Integer Overflow or Wraparound | |
Creation of Temporary File With Insecure Permissions | |
Cross-site Scripting (XSS) | |
Creation of Temporary File With Insecure Permissions | |
Permissive Regular Expression | |
Creation of Temporary File With Insecure Permissions | |
Allocation of Resources Without Limits or Throttling | |
Incomplete Cleanup | |
Cross-site Scripting (XSS) | |
Files or Directories Accessible to External Parties | |
Cross-site Request Forgery (CSRF) | |
Resource Exhaustion | |
Incorrect Privilege Assignment | |
Improper Resource Shutdown or Release | |
Improper Resource Shutdown or Release | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Missing Authorization | |
Cross-site Request Forgery (CSRF) | |
Directory Traversal | |
Directory Traversal | |
Improper Input Validation | |
Incorrect Default Permissions | |
Link Following | |
Session Fixation | |
Incorrect Default Permissions | |
Improper Preservation of Permissions | |
Link Following | |
Directory Traversal | |
Incorrect Authorization | |
Incorrect Default Permissions | |
Directory Traversal | |
Improper Preservation of Permissions | |
Improper Input Validation | |
Incorrect Default Permissions | |
Directory Traversal | |
Improper Input Validation | |
Improper Check for Dropped Privileges | |
Incorrect Authorization | |
Link Following | |
Cross-site Scripting (XSS) | |
Incorrect Authorization | |
Allocation of Resources Without Limits or Throttling | |
Improper Input Validation | |
Cross-site Scripting (XSS) | |
Deserialization of Untrusted Data | |
Cross-site Scripting (XSS) | |
Link Following | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Request Forgery (CSRF) | |
Directory Traversal | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
API Abuse | |
Information Exposure | |
Information Exposure | |
Covert Timing Channel | |
Covert Timing Channel | |
Insufficient Control of Network Message Volume (Network Amplification) | |
Authentication Bypass by Primary Weakness | |
Incorrect Authorization | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Insufficient Resource Pool | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Out-of-bounds Write | |
Resource Exhaustion | |
Operation on a Resource after Expiration or Release | |
Information Exposure | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Improper Validation of Certificate with Host Mismatch | |
Information Exposure | |
Information Exposure | |
Insecure Temporary File | |
Insufficient Session Expiration | |
Information Exposure | |
Resource Exhaustion | |
Incorrect Default Permissions | |
Resource Exhaustion | |
Sensitive Information Uncleared Before Release | |
Insecure Temporary File | |
Insecure Temporary File | |