Vulnerabilities With Exploits

Code Execution

Cross Site Forgery Request

Cross Site Scripting

Denial Of Service

Directory Traversal

File Inclusion

Gain Information

HTTP Response Splitting

Memory Corruption

Overflows

Memory Corruption