| Authentication / Session |
Brute Force |
No rate limit or CAPTCHA on login attempts |
Repeated login attempts |
A07 |
CWE-307 |
N/A |
| |
Credential Stuffing |
Reused credentials from data breaches are not detected/prevented |
Using known credentials in login attempts |
A07 |
CWE-798 |
N/A |
| |
Session Hijacking |
Session ID leaked, predictable, or transmitted insecurely |
Cookie theft or reuse, sniffing unencrypted traffic |
A07 |
CWE-384 |
N/A |
| |
Session Fixation |
Session ID is reused after successful login, allowing an attacker to set the SID |
Attacker sets session ID before user logs in, then it’s reused |
A07 |
CWE-384 |
N/A |
| |
IDOR (BOLA) |
Object access not validated on the server-side |
GET /order?id=1234 (changing the ID to access other users’ data) |
A01 |
CWE-639 |
CVE-2021-21300 |
| |
Privilege Escalation |
Elevated role or access via crafted request due to misconfiguration or logical flaw |
Sending {"role":"admin"} in a user profile update |
A05 |
CWE-269 |
CVE-2021-22986 |
| API / Web Services |
Mass Assignment |
Input allows modification of protected fields or unintended properties |
{"isAdmin":true} sent in a user update request |
A05 |
CWE-915 |
CVE-2020-26295 |
| |
Excessive Data Exposure |
API returns sensitive fields to unauthorized parties |
Password hash returned in a public user profile response |
A03 |
CWE-200 |
CVE-21-32648 |
| |
Broken Function-Level Auth |
Privileged actions lack proper authorization checks |
Regular user calling an admin-only API endpoint to delete a user |
A01 |
CWE-285 |
CVE-2021-21300 |
| |
Rate Limiting Bypass |
API does not sufficiently throttle requests |
Flooding a login endpoint with requests |
A04 |
CWE-770 |
N/A |
| |
GraphQL Introspection |
Schema definition is visible in production environments, providing attack surface info |
Using __schema query to retrieve the API schema |
A06 |
CWE-200 |
N/A |
| |
GraphQL Query DoS |
Deeply nested or complex queries exhaust server resources |
Crafting deeply nested fragments |
A08 |
CWE-400 |
N/A |
| Network Interaction |
CSRF |
No CSRF token validation to prevent cross-site request forgery |
Malicious <img> tag pointing to sensitive action (e.g., <img src="/transfer">) |
A01 |
CWE-352 |
CVE-2018-1000525 |
| |
MITM |
Traffic intercepted over unencrypted HTTP or via network manipulation |
Stealing login credentials on an open Wi-Fi network |
A02 |
CWE-311 |
N/A |
| |
Session Hijacking (Network) |
Session token sniffed from unencrypted network traffic |
Cookie stolen on open Wi-Fi |
A07 |
CWE-384 |
N/A |
| |
DoS / DDoS |
Malformed or high-volume requests overwhelm server resources |
SYN Flood, Slowloris attacks |
A06 |
CWE-400 |
N/A |
| Error Handling / Logs |
Information Disclosure |
Stack trace, internal paths, or credentials displayed in error messages |
Database error shows secrets like username/password |
A06 |
CWE-209 |
CVE-2020-17453 |
| |
Log Forging |
Unsanitized user input is injected into log files |
Injecting newline characters like \nadmin login OK into a username field |
A09 |
CWE-117 |
N/A |
| Serialization / Deserialization |
Insecure Deserialization |
Crafted serialized object leads to arbitrary code execution |
Malicious Java ObjectInputStream payload |
A08 |
CWE-502 |
CVE-2015-4852 |
| |
WhatsApp Voice Call RCE |
Binary deserialization vulnerability in specific application context |
Exploitation of CVE-2019-3568 (Pegasus) through a voice call |
A08 |
CWE-787, CWE-502 |
CVE-2019-3568 |
| |
Python Pickle Injection |
Deserializing untrusted data using pickle.loads() |
Exploiting Flask session cookies to achieve RCE |
A08 |
CWE-502 |
N/A |
| |
ViewState Exploitation (.NET) |
ViewState MAC missing or weak, allowing injected state data to be processed |
Tampering with ViewState to bypass validation or execute code |
A08 |
CWE-502 |
CVE-2017-11317 |
| Miscellaneous |
Host Header Injection |
Unvalidated Host header used in application logic |
Host: evil.com to poison web cache or reset links |
A05 |
CWE-641 |
CVE-2021-32791 |
| |
Race Condition |
Timing flaw between concurrent actions allowing manipulation |
Rapidly performing a double transfer of funds |
A01 |
CWE-362 |
CVE-2021-36740 |
| |
Clickjacking |
UI redress via iframe due to missing security headers |
Hidden iframe overlaying a legitimate button |
A05 |
CWE-1021 |
CVE-2021-32027 |
| |
Web Cache Poisoning |
Cache reflects malicious input due to unvalidated headers/parameters |
Poisoned URL cached for all users |
A06 |
CWE-113 |
CVE-2021-22876 |
| |
Subdomain Takeover |
DNS points to unclaimed cloud asset or external service |
Hijacking s3.example.com when the S3 bucket is deleted |
A05 |
CWE-400 |
N/A |