Improper Input Validation | |
Improper Input Validation | |
Allocation of Resources Without Limits or Throttling | |
Missing Authentication for Critical Function | |
Exposure of Sensitive System Information to an Unauthorized Control Sphere | |
Arbitrary File Upload | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
Information Exposure | |
Allocation of Resources Without Limits or Throttling | |
Improper Input Validation | |
Information Exposure | |
Denial of Service (DoS) | |
Incorrect Authorization | |
Server-side Request Forgery (SSRF) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Access Restriction Bypass | |
Allocation of Resources Without Limits or Throttling | |
Denial of Service (DoS) | |
Uncontrolled Recursion | |
Directory Traversal | |
Information Exposure | |
Information Exposure | |
Insufficiently Protected Credentials | |
Insecure Randomness | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Open Redirect | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Insecure Defaults | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Insufficient Verification of Data Authenticity | |