| Cross-site Request Forgery (CSRF) | |
| Arbitrary File Upload | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Arbitrary File Upload | |
| Directory Traversal | |
| SQL Injection | |
| Access Restriction Bypass | |
| Remote Code Execution (RCE) | |
| Arbitrary Code Injection | |
| SQL Injection | |
| Arbitrary Code Injection | |
| Improper Input Validation | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Insecure Default | |
| Access Restriction Bypass | |
| Improper Authentication | |
| Directory Traversal | |
| Arbitrary File Upload | |
| Arbitrary File Upload | |
| Access Restriction Bypass | |
| Directory Traversal | |
| Cross-site Scripting (XSS) | |
| SQL Injection | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |