Web Attacks
Cross-Site Scripting
SQL Injection
Blind SQL Injection
SQLMAP
Command Injection
File Inclusion
Open Redirection & SSRF
Cross-Origin Resource Sharing
XML External Entity Injection
File Upload
CSRF
Click-Jacking
Authentication & Session Vulnerabilities
Access Control Vulnerabilities
Vertical privilege escalation
Horizontal privilege escalation (IDOR)
Last updated