Information Exposure
|
[,1362.1364.v4cf2dc5d8776)
[1365.v4778ca_84b_de5,1365.1367.va_3b_b_89f8a_95b_)
[1366.vd44b_49a_5c85c,1368.vb_b_402e3547e7)
|
Improper Non-Trusted Input Validation
| |
Creation of Chained Constructor Invocation
| |
Incorrect Permission Assignment for Critical Resource
| |
Incorrect Permission Assignment for Critical Resource
| |
Access Restriction Bypass
| |
Cross-site Request Forgery (CSRF)
| |
Use of Weak Hash
| |
Protection Mechanism Failure
| |
Protection Mechanism Failure
| |
Protection Mechanism Failure
| |
Sandbox Bypass
| |
Cross-site Scripting (XSS)
| |
Sandbox Bypass
| |
Sandbox Bypass
| |
Sandbox Bypass
| |
Sandbox Bypass
| |
Sandbox Bypass
| |
Sandbox Bypass
| |
Sandbox Bypass
| |
Sandbox Bypass
| |
Sandbox Bypass
| |
Arbitrary Code Execution
| |
Arbitrary Code Execution
| |
Sandbox Bypass
| |
Arbitrary Code Execution
| |
Arbitrary File Read
| |