- Chaining Low Impact Bugs with Xss
- No Rate Limit On Login with Weak Password Policy
- Password Reset Poisoning Leads To Token Theft
- Using Auth Bypass
- Using CSRF
- Using Sensitive Data Exposure
- Token Leaks In Response
- CORS
- [CORS Bypasses](./CORS/CORS Bypasses.md)
- CSRF
- [CSRF Bypass](./CSRF/Cross Site Request Forgery(CSRF) Bypass.md)