Security Vulnerability Guides
In-depth guides to understanding and preventing the most common security vulnerabilities. Written for developers, by security engineers.
SQL Injection
Exploit database queries by injecting malicious SQL through unsanitized user input.
Cross-Site Scripting (XSS)
Inject malicious scripts into web pages viewed by other users through reflected, stored, or DOM-based vectors.
Server-Side Request Forgery (SSRF)
Force a server to make requests to unintended locations, accessing internal services or cloud metadata.
Insecure Direct Object Reference (IDOR)
Access unauthorized resources by manipulating object identifiers in API requests or URLs.
OS Command Injection
Execute arbitrary operating system commands through an application that passes unsafe user input to a shell.
NoSQL Injection
Manipulate NoSQL database queries by injecting operators or malicious payloads into MongoDB, Redis, or similar systems.
Server-Side Template Injection (SSTI)
Inject template directives into server-side templates to achieve remote code execution.
XML External Entity (XXE)
Exploit XML parsers to read local files, perform SSRF, or cause denial of service via entity expansion.
Cross-Site Request Forgery (CSRF)
Trick authenticated users into performing unintended actions on a web application they are logged into.
Broken Access Control
Bypass authorization checks to access resources, perform actions, or view data without proper permissions.
Authentication Failures
Exploit weak authentication mechanisms including credential stuffing, brute force, and session management flaws.
Cryptographic Failures
Exploit weak encryption, broken hashing, hardcoded secrets, or missing encryption to expose sensitive data.
Insecure Deserialization
Manipulate serialized objects to achieve remote code execution, privilege escalation, or data tampering.
Security Misconfiguration
Exploit default credentials, unnecessary features, verbose errors, and missing security headers.
Vulnerable & Outdated Components
Target known vulnerabilities in third-party libraries, frameworks, and dependencies used by applications.
JWT Vulnerabilities
Exploit weak signing algorithms, missing expiry, none algorithm attacks, and claim tampering in JSON Web Tokens.
Mass Assignment
Modify object properties that should not be user-controllable by sending additional fields in API requests.
Race Conditions
Exploit timing windows in concurrent operations to bypass limits, duplicate transactions, or corrupt data.
Prototype Pollution
Inject properties into JavaScript object prototypes to alter application behavior or achieve code execution.
Path Traversal
Access files outside the intended directory by manipulating file paths with ../ sequences or encoding tricks.
LDAP Injection
Manipulate LDAP queries to bypass authentication or extract directory information from LDAP servers.
CRLF Injection
Inject carriage return and line feed characters to split HTTP responses or manipulate log entries.
HTTP Header Injection
Inject malicious headers into HTTP responses to perform cache poisoning, XSS, or session fixation.
CORS Misconfiguration
Exploit permissive cross-origin resource sharing policies to steal data from authenticated API endpoints.
Open Redirect
Redirect users to malicious websites by manipulating URL parameters trusted by the application.
Session Fixation
Force a user to authenticate with a session ID known to the attacker, enabling session hijacking.
Session Hijacking
Steal or predict session tokens to impersonate authenticated users without knowing their credentials.
Brute Force Attacks
Systematically attempt all possible passwords or tokens to gain unauthorized access to accounts or resources.
Missing Rate Limiting
Abuse API endpoints without request throttling to perform credential stuffing, data scraping, or denial of service.
Business Logic Flaws
Exploit flawed application logic to manipulate prices, bypass workflows, or abuse intended functionality.
GraphQL Injection
Exploit GraphQL APIs through introspection, batching attacks, nested queries, or injection in query variables.
Dependency Confusion
Trick package managers into installing malicious packages from public registries instead of private ones.
Supply Chain Attacks
Compromise software dependencies, build pipelines, or package registries to inject malicious code at scale.
Code Injection
Inject and execute arbitrary code through eval(), dynamic imports, or unsafe code generation mechanisms.
XPath Injection
Manipulate XPath queries to bypass authentication or extract data from XML-based data stores.
CSV Injection
Inject formulas into CSV exports that execute when opened in spreadsheet applications like Excel.
Log Injection
Inject malicious content into log files to forge entries, exploit log viewers, or trigger log-based attacks.
DOM-Based XSS
Manipulate the Document Object Model to execute scripts without the payload ever reaching the server.
Clickjacking
Overlay transparent frames to trick users into clicking hidden elements, performing unintended actions.
Privilege Escalation
Gain higher-level permissions by exploiting flaws in role checks, admin endpoints, or function-level authorization.
Sensitive Data Exposure
Access unprotected sensitive data through verbose errors, debug endpoints, source maps, or improper storage.
Insufficient Logging & Monitoring
Exploit blind spots in application logging to perform attacks without detection or forensic traceability.
OAuth Misconfiguration
Exploit flawed OAuth implementations including redirect URI manipulation, token leakage, and scope abuse.
WebView Injection
Inject malicious content into mobile WebView components to steal data or execute code in the app context.
Certificate Pinning Bypass
Intercept encrypted mobile traffic by bypassing SSL/TLS certificate validation in mobile applications.
Insecure Data Storage
Access sensitive data stored without encryption in SharedPreferences, Keychain, or local databases on mobile devices.
Hardcoded Secrets
Extract API keys, passwords, and tokens embedded directly in source code, configuration files, or compiled binaries.
Weak Hashing Algorithms
Crack passwords or forge data integrity by exploiting outdated hash functions like MD5 or SHA-1.
Missing Encryption at Rest
Access sensitive data stored in plaintext in databases, files, or backups without encryption protection.
API Security Best Practices
Prevent common API vulnerabilities including BOLA, excessive data exposure, and broken function-level auth.
Start Practicing Now
Go beyond reading — find and fix real vulnerabilities in interactive code challenges.
Try Free Demo