Privilege Escalation:
Cross-site Scripting (XSS):
Injections (SQL, DLL, LDAP, XML):
Pinter/Object Dereference:
Directory Transversal:
Buffer Overflows:
Race Conditions (Time of Check/Time of Use):
Errors Handling:
Improper Input Handling:
Replay Attack (Session Replays):
Integer Overflow:
Request Forgeries (Server-side, Cross-site):
Application Programming Interface (API) Attacks:
Resource Exhaustion:
Memory Leak:
Secure Sockets Layer (SSL) Stripping:
Driver Manipulation (Shimming, Refactoring):
Pass the Hash: