Incomplete Cleanup
| |
Insufficiently Protected Credentials
| |
SQL Injection
| |
Information Exposure
| |
Out-of-Bounds
| |
Permissive Whitelist
| |
Use of a Broken or Risky Cryptographic Algorithm
| |
SQL Injection
| |
Untrusted Search Path
| |
Missing Authorization
| |
SQL Injection
| |
Improper Access Control
| |
OS Command Injection
| |
Incorrect Authorization
| |
SQL Injection
| |
Incorrect Permission Assignment for Critical Resource
| |
CVE-2018-1058
| |
Incorrect Permission Assignment for Critical Resource
| |
Link Following
| |
Information Exposure
| |
Information Exposure
| |
CVE-2017-7548
| |
CVE-2017-7547
| |
Improper Authentication
| |
Missing Encryption of Sensitive Data
| |
Information Exposure
| |
Information Exposure
| |