Information Exposure
| |
Insufficient Comparison
| |
SQL Injection
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
Untrusted Search Path
| |
SQL Injection
| |
Missing Authorization
| |
SQL Injection
| |
Out-of-bounds Read
| |
Out-of-bounds Write
| |
Out-of-bounds Read
| |
Improper Access Control
| |
SQL Injection
| |
Incorrect Authorization
| |
SQL Injection
| |
Incorrect Permission Assignment for Critical Resource
| |
Improper Input Validation
| |
Incorrect Permission Assignment for Critical Resource
| |
Information Exposure
| |
Information Exposure
| |
Information Exposure
| |
Missing Authorization
| |
Improper Authentication
| |
Insufficiently Protected Credentials
| |
Missing Encryption of Sensitive Data
| |
Information Exposure
| |
Information Exposure
| |