Business Logic Vulnerabilities

JSON Web tokens attacks (JWT)

Encoding and Filtering

Ldap Injection

CSRF

HTTP Request Smuggling

Authentication

Host Header Injection

XSS

CORS

OAuth

SSTI

Prototype Pollution

Race Condition

Business logic vulnerabilities

Web cache poisoning