Insufficient Compartmentalization | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Incorrect Resource Transfer Between Spheres | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Insufficient Verification of Data Authenticity | |
Open Redirect | |
Incorrect Resource Transfer Between Spheres | |
Incorrect Resource Transfer Between Spheres | |
Incorrect Resource Transfer Between Spheres | |
Incorrect Resource Transfer Between Spheres | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Incorrect Resource Transfer Between Spheres | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Insufficient Verification of Data Authenticity | |
Information Exposure | |
Insufficient Verification of Data Authenticity | |
Information Exposure | |
Insufficient Verification of Data Authenticity | |
Information Exposure | |
Insufficient Verification of Data Authenticity | |
Information Exposure | |
Insufficient Verification of Data Authenticity | |
Insufficient Verification of Data Authenticity | |
Information Exposure | |
Open Redirect | |
Open Redirect | |
Open Redirect | |
Open Redirect | |
Use of a Broken or Risky Cryptographic Algorithm | |