Remote Code Execution (RCE) & SQL Injection (SQLi)


Cross-Site Scripting (XSS) & Cross-Site Request Forgery (CSRF)


Other Vulnerabilities