Pick a Vulnerability to Learn About
SQL Injection
Cross-site Scripting
Command Execution
Clickjacking
Cross-site Request Forgery
Reflected XSS
File Upload Vulnerabilities
Open Redirects
Unencrypted Communication
User Enumeration
Password Mismanagement
Email Spoofing
Malvertising
Logging and Monitoring
Buffer Overflows
Server-Side Request Forgery
Directory Traversal
DOM-based XSS
Broken Access Control
Information Leakage
Privilege Escalation
Session Fixation
Weak Session IDs
XML Bombs
XML External Entities
Denial of Service Attacks
Lax Security Settings
Toxic Dependencies
Host Header Poisoning
Insecure Design
Mass Assignment
Prototype Pollution
Regex Injection
Remote Code Execution
Cross-Site Script Inclusion