SQL Injection

Authentication Vulnerabilities Labs

Path Traversal

Command injection

Business Logic vulnerabilities

Cross-Site Scripting

Information Disclousre

File Upload Vulnerabilities

Access Control Vulnerabilities

Race Condition