Abuse of Callback Functionality
Adaptive-Chosen Ciphertext Attacks
Application-Level Denial-of-Service
Arbitrary/Unrestricted File Upload
Business Logic Vulnerabilities
Client Sided Template Injection (CSTI)
CORB (Cross-Origin Read Blocking) Leaks
CORP (Cross-Origin Resource Policy) Leaks
Cross Site Script Inclusion (XSSi)
Cross Site History Manipulation (XSHM)
Cross Site Request Forgery (CSRF)
Cross Site WebSocket Hijacking
CSP (Content Security Policy) Bypass
CSV Excel Macro Injection (CEMI)
Direct Dynamic Code Evaluation
Execution After Redirect (EAR)
HTTP Request Smuggling/Response Splitting
Insecure Cryptographic Storage
Insecure Deserialization (Mass Assignment / Object Injection)
Insecure Direct Object Reference (IDOR)
Insufficient Entropy / Insecure PRNG's
Java Remote Method Invocation (RMI) RCE
JWT (JSON Web Token) Vulnerabilities
On-Site Request Forgery (OSRF)
Remote Command Execution (RCE)
Same Origin Method Execution (SOME)
Session Splicing/Fragmentation
Server-Sided Request Forgery (SSRF)
Server-Sided Template Injection (SSTI)
SOP (Same Origin Policy) Bypass
Unvalidated Automatic Library Activation
XML External Entity Injection (XXE)
XML Signature-Transformations DoS