100 Web Vulnerabilities And By Categories
Table of Contents
⚡️ Injection Vulnerabilities:
- SQL Injection (SQLi)
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Remote Code Execution (RCE)
- Command Injection
- XML Injection
- LDAP Injection
- XPath Injection
- HTML Injection
- Server-Side Includes (SSI) Injection
- OS Command Injection
- Blind SQL Injection
- Server-Side Template Injection (SSTI)
⚡️ Broken Authentication and Session Management:
- Session Fixation
- Brute Force Attack
- Session Hijacking
- Password Cracking
- Weak Password Storage
- Insecure Authentication
- Cookie Theft
- Credential Reuse
⚡️ Sensitive Data Exposure:
- Inadequate Encryption
- Insecure Direct Object References (IDOR)
- Data Leakage
- Unencrypted Data Storage
- Missing Security Headers
- Insecure File Handling
⚡️ Security Misconfiguration:
- Default Passwords
- Directory Listing
- Unprotected API Endpoints
- Open Ports and Services
- Improper Access Controls
- Information Disclosure
- Unpatched Software
- Misconfigured CORS
- HTTP Security Headers Misconfiguration
⚡️ XML-Related Vulnerabilities:
- XML External Entity (XXE) Injection
- XML Entity Expansion (XEE)
- XML Bomb
⚡️ Broken Access Control:
- Inadequate Authorization
- Privilege Escalation
- Insecure Direct Object References
- Forceful Browsing
- Missing Function-Level Access Control
⚡️ Insecure Deserialization:
- Remote Code Execution via Deserialization
- Data Tampering
- Object Injection
⚡️ API Security Issues:
- Insecure API Endpoints
- API Key Exposure
- Lack of Rate Limiting
- Inadequate Input Validation
⚡️ Insecure Communication:
- Man-in-the-Middle (MITM) Attack
- Insufficient Transport Layer Security
- Insecure SSL/TLS Configuration
- Insecure Communication Protocols
⚡️ Client-Side Vulnerabilities:
- DOM-based XSS
- Insecure Cross-Origin Communication
- Browser Cache Poisoning
- Clickjacking
- HTML5 Security Issues
⚡️ Denial of Service (DoS):
- Distributed Denial of Service (DDoS)
- Application Layer DoS
- Resource Exhaustion
- Slowloris Attack
- XML Denial of Service
⚡️ Other Web Vulnerabilities:
- Server-Side Request Forgery (SSRF)
- HTTP Parameter Pollution (HPP)
- Insecure Redirects and Forwards
- File Inclusion Vulnerabilities
- Security Header Bypass
- Clickjacking
- Inadequate Session Timeout
- Insufficient Logging and Monitoring
- Business Logic Vulnerabilities
- API Abuse
⚡️ Mobile Web Vulnerabilities:
- Insecure Data Storage on Mobile Devices
- Insecure Data Transmission on Mobile Devices
- Insecure Mobile API Endpoints
- Mobile App Reverse Engineering
⚡️ IoT Web Vulnerabilities:
- Insecure IoT Device Management
- Weak Authentication on IoT Devices
- IoT Device Vulnerabilities
⚡️ Web of Things (WoT) Vulnerabilities:
- Unauthorized Access to Smart Homes
- IoT Data Privacy Issues
⚡️ Authentication Bypass:
- Insecure “Remember Me” Functionality
- CAPTCHA Bypass
⚡️ Server-Side Request Forgery (SSRF):
- Blind SSR
- Time-Based Blind SSRF
⚡️ Content Spoofing:
- MIME Sniffing
- X-Content-Type-Options Bypass
- Content Security Policy (CSP) Bypass
⚡️ Business Logic Flaws:
- Inconsistent Validation
- Race Conditions
- Order Processing Vulnerabilities
- Price Manipulation
- Account Enumeration
- User-Based Flaws
⚡️ Zero-Day Vulnerabilities:
- Unknown Vulnerabilities
- Unpatched Vulnerabilities
- Day-Zero Exploits