Cross-site Scripting (XSS)
| |
Information Exposure
| |
Improper Input Validation
| |
Remote Code Execution (RCE)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Access Restriction Bypass
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
SQL Injection
| |
Improper Authorization
| |
External Control of File Name or Path
| |
Cross-site Scripting (XSS)
| |
SQL Injection
| |
Information Exposure
| |
Access Restriction Bypass
| |
Unauthorized File Access
| |
Access Restriction Bypass
| |
Local File Inclusion
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Cross-site Scripting (XSS)
| |
Access Restriction Bypass
| |
Access Restriction Bypass
| |
Arbitrary File Upload
| |
Access Restriction Bypass
| |