Application security (AppSec) is a critical component of modern software development. With the rapid evolution of cyber threats, organizations must be aware of the diverse vulnerabilities that attackers exploit. This article outlines 99 different types of application security vulnerabilities, categorized by security domain.
Application security (AppSec) is a critical component of modern software development. With the rapid evolution of cyber threats, organizations must be aware of the diverse vulnerabilities that attackers exploit. This article outlines 99 different types of application security vulnerabilities, categorized by security domain.
SQL Injection (SQLi)
Command Injection
LDAP Injection
XML External Entity (XXE) Injection
Code Injection
Server-Side Template Injection
Log Injection
CRLF Injection
NoSQL Injection
Expression Language Injection
Stored XSS
Reflected XSS
DOM-based XSS
Self-XSS
Blind XSS
Mutation-based XSS
PostMessage XSS
Client-Side Template Injection
Universal XSS (UXSS)
WebSocket XSS
Weak Password Policies
Default Credentials Left Unchanged
Missing Multi-Factor Authentication (MFA)
Credential Stuffing Vulnerability
Session Fixation
Session Hijacking
Token Theft / JWT Manipulation
Improper Logout Implementation
Insecure Remember Me Functionality
Open Redirect Leading to Phishing
Broken Access Control
Insecure Direct Object References (IDOR)
Missing Role-Based Access Control (RBAC)
Missing Attribute-Based Access Control (ABAC)
Vertical Privilege Escalation
Horizontal Privilege Escalation
Bypassing Authentication via Forced Browsing
Unprotected API Endpoints
Improperly Configured OAuth 2.0
Overly Permissive Authorization Policies
Hardcoded Secrets in Source Code
Insufficient Transport Layer Protection (No HTTPS)
Unencrypted Sensitive Data in Transit
Unencrypted Sensitive Data at Rest
Exposure of Personally Identifiable Information (PII)
Weak or Outdated Cryptographic Algorithms
Improper Key Management Practices
Information Leakage via HTTP Headers
Exposed Database Backups
Leaky Error Messages Revealing System Details
Default Admin Pages Left Accessible
Directory Listing Enabled
Unrestricted File Uploads
Improper CORS (Cross-Origin Resource Sharing) Configuration
Exposed Debugging or Verbose Logging Information
Open Ports and Unnecessary Services Running
Overly Permissive Cloud Storage (e.g., Open S3 Buckets)
Unpatched Third-Party Components
Misconfigured Permissions on Critical Files
Insecure API Gateway Configuration
Price Manipulation via Parameter Tampering
Unvalidated Discount Coupon Manipulation
Bypassing Rate Limits (Brute Force Attack)
Missing Authorization Checks on Critical Actions
Improper Input Validation Leading to Business Process Manipulation
Insecure Payment Processing Flows
Account Takeover via Weak Account Recovery Mechanisms
Exploiting Weak CAPTCHA Implementations
Time-of-Check to Time-of-Use (TOCTOU) Issues
Logic Bombs Injected into Business Workflows
Insecure Cross-Origin Resource Sharing (CORS) Policy
Insufficient API Rate Limiting & Abuse Protection
CSRF (Cross-Site Request Forgery) Attacks
Broken API Authentication
Exposing Internal APIs to Public Networks
Excessive Data Exposure via API Responses
Improper Use of OAuth & OpenID Connect (OIDC)
API Endpoint Enumeration Leading to Information Disclosure
Server-Side Request Forgery (SSRF)
Broken GraphQL Query Security
Insecure Storage of Credentials in Mobile Apps
Lack of Jailbreak/Root Detection
Exposed API Keys in Mobile Applications
Reverse Engineering of Mobile Applications
Insecure Inter-Process Communication (IPC)
WebView Vulnerabilities in Hybrid Apps
Weak Certificate Pinning Implementation
Insufficient Protection Against Man-in-the-Middle (MITM) Attacks
Code Injection via Mobile App Debug Features
Improper Use of WebSockets in Mobile Apps
Unprotected Docker Daemon Exposure
Insecure Kubernetes API Configuration
Misconfigured IAM Roles in Cloud Platforms
Hardcoded Cloud Storage Keys in Source Code
Exposed Serverless Functions Without Authentication
Lack of Least Privilege for Cloud Services
Open Storage Buckets (S3, Azure Blob, Google Cloud Storage)
Failure to Patch Container Images Regularly
Publicly Accessible Cloud Admin Consoles
Understanding the wide range of AppSec vulnerabilities is crucial for developing secure applications. While automated security tools like Snyk, GitHub Security, and Checkmarx can identify these issues, effective remediation requires clear ownership and accountability.
Using ezRACI, organizations can:
Assign responsibility (RACI) for vulnerability fixes.
Ensure security teams and developers collaborate efficiently.
Track remediation timelines with Kanban and Gantt views.
Automate alerts and compliance reporting.
By leveraging ezRACI, organizations can move from reactive vulnerability management to a proactive, structured, and accountable security strategy.
Want to improve your AppSec remediation process? Learn how ezRACI can help streamline vulnerability management with automated role assignments, tracking, and compliance enforcement. Schedule a demo today!