Business Logic Vulnerabilities
JSON Web tokens attacks (JWT)
Encoding and Filtering
Ldap Injection
CSRF
HTTP Request Smuggling
Authentication
Host Header Injection
XSS
CORS
OAuth
SSTI
Prototype Pollution
Race Condition
Business logic vulnerabilities
Web cache poisoning