Information disclosure
HTTP request smuggling
HTTP Host header attacks
File upload vulnerabilities
Essential skills
DOM-based vulnerabilities
Directory traversal
Cross-site scripting
Cross-site request forgery
Cross-origin resource sharing