| Authorization Bypass Through User-Controlled SQL Primary Key | |
| Cross-site Scripting | |
| Cross-site Scripting (XSS) | |
| Improper Control of Generation of Code ('Code Injection') | |
| Cross-Site Request Forgery (CSRF) | |
| Cross-site Scripting | |
| SQL Injection | |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Remote Code Execution (RCE) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Session Fixation | |
| CSV Injection | |
| Deserialization of Untrusted Data | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Execution | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Access Control | |
| Cross-site Scripting (XSS) | |