Home > taxonomy > attacks
├──Account Takeover Attacks
├──Buffer Overflow
├──Command Injection
├──Confused Deputy Attack
├──Credential Stuffing
├──Cross Site Scripting
├──Cryptographic Algorithm Attacks
├──Directory Traversal Attack
├──Dos Attack
├──Encryption Bypass
├──Error Message Exploitation
├──File Upload Vulnerabilities
├──Hash Collision Attacks
├──Insecure Session Storage
├──Insider Threats
├──Local Authentication Bypass
├──Local Cache Exploitation
├──Manipulation of Hash Functions
├──Password Guessing Or Brute Force Attacks
├──Password Policy Exploitation
├──Privilege Escalation
├──Replay Attacks
├──Session Fixation
├──Session Hijacking Or Man In The Middle
├──Session Or Data Tampering
├──Session Timeout Issues
├──Social Engineering Attack
├──Sql Injection
├──Weak Authentication Protocols
├──Weakening Encryption