Web Applications
Access ControlAPIsAuthenticationClickjackingCross Origin Resource Sharing (CORS)Cross Site Request Forgery (CSRF)Document Object Model (DOM)File UploadGoogle DorkingGraphQLHTTP Request SmugglingInformation DisclosureInsecure Direct Object Reference (IDOR)Injection VulnerabilitiesJSON Web Tokens (JWT)Local File Inclusion (LFI)OAuthOpen RedirectionPassword Reset PoisoningPrototype PollutionRace ConditionRate Limit BypassRemote Code Execution (RCE)Remote File Inclusion (RFI)Suspicious ParametersToolingWAF BypassesWebSocketsWeb Cache DeceptionWeb Cache Poisoning
Last updated