Cross-site Scripting (XSS) | |
Information Exposure | |
Improper Input Validation | |
Remote Code Execution (RCE) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
SQL Injection | |
SQL Injection | |
Improper Authorization | |
External Control of File Name or Path | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Information Exposure | |
Access Restriction Bypass | |
Unauthorized File Access | |
Access Restriction Bypass | |
Local File Inclusion | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Access Restriction Bypass | |
Access Restriction Bypass | |
Arbitrary File Upload | |
Access Restriction Bypass | |