Authentication Bypass: Exploiting Weak Credentials and Logic Flaws
Session Hijacking: Understanding and Preventing Session Management Vulnerabilities