Last updated 1 year ago
Excessive trust in client- side controls
2FA Broken Logic
High-level logic vulnerability
Inconsistent handling of exceptional input
Inconsistent security controls
Weak isolation on dual-use endpoint
Low-level logic flaw
Infinite Money Logic Flaw