| Deserialization of Untrusted Data |  | 
| Cross-site Scripting (XSS) |  | 
| Direct Request ('Forced Browsing') |  | 
| Cross-site Scripting (XSS) |  | 
| CSV Injection |  | 
| Remote Code Execution (RCE) |  | 
| Missing Authorization |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Access Control |  | 
| Access Restriction Bypass |  | 
| Cross-site Scripting (XSS) |  | 
| Session Fixation |  | 
| Arbitrary File Upload |  | 
| Arbitrary File Upload |  | 
| Information Exposure |  | 
| Access Restriction Bypass |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Business Logic Errors |  | 
| Information Exposure |  | 
| Improper Privilege Management |  | 
| Access Restriction Bypass |  | 
| Information Exposure |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Scripting (XSS) |  | 
| Access Restriction Bypass |  | 
| Server-side Request Forgery (SSRF) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  |