0% found this document useful (0 votes)
39 views2 pages

Bughutnig List of Vulnerabilities

The document lists various cybersecurity threats and vulnerabilities, including attacks such as SQL Injection, Cross-Site Scripting (XSS), and Denial of Service. It also highlights issues related to security misconfiguration, sensitive data exposure, and broken authentication. The comprehensive enumeration serves as a reference for understanding different types of security risks in web applications.

Uploaded by

Storm Shadow
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views2 pages

Bughutnig List of Vulnerabilities

The document lists various cybersecurity threats and vulnerabilities, including attacks such as SQL Injection, Cross-Site Scripting (XSS), and Denial of Service. It also highlights issues related to security misconfiguration, sensitive data exposure, and broken authentication. The comprehensive enumeration serves as a reference for understanding different types of security risks in web applications.

Uploaded by

Storm Shadow
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

[+] Cache Poisoning

[+] Cash Overflow


[+] Clickjacking
[+] Command injection attacks
[+] Comment Injection Attack
[+] Content Security Policy
[+] Content Spoofing
[+] Credential stuffing
[+] Cross Frame Scripting
[+] Cross Site History Manipulation (XSHM)
[+] Cross Site Tracing
[+] Cross-Site Request Forgery (CSRF)
[+] Cross Site Port Attack (XSPA)
[+] Cross-Site Scripting (XSS)
[+] Cross-User Defacement
[+] Custom Special Character Injection
[+] Denial of Service
[+] Direct Dynamic Code Evaluation (Eval Injection)
[+] Execution After Redirect (EAR)
[+] Exploitation of CORS
[+] Forced browsing
[+] Form action hijacking
[+] Format string attack
[+] Full Path Disclosure
[+] Function Injection
[+] Host Header injection
[+] HTTP Response Splitting
[+] HTTP verb tampering
[+] HTML injection
[+] LDAP injection
[+] Log Injection
[+] Man-in-the-browser attack
[+] Man-in-the-middle attack
[+] Mobile code: invoking untrusted mobile code
[+] Mobile code: non-final public field
[+] Mobile code: object hijack
[+] One-Click Attack
[+] Parameter Delimiter
[+] Page takeover
[+] Path Traversal
[+] Reflected DOM Injection
[+] Regular expression Denial of Service – ReDoS
[+] Repudiation Attack
[+] Resource Injection
[+] Server-Side Includes (SSI) Injection
[+] Session fixation
[+] Session hijacking attack
[+] Session Prediction
[+] Setting Manipulation
[+] Special Element Injection
[+] SMTP injection
[+] SQL Injection
[+] SSI injection
[+] Traffic flood
[+] Web Parameter Tampering
[+] XPATH Injection
[+] XSRF or SSRF
[+] Sql Injection Attack
[+] Hibernate Query Language Injection
[+] Direct OS Code Injection
[+] XML Entity Injection
[+] Broken Authentication and Session Management
[+] Cross-Site Scripting (XSS)
[+] Insecure Direct Object References
[+] Security Misconfiguration
[+] Sensitive Data Exposure
[+] Missing Function Level Access Control
[+] Cross-Site Request Forgery (CSRF)
[+] Using Components with Known Vulnerabilities
[+] Unvalidated Redirects and Forwards
[+] Cross Site Scripting Attacks
[+] Click Jacking Attacks
[+] DNS Cache Poisoning

You might also like