripting (XSS) | |
SQL Injection | |
Cleartext Storage of Sensitive Information | |
Insufficient Verification of Data Authenticity | |
Deserialization of Untrusted Data | |
Improper Input Validation | |
Insecure Temporary File | |
Insufficiently Protected Credentials | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Authorization | |
Improper Authorization | |
Cross-site Scripting (XSS) | |
Information Exposure Through Log Files | |
Information Exposure | |
Improper Access Control | |
Use of Insufficiently Random Values | |
Incorrect Permission Assignment for Critical Resource | |
Improper Input Validation | |
Improper Access Control | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Incorrect Permission Assignment for Critical Resource | |
Race Condition | |
Insecure Temporary File | |
Incorrect Permission Assignment for Critical Resource | |
Cross-site Scripting (XSS) | |
Cleartext Transmission of Sensitive Information | |
Improper Access Control | |
Improper Access Control | |
Integer Overflow or Wraparound | |
Improper Input Validation | |