| Arbitrary Code Injection | |
| PHP Remote File Inclusion | |
| Improper Authorization | |
| SQL Injection | |
| Cross-site Scripting | |
| SQL Injection | |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | |
| Cross-Site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Authentication | |
| Information Exposure | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Cross-Site Request Forgery (CSRF) | |
| Improper Control of Generation of Code ('Code Injection') | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Access Control | |
| Cross-site Scripting (XSS) | |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | |
| Arbitrary File Upload | |
| Remote Code Execution (RCE) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Inadequate Encryption Strength | |
| Cross-site Scripting (XSS) | |
| Arbitrary File Upload | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Arbitrary Command Injection | |
| SQL Injection | |
| Privilege Escalation | |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Access Control Bypass | |
| Arbitrary Code Injection | |
| Business Logic Error | |
| Improper Access Control | |
| Business Logic Errors | |
| SQL Injection | |
| Business Logic Errors | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Injection | |
| Improper Access Control | |
| Improper Authentication | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Remote Code Execution (RCE) | |
| Arbitrary File Upload | |
| Privilege Escalation | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Injection | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Arbitrary File Upload | |
| Cross-site Scripting (XSS) | |
| Improper Access Control | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |