Inadequate Input Validation
Table of contents
- File Inclusion Vulnerability
- HTTP Response Splitting Vulnerability
- Insufficient Input Validation Vulnerability
- Log Injection Vulnerability
- Mass Assignment Vulnerability
- Prototype Pollution Vulnerability
- Server-Side Template Injection Vulnerability
- Subresource Integrity Vulnerability
- Type Juggling Vulnerability