SQL Injection | |
Missing Authorization | |
Exposure of Sensitive System Information to an Unauthorized Control Sphere | |
SQL Injection | |
Incorrect Default Permissions | |
Improper Authorization | |
SQL Injection | |
Improper Authorization | |
SQL Injection | |
Arbitrary File Read | |
Incorrect Authorization | [,3.1.2)[4.0.0rc1,4.0.0rc2) |
Cross-site Scripting (XSS) | |
Improper Authorization | |
Insertion of Sensitive Information into Log File | |
Improper Authorization | |
Incorrect Authorization | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Uncontrolled Resource Consumption ('Resource Exhaustion') | |
SQL Injection | |
Incorrect Authorization | |
Allocation of Resources Without Limits or Throttling | |
Incorrect Default Permissions | |
Open Redirect | |
Cross-site Scripting (XSS) | |
Incorrect Authorization | |
Information Exposure | |
Information Exposure | |
Improper Preservation of Permissions | |
Improper Input Validation | |
Deserialization of Untrusted Data | |
Server-side Request Forgery (SSRF) | |
Incorrect Authorization | |
Incorrect Authorization | |
Access Restriction Bypass | |
Server-side Request Forgery (SSRF) | |
Information Exposure | |
Insecure Default Initialization of Resource | |
Access Restriction Bypass | |
Open Redirect | |
Cross-site Request Forgery (CSRF) | |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') | |
Improper Access Control | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Information Exposure | |
SQL Injection | |
Insufficiently Protected Credentials | |
Improper Output Neutralization for Logs | |
Improper Output Neutralization for Logs | |
Insufficiently Protected Credentials | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Open Redirect | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Insecure Defaults | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Arbitrary Code Execution | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Remote Code Execution (RCE) | |
Information Exposure | |
Information Exposure | |
Information Exposure | |