| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Access Control Bypass | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Missing Authorization | |
| Missing Authorization | |
| Server-side Request Forgery (SSRF) | |
| Arbitrary File Upload | |
| SQL Injection | |
| Cross-site Request Forgery (CSRF) | |
| Authorization Bypass Through User-Controlled Key | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Unrestricted Upload of File with Dangerous Type | |
| Cross-site Scripting (XSS) | |
| Insufficient Session Expiration | |
| Cross-site Request Forgery (CSRF) | |
| Arbitrary File Upload | |
| Access Control Bypass | |
| Access Control Bypass | |
| CSV Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Insufficient Session Expiration | |