| Arbitrary File Upload | |
| Information Exposure | |
| Cross-site Request Forgery (CSRF) | |
| Arbitrary File Upload | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Arbitrary File Upload | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Information Exposure | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Open Redirect | |
| Cross-site Request Forgery (CSRF) | |
| Cryptographic Issues | |
| Open Redirect | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Cross-site Request Forgery (CSRF) | |
| Arbitrary File Upload | |
| Arbitrary File Upload | |
| Inadequate Encryption Strength | |
| Cryptographic Weakness | |
| Improper Access Control | |