100 Web Vulnerabilities, categorized into various types
https://www.mindmeister.com/1470766611/web-app-pentest?fullscreen=1#
MindMap
MindMap
⚡️ Injection Vulnerabilities:
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF)
Remote Code Execution (RCE)
Command Injection
XML Injection
LDAP Injection
XPath Injection
HTML Injection
Server-Side Includes (SSI) Injection
OS Command Injection
Blind SQL Injection
Server-Side Template Injection (SSTI)
⚡️ Broken Authentication and Session Management:
Session Fixation
Brute Force Attack
Session Hijacking
Password Cracking
Weak Password Storage
Insecure Authentication
Cookie Theft
Credential Reuse
⚡️ Sensitive Data Exposure:
Inadequate Encryption
Insecure Direct Object References (IDOR)
Data Leakage
Unencrypted Data Storage
Missing Security Headers
Insecure File Handling
⚡️ Security Misconfiguration:
Default Passwords
Directory Listing
Unprotected API Endpoints
Open Ports and Services
Improper Access Controls
Information Disclosure
Unpatched Software
Misconfigured CORS
HTTP Security Headers Misconfiguration
⚡️ XML-Related Vulnerabilities:
XML External Entity (XXE) Injection
XML Entity Expansion (XEE)
XML Bomb
⚡️ Broken Access Control:
Inadequate Authorization
Privilege Escalation
Insecure Direct Object References
Forceful Browsing
Missing Function-Level Access Control
⚡️ Insecure Deserialization:
Remote Code Execution via Deserialization
Data Tampering
Object Injection
⚡️ API Security Issues:
Insecure API Endpoints
API Key Exposure
Lack of Rate Limiting
Inadequate Input Validation
⚡️ Insecure Communication:
Man-in-the-Middle (MITM) Attack
Insufficient Transport Layer Security
Insecure SSL/TLS Configuration
Insecure Communication Protocols
⚡️ Client-Side Vulnerabilities:
DOM-based XSS
Insecure Cross-Origin Communication
Browser Cache Poisoning
Clickjacking
HTML5 Security Issues
⚡️ Denial of Service (DoS):
Distributed Denial of Service (DDoS)
Application Layer DoS
Resource Exhaustion
Slowloris Attack
XML Denial of Service
⚡️ Other Web Vulnerabilities:
Server-Side Request Forgery (SSRF)
HTTP Parameter Pollution (HPP)
Insecure Redirects and Forwards
File Inclusion Vulnerabilities
Security Header Bypass
Clickjacking
Inadequate Session Timeout
Insufficient Logging and Monitoring
Business Logic Vulnerabilities
API Abuse
⚡️ Mobile Web Vulnerabilities:
Insecure Data Storage on Mobile Devices
Insecure Data Transmission on Mobile Devices
Insecure Mobile API Endpoints
Mobile App Reverse Engineering
⚡️ IoT Web Vulnerabilities:
Insecure IoT Device Management
Weak Authentication on IoT Devices
IoT Device Vulnerabilities
⚡️ Web of Things (WoT) Vulnerabilities:
Unauthorized Access to Smart Homes
IoT Data Privacy Issues
⚡️ Authentication Bypass:
Insecure "Remember Me" Functionality
CAPTCHA Bypass
⚡️ Server-Side Request Forgery (SSRF):
Blind SSR
Time-Based Blind SSRF
⚡️ Content Spoofing:
MIME Sniffing
X-Content-Type-Options Bypass
Content Security Policy (CSP) Bypass
⚡️ Business Logic Flaws:
Inconsistent Validation
Race Conditions
Order Processing Vulnerabilities
Price Manipulation
Account Enumeration
User-Based Flaws
⚡️ Zero-Day Vulnerabilities:
Unknown Vulnerabilities
Unpatched Vulnerabilities
Day-Zero Exploits
Last updated