| Improper Authentication | |
| Cross-site Scripting (XSS) | |
| Incorrect Permission Assignment for Critical Resource | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Input Validation | |
| Improper Encoding or Escaping of Output | |
| Session Fixation | |
| Directory Traversal | |
| Brute Force | |
| Allocation of Resources Without Limits or Throttling | |
| Arbitrary File Upload | |
| Authentication Bypass by Primary Weakness | |
| Cross-site Request Forgery (CSRF) | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Directory Traversal | |
| Arbitrary Command Injection | |
| Improper Authorization | |
| Cross-site Request Forgery (CSRF) | |
| Improper Input Validation | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Arbitrary Code Execution | |
| Information Exposure | |
| Information Exposure | |