1. Authorization
    1. Credential / Session Prediction
      1. is a method of hijacking or impersonating a user.
    2. Insufficient Authorization
      1. permits access to sensitive content or functionality that should require more access control restrictions.
    3. Insufficient Session Expiration
      1. permits an attacker to reuse old session credentials or session IDs for authorization.
    4. Session Fixation
      1. attacks force a user’s session ID to an explicit value.
  2. Authentication
    1. Brute Force
      1. attack automates a process of trial and error to guess a person’s username, password, credit-card number or cryptographic key.
    2. Insufficient Authentication
      1. permits an attacker to access sensitive content or functionality without proper authentication
    3. Weak Password Recovery Validation
      1. permits an attacker to illegally obtain, change or recover another user’s password.
  3. Information Disclosure
    1. Directory Indexing
      1. is an automatic directory listing / indexing web server function that shows all files in a requested directory if the normal base file is not present.
    2. Information Leakage
      1. occurs when a web site reveals sensitive data such as developer comments or error messages, which may aid an attacker in exploiting the system.
    3. Path Traversal
      1. forces access to files, directories and commands that potentially reside outside the web document root directory
    4. Predictable Resource Location
      1. uncovers hidden web site content and functionality.
  4. Command Execution
    1. Buffer Overflow
      1. attacks alter the flow of an application by overwriting parts of memory
    2. Format String Attack
      1. alters the flow of an application by using string formatting library features to access other memory space.
    3. LDAP Injection
      1. attacks exploit web sites by constructing LDAP statements from user-supplied input.
    4. OS Commanding
      1. executes operating system commands on a web site by manipulating application input.
    5. SQL Injection
      1. constructs illegal SQL statements on a web site application from user-supplied input
    6. SSI Injection
      1. (also called Server-side Include) sends code into a web application, which is later executed locally by the web server.
    7. XPath Injection
      1. constructs XPath queries from user-supplied input
  5. Client-side Attacks
    1. Content Spoofing
      1. tricks a user into believing that certain content appearing on a web site is legitimate and not from an external source.
    2. Cross-site Scripting
      1. (XSS) forces a web site to echo attacker-supplied executable code, which loads into a user’s browser.
  6. Logical Attacks
    1. Abuse of Functionality
      1. uses a web site’s own features and functionality to consume, defraud or circumvent access control mechanisms.
    2. Denial of Service
      1. (DoS) attacks prevent a web site from serving normal user activity.
    3. Insufficient Anti-automation
      1. is when a web site permits an attacker to automate a process that should only be performed manually.
    4. Insufficient Process Validation
      1. permits an attacker to bypass or circumvent the intended flow of an application.