Information Exposure | [,1362.1364.v4cf2dc5d8776)[1365.v4778ca_84b_de5,1365.1367.va_3b_b_89f8a_95b_)[1366.vd44b_49a_5c85c,1368.vb_b_402e3547e7) |
Improper Non-Trusted Input Validation | |
Creation of Chained Constructor Invocation | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Access Restriction Bypass | |
Cross-site Request Forgery (CSRF) | |
Use of Weak Hash | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Protection Mechanism Failure | |
Sandbox Bypass | |
Cross-site Scripting (XSS) | |
Sandbox Bypass | |
Sandbox Bypass | |
Sandbox Bypass | |
Sandbox Bypass | |
Sandbox Bypass | |
Sandbox Bypass | |
Sandbox Bypass | |
Sandbox Bypass | |
Sandbox Bypass | |
Arbitrary Code Execution | |
Arbitrary Code Execution | |
Sandbox Bypass | |
Arbitrary Code Execution | |
Arbitrary File Read | |