Injection Attacks (Application Vulnerabilities)
SQL Injection (Application Vulnerabilities)
Authentication (Application Vulnerabilities)
Kerberos Authentication (Application Vulnerabilities)
Parameter Pollution - Authorization (Application Vulnerabilities)
Insecure Direct Object Reference - Authorization (Application Vulnerabilities)
Cross Site Scripting XSS (Application Vulnerabilities)
Cross Site Request Forgery CSRF (Application Vulnerabilities)
Clickjacking (Application Vulnerabilities)
Security Misconfiguration (Application Vulnerabilities)
File Inclusion (Application Vulnerabilities)
Insecure Code Practices (Application Vulnerabilities)