Introduction - If you have any usage issues, please Google them yourself
SQL injection (SQL Injection)
2, cross site scripting (XSS)
3, unsafe object reference (Unsecure object using)
4. Local path leaks (Local path disclosure)
5, unsafe directory permissions (Unsecure directory permissions)
6, server vulnerabilities such as buffer overflow and configuration error (Server vulnerabilities like buffer overflow and configure error)
7, sensitive directories and file scans (Possible sensitive directories and files scan)
8, backup file scan (Backup files scan)
9. Source code leaks (Source code disclosure)
10, command execution (Command Execute)
11. The file contains (File Include)
12, Web Trojan back door (Web backdoor)
13, sensitive information (Sensitive information)