SQL Injection | |
SQL Injection | |
SQL Injection | |
Information Exposure | |
Arbitrary Code Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
SQL Injection | |
SQL Injection | |
Improper Access Control | |
Information Exposure | |
Information Exposure | |
Access Restriction Bypass | |
Arbitrary File Upload | |
SQL Injection | |
Arbitrary Code Injection | |
Cross-site Scripting (XSS) | |
SQL Injection | |
SQL Injection | |
Information Exposure | |
Improper Input Validation | |
SQL Injection | |
Arbitrary File Upload | |
SQL Injection | |
SQL Injection | |
Improper Input Validation | |
SQL Injection | |
Cross-site Scripting (XSS) | |
SQL Injection | |
Improper Input Validation | |
SQL Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Information Exposure | |
Improper Input Validation | |
Directory Traversal | |
Improper Input Validation | |
Improper Input Validation | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
SQL Injection | |
Cross-site Scripting (XSS) | |
Improper Input Validation | |
Information Exposure | |
SQL Injection | |
Information Exposure | |
SQL Injection | |
Improper Access Control | |
SQL Injection | |
Arbitrary File Upload | |
SQL Injection | |
Remote Code Execution (RCE) | |