Proxies
Modern web applications often use intermediary proxies. These vulnerabilities require a vulnerable proxy to be in place, but they usually also need an extra vulnerability in the backend.
- Abusing hop-by-hop headers
- Cache Poisoning / Cache Deception
- HTTP Connection Contamination
- HTTP Request Smuggling
- HTTP Response Smuggling / Desync
- H2C Smuggling
- Server Side Inclusion / Edge Side Inclusion
- XSLT Server Side Injection
- Proxy / WAF Protections Bypass
User Input
Most web applications allow users to input data that will be processed later. Depending on the structure of the data the server expects, some vulnerabilities may or may not apply.
Reflected Values
If introduced data may be reflected in the response, the page might be vulnerable to several issues:Client Side Path Traversal
Exploiting path manipulation on the client side.
Command Injection
Injecting OS commands via user-controlled input.
File Inclusion / Path Traversal
Including local or remote files through path manipulation.
Open Redirect
Redirecting users to attacker-controlled URLs.
Server Side Request Forgery
Forcing the server to make requests to internal resources.
Server Side Template Injection
Injecting template expressions into server-side template engines.
XSS
Executing arbitrary JavaScript in victims’ browsers.
CRLF Injection
Injecting carriage return/line feed into HTTP headers.
Search Functionalities
If the functionality searches data inside the backend, you may be able to abuse it to search arbitrary data:- File Inclusion / Path Traversal
- NoSQL Injection
- LDAP Injection
- ReDoS (Regular Expression Denial of Service)
- SQL Injection
- ORM Injection
- XPATH Injection
Forms, WebSockets, and PostMessages
When a WebSocket posts a message or a form allows users to perform actions, vulnerabilities may arise:- Cross Site Request Forgery (CSRF)
- Cross-site WebSocket hijacking (CSWSH)
- Phone Number Injections
- PostMessage Vulnerabilities
HTTP Headers
Depending on HTTP headers given by the web server, some vulnerabilities might be present:- Clickjacking
- Iframe Traps / Click Isolation
- Content Security Policy bypass
- Cookies Hacking
- CORS Misconfigurations
Authentication Bypasses
- 2FA/OTP Bypass
- Bypass Payment Process
- Captcha Bypass
- Account Takeover Playbooks
- Login Bypass
- Race Condition
- Rate Limit Bypass
- Reset Forgotten Password Bypass
- Registration Vulnerabilities
Structured Objects & Specific Functionalities
Some functionalities require data in a very specific format (like serialized objects or XML):- Deserialization
- Email Header Injection
- JWT Vulnerabilities
- JSON / XML / YAML Hacking
- XML External Entity (XXE)
- GraphQL Attacks
- gRPC-Web Attacks
Files
Functionalities that allow uploading files might be vulnerable to several issues:- File Upload
- Formula Injection (CSV, LaTeX, etc.)
- PDF Injection
- Server Side XSS
External Identity Management
- OAUTH to Account Takeover
- SAML Attacks
Other Helpful Vulnerabilities
- Domain / Subdomain Takeover
- IDOR (Insecure Direct Object Reference)
- Mass Assignment (CWE-915)
- Parameter Pollution
- Unicode Normalization Vulnerability
Web Servers & Middleware
Misconfigurations in the edge stack often unlock more impactful bugs in the application layer:Web Servers
Web Servers
- Apache
- Nginx
- IIS (Internet Information Services)
- Tomcat
- Werkzeug Debug Exposure
- PUT Method / WebDAV
- Special HTTP Headers
- WSGI Deployment
Application Frameworks
Application Frameworks
- Django
- Flask
- NodeJS / Express
- Angular
- Vue / Nuxt
- Next.js
- Laravel
- Symfony
- Spring Actuators
CMS & Managed Platforms
CMS & Managed Platforms
- WordPress
- Joomla
- Drupal
- Moodle
- Prestashop
- Atlassian Jira
- Grafana
- Rocket.Chat
- Zabbix
- Microsoft SharePoint
- Sitecore
APIs, Buckets & Integrations
APIs, Buckets & Integrations
- Web API Pentesting
- Storage Buckets & Firebase
- Imagemagick Security
- Artifactory & Package Registries
Supply Chain & Identifier Abuse
Attacks targeting build pipelines or predictable identifiers can become initial footholds:- Dependency Confusion
- Timing Attacks
- UUID Insecurities
Web3, Extensions & Tooling
Modern applications extend into browsers, wallets, and automation pipelines:- dApps / Decentralized Applications
- Browser Extension Pentesting
- wfuzz Web Fuzzing