Application Security

  1. Common Vulnerability Categories
    1. Injection Vulnerabilities
      1. SQL Injection
        1. Classic SQL Injection
          1. Blind SQL Injection
            1. Time-Based SQL Injection
              1. Prevention Techniques
              2. NoSQL Injection
                1. MongoDB Injection
                  1. CouchDB Injection
                    1. Prevention Strategies
                    2. Command Injection
                      1. OS Command Injection
                        1. Code Injection
                          1. Prevention Methods
                          2. LDAP Injection
                            1. LDAP Query Manipulation
                              1. Prevention Approaches
                              2. XPath Injection
                                1. XPath Query Manipulation
                                  1. Prevention Techniques
                                2. Cross-Site Scripting
                                  1. Reflected XSS
                                    1. Attack Mechanics
                                      1. Detection Methods
                                        1. Prevention Strategies
                                        2. Stored XSS
                                          1. Persistent XSS Attacks
                                            1. Impact Assessment
                                              1. Mitigation Techniques
                                              2. DOM-Based XSS
                                                1. Client-Side Vulnerabilities
                                                  1. JavaScript Context Issues
                                                    1. Prevention Approaches
                                                    2. XSS Prevention
                                                      1. Output Encoding
                                                        1. Content Security Policy
                                                          1. Input Validation
                                                        2. Authentication Vulnerabilities
                                                          1. Broken Authentication
                                                            1. Weak Password Policies
                                                              1. Session Management Flaws
                                                                1. Credential Exposure
                                                                2. Session Management Issues
                                                                  1. Session Fixation
                                                                    1. Session Hijacking
                                                                      1. Insecure Session Storage
                                                                      2. Multi-Factor Authentication Bypass
                                                                        1. MFA Implementation Flaws
                                                                          1. Backup Authentication Methods
                                                                            1. Social Engineering Attacks
                                                                          2. Authorization Vulnerabilities
                                                                            1. Broken Access Control
                                                                              1. Vertical Privilege Escalation
                                                                                1. Horizontal Privilege Escalation
                                                                                  1. Function-Level Access Control
                                                                                  2. Insecure Direct Object References
                                                                                    1. Parameter Manipulation
                                                                                      1. Resource Enumeration
                                                                                        1. Access Control Bypass
                                                                                        2. Missing Authorization Checks
                                                                                          1. Endpoint Protection
                                                                                            1. Resource Access Control
                                                                                              1. Administrative Function Protection
                                                                                            2. Data Exposure Vulnerabilities
                                                                                              1. Sensitive Data Exposure
                                                                                                1. Data in Transit
                                                                                                  1. Data at Rest
                                                                                                    1. Data in Memory
                                                                                                    2. Information Disclosure
                                                                                                      1. Error Message Disclosure
                                                                                                        1. Debug Information Exposure
                                                                                                          1. System Information Leakage
                                                                                                          2. Cryptographic Failures
                                                                                                            1. Weak Encryption
                                                                                                              1. Poor Key Management
                                                                                                                1. Algorithm Vulnerabilities
                                                                                                              2. Security Misconfiguration
                                                                                                                1. Default Configurations
                                                                                                                  1. Default Accounts
                                                                                                                    1. Default Passwords
                                                                                                                      1. Unnecessary Services
                                                                                                                      2. Improper Error Handling
                                                                                                                        1. Verbose Error Messages
                                                                                                                          1. Stack Trace Exposure
                                                                                                                            1. Debug Mode in Production
                                                                                                                            2. Missing Security Headers
                                                                                                                              1. HTTP Security Headers
                                                                                                                                1. CORS Misconfiguration
                                                                                                                                  1. Content Type Sniffing
                                                                                                                                2. Advanced Vulnerability Types
                                                                                                                                  1. XML External Entity Attacks
                                                                                                                                    1. XXE Attack Vectors
                                                                                                                                      1. Prevention Techniques
                                                                                                                                        1. Parser Configuration
                                                                                                                                        2. Insecure Deserialization
                                                                                                                                          1. Object Injection
                                                                                                                                            1. Remote Code Execution
                                                                                                                                              1. Prevention Strategies
                                                                                                                                              2. Server-Side Request Forgery
                                                                                                                                                1. SSRF Attack Scenarios
                                                                                                                                                  1. Internal Network Access
                                                                                                                                                    1. Prevention Methods
                                                                                                                                                    2. Cross-Site Request Forgery
                                                                                                                                                      1. CSRF Attack Mechanics
                                                                                                                                                        1. Token-Based Protection