| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| PHP Remote File Inclusion |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Command Injection |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| SQL Injection |  | 
| SQL Injection |  | 
| Information Exposure |  | 
| Cross-site Scripting (XSS) |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| SQL Injection |  | 
| Cross-site Scripting (XSS) |  | 
| Arbitrary Code Injection |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Insufficient Session Expiration |  | 
| Cross-site Scripting (XSS) |  | 
| Deserialization of Untrusted Data |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Command Injection |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Information Exposure |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Authorization |  | 
| Improper Access Control |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Directory Traversal |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| SQL Injection |  | 
| Improper Access Control |  | 
| SQL Injection |  | 
| Information Exposure |  | 
| Cross-site Scripting (XSS) |  | 
| Directory Traversal |  | 
| SQL Injection |  | 
| SQL Injection |  | 
| Authentication Bypass |  | 
| Directory Traversal |  | 
| Command Injection |  | 
| Insufficient Input Validation |  | 
| Insufficient Input Validation |  | 
| Arbitrary File Read |  | 
| Command Injection |  | 
| SQL Injection |  | 
| Cross-site Scripting (XSS) |  |