V studii (IBM Rational security experts, prosinec 2007)
jsu vyjmenovány a stru?n? rozebírány následující útoky:
- Cookie poisoning
- Hidden field manipulation
- Parameter tampering
- Buffer overflow
- Cross-site scripting
- Exploizing backdoor and debug options
- Forceful browsing
- Http response splitting
- Stealth/Trojan horse
- Exploiting a third-party misconfiguration
- Exploiting known vulnerabilities
- Exploiting XML and Web services vulnerabilities