Web Exploits (CAV – Common Attack Vectors)

Injection Attacks

  • SQL Injection (SQLi)

  • OS Command Injection (RCE)

  • XML External Entity (XXE)

  • Server-Side Template Injection (SSTI)

  • LDAP Injection

  • Expression Language Injection (EL Injection)

Cross-Site Attacks

  • Cross-Site Scripting (XSS) – Reflected, Stored, DOM

  • Cross-Site Request Forgery (CSRF)

  • Clickjacking

  • HTML Injection

Path & File Attacks

  • Directory Traversal / Path Traversal

  • Local File Inclusion (LFI)

  • Remote File Inclusion (RFI)

  • Predictable Resource Location

  • File Upload Abuse

  • Null Byte Injection

Protocol/Format Manipulation

  • HTTP Request Smuggling

  • HTTP Response Splitting

  • CRLF Injection

  • Format String Injection

  • JSON/HTTP Structure Abuse

Information Disclosure

  • Stack Trace Leakage

  • Verb Tampering

  • Debug Info Exposure

  • Misconfigured Error Pages

  • Fingerprinting Attacks (e.g., header-based)

Session & Authentication Attacks

  • Session Fixation

  • Session Prediction

  • Insecure Cookie Attributes (non-HttpOnly, persistent)

  • Insecure Password Reset Flows

  • Brute Force Detection Bypass (evasion)

Web Logic Abuse

  • Business Logic Manipulation

  • Method Override Abuse (e.g., X-HTTP-Method-Override)

  • Hidden Parameter Tampering

Miscellaneous Exploits

  • WebShell Upload Patterns

  • PHP Code Injection

  • Java Deserialization Exploits

  • SSRF (when matched by known patterns)

  • Malware Payloads (e.g., known malware signature)

Previous Post
WAF Vendor list
Next Post
Understanding WAF Scoring & Security Exposure