Remote Code Execution (RCE) & SQL Injection (SQLi)

High-impact vulnerabilities that can lead to full system compromise.


Cross-Site Scripting (XSS) & Cross-Site Request Forgery (CSRF)


Other Vulnerabilities