| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Improper Authorization | |
| Improper Authorization | |
| Authorization Bypass Through User-Controlled Key | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Improper Input Validation | |
| Remote Code Execution (RCE) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| SQL Injection | |
| Improper Authorization | |
| External Control of File Name or Path | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Information Exposure | |
| Access Restriction Bypass | |
| Unauthorized File Access | |
| Access Restriction Bypass | |
| Local File Inclusion | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Arbitrary File Upload | |
| Access Restriction Bypass | |