| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Missing Encryption of Sensitive Data | |
| Open Redirect | |
| Open Redirect | |
| Insufficiently Protected Credentials | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Incorrect Resource Transfer Between Spheres | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Encoding Error | |