| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Allocation of Resources Without Limits or Throttling | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Insufficiently Protected Credentials | |
| Missing Encryption of Sensitive Data | |
| Open Redirect | |
| Open Redirect | |
| Insufficiently Protected Credentials | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Incorrect Resource Transfer Between Spheres | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Incorrect Resource Transfer Between Spheres | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Encoding Error | |