By topics
Application logic vulnerabilities
Application logic vulnerabilities occur when design and coding decisions allow the normal logic of the application to be manipulated by attackers.
Broken authentication
Broken authentication occurs when attackers can compromise the identity of users, often through weak or flawed authentication mechanisms.
Insecure direct object references (IDOR)
Insecure direct object references (IDOR) occur when an application provides direct access to objects based on user-supplied input, without properly validating whether the user is authorized to access that resource.
