CategoryFinding NameDescriptionSeverityReference
Server-Side InjectionRemote Code Execution (RCE)Ensure that the application will not process operating system commands from the user.P1
Server MisconfigurationUsing Default CredentialsEnsure that the applciation is not using the default credentialsP1
Server-Side InjectionSQL InjectionP1
Server-Side InjectionXML External Entity Injection (XXE)P1
Server-Side InjectionAuthentication BypassP1
Server MisconfigurationSubdomain TakeoverP2
Server MisconfigurationAccount Takeover (OAuth Misconfiguration)P2
AuthorizationCross-Site Request ForgeryP2
Session FixationP3
Server misconfigurationClickjackingP4
Server MisconfigurationNo Rate LimitingP4
Weak Password PolicyP5
Broken Access ControlUsername Enumeration (Login Page)P4
Broken Access ControlUsername Enumeration (Password Reset Page)P4
Cross Site Scripting (XSS)
Stored Cross Site Scripting (XSS)
XML External Entity (XXE)
Directory Traversal
Remote file inclusion (RFI)
Local File Inclusion (LFI)
Directory listing
ASP. NET Tracing Enabled
XPath Injection
HTTP request smuggling
Web cache poisoning
DOM Cross Site Scripting (DOM XSS)
Java deserialization
Open Redirection
Session Cookie without http flag
Session Cookie without secure flag
Private IP disclosure
Application not using HTTPS
Sensitive Data Exposure (EXIF Data)
Account Takeover
OTP Bypass
2FA Bypass
Insecure direct object references (IDOR)
CORS Misconfiguration
Privilege Escalation
Unsafe HTTP Method Enabled
JWT Misconfiguration
HTML Injection
Host-Header Injection
Server-Side Template Injection
Parameter pollution