|
DOM-Based XSS
|
6/100 |
low-risk
|
|
Disable Security Software
|
6/100 |
low-risk
|
|
Forceful Browsing
|
6/100 |
low-risk
|
|
Embedding Scripts within Scripts
|
6/100 |
low-risk
|
|
Bypassing of Intermediate Forms in Multiple-Form Sets
|
6/100 |
low-risk
|
|
Run Software at Logon
|
6/100 |
low-risk
|
|
AJAX Footprinting
|
6/100 |
low-risk
|
|
Add Malicious File to Shared Webroot
|
6/100 |
low-risk
|
|
Modify Shared File
|
6/100 |
low-risk
|
|
Replace Trusted Executable
|
6/100 |
low-risk
|
|
Replace File Extension Handlers
|
6/100 |
low-risk
|
|
WebView Exposure
|
6/100 |
low-risk
|
|
Modify Existing Service
|
6/100 |
low-risk
|
|
Install New Service
|
6/100 |
low-risk
|
|
Using Malicious Files
|
6/100 |
low-risk
|
|
Incomplete Data Deletion in a Multi-Tenant Environment
|
6/100 |
low-risk
|
|
Data Injected During Configuration
|
6/100 |
low-risk
|
|
Spoof Version Control System Commit Metadata
|
5/100 |
low-risk
|
|
Hijacking a privileged process
|
5/100 |
low-risk
|
|
Leveraging Race Conditions
|
5/100 |
low-risk
|
|
Exploitation of Trusted Identifiers
|
5/100 |
low-risk
|
|
Hijacking a Privileged Thread of Execution
|
5/100 |
low-risk
|
|
Signing Malicious Code
|
5/100 |
low-risk
|
|
Reverse Engineer an Executable to Expose Assumed Hidden Functionality
|
5/100 |
low-risk
|
|
Black Box Reverse Engineering
|
5/100 |
low-risk
|
|
Malicious Automated Software Update via Redirection
|
5/100 |
low-risk
|
|
Malicious Software Update
|
5/100 |
low-risk
|
|
Malicious Software Download
|
5/100 |
low-risk
|
|
Software Integrity Attack
|
5/100 |
low-risk
|
|
HTTP Response Splitting
|
5/100 |
low-risk
|
|
Regular Expression Exponential Blowup
|
5/100 |
low-risk
|
|
Poison Web Service Registry
|
5/100 |
low-risk
|
|
Malicious Manual Software Update
|
5/100 |
low-risk
|
|
Overread Buffers
|
5/100 |
low-risk
|
|
XML Ping of the Death
|
5/100 |
low-risk
|
|
Use of Known Domain Credentials
|
5/100 |
low-risk
|
|
Reflected XSS
|
5/100 |
low-risk
|
|
Stored XSS
|
5/100 |
low-risk
|
|
Try All Common Switches
|
5/100 |
low-risk
|
|
Credential Stuffing
|
5/100 |
low-risk
|
|
Replace Binaries
|
5/100 |
low-risk
|
|
Use of Known Operating System Credentials
|
5/100 |
low-risk
|
|
Malicious Automated Software Update via Spoofing
|
5/100 |
low-risk
|
|
Spoof Open-Source Software Metadata
|
5/100 |
low-risk
|
|
StarJacking
|
5/100 |
low-risk
|
|
Manipulating State
|
5/100 |
low-risk
|
|
Cross Site Tracing
|
5/100 |
low-risk
|
|
HTTP Request Splitting
|
5/100 |
low-risk
|
|
XQuery Injection
|
5/100 |
low-risk
|
|
PHP Remote File Inclusion
|
4/100 |
low-risk
|
|
Generic Cross-Browser Cross-Domain Theft
|
4/100 |
low-risk
|
|
XSS Through HTTP Headers
|
4/100 |
low-risk
|
|
Padding Oracle Crypto Attack
|
4/100 |
low-risk
|
|
Session Credential Falsification through Manipulation
|
4/100 |
low-risk
|
|
Session Sidejacking
|
4/100 |
low-risk
|
|
XSS Through HTTP Query Strings
|
4/100 |
low-risk
|
|
Kerberoasting
|
4/100 |
low-risk
|
|
Session Fixation
|
4/100 |
low-risk
|
|
Brute Force
|
4/100 |
low-risk
|
|
Use of Captured Hashes (Pass The Hash)
|
4/100 |
low-risk
|
|
Use of Captured Tickets (Pass The Ticket)
|
4/100 |
low-risk
|
|
Encryption Brute Forcing
|
4/100 |
low-risk
|
|
XML Schema Poisoning
|
4/100 |
low-risk
|
|
Exploiting Incorrectly Configured Access Control Security Levels
|
4/100 |
low-risk
|
|
Windows Admin Shares with Stolen Credentials
|
4/100 |
low-risk
|
|
XSS Targeting Non-Script Elements
|
4/100 |
low-risk
|
|
Remote Services with Stolen Credentials
|
4/100 |
low-risk
|
|
XML Routing Detour Attacks
|
4/100 |
low-risk
|
|
Adversary in the Browser (AiTB)
|
4/100 |
low-risk
|
|
Creating a Rogue Certification Authority Certificate
|
4/100 |
low-risk
|
|
DNS Cache Poisoning
|
3/100 |
low-risk
|
|
ICMP Fragmentation
|
3/100 |
low-risk
|
|
Probe iOS Screenshots
|
3/100 |
low-risk
|
|
Dictionary-based Password Attack
|
3/100 |
low-risk
|
|
Exploit Script-Based APIs
|
3/100 |
low-risk
|
|
BlueSmacking
|
3/100 |
low-risk
|
|
Root/Jailbreak Detection Evasion via Debugging
|
3/100 |
low-risk
|
|
Resource Leak Exposure
|
3/100 |
low-risk
|
|
Excessive Allocation
|
3/100 |
low-risk
|
|
Exploit Non-Production Interfaces
|
3/100 |
low-risk
|
|
Pointer Manipulation
|
3/100 |
low-risk
|
|
Pharming
|
3/100 |
low-risk
|
|
Flooding
|
3/100 |
low-risk
|
|
HTTP DoS
|
3/100 |
low-risk
|
|
Evercookie
|
3/100 |
low-risk
|
|
Leveraging Race Conditions via Symbolic Links
|
3/100 |
low-risk
|
|
Manipulating Opaque Client-based Data Tokens
|
3/100 |
low-risk
|
|
TCP Flood
|
3/100 |
low-risk
|
|
Signature Spoofing by Key Recreation
|
3/100 |
low-risk
|
|
UDP Flood
|
3/100 |
low-risk
|
|
ICMP Flood
|
3/100 |
low-risk
|
|
Inter-component Protocol Manipulation
|
3/100 |
low-risk
|
|
Password Spraying
|
3/100 |
low-risk
|
|
HTTP Flood
|
3/100 |
low-risk
|
|
Serialized Data Parameter Blowup
|
3/100 |
low-risk
|
|
Cache Poisoning
|
3/100 |
low-risk
|
|
Protocol Analysis
|
3/100 |
low-risk
|
|
SSL Flood
|
3/100 |
low-risk
|
|
Session Credential Falsification through Forging
|
3/100 |
low-risk
|
|
Password Brute Forcing
|
3/100 |
low-risk
|