- Harvesting public information
- Automated discovery
- Automated application discovery
- Session fixation
- Weak session token quality
- Weak session token management
- Weak logout
- Cross-site request forgery
- Weak CORS
- Session token protection
- No session timeout
- Session encryption (SSL/TLS)
- Password strength enforcement
- Authentication bypass
- Unauthenticated URL access
- Password brute force
- Default account(admin)
- Insecure authorization design
- Only client side authorization
- Variable manipulation
- Direct access to resources
- IDOR
- Reflected XSS
- Stored XSS
- DOM based XSS
- Wrong content-type
- HTTP header injection
- Malicious URL redirect
- Clickjacking
- LFI/RFI
- SSRF
- XML external entity injection
- OS command injection
- SQL injection
- Malicious file upload
- Backup files
- Leaking stackt-traces
- Comments
- Path disclosure
- Directory listing