Skip to main content
Offensive360
Home / Knowledge Base

Vulnerability Knowledge Base

Security vulnerability encyclopedia with real code examples, detection guidance, and remediation steps. Each entry maps to a vulnerability Offensive360 SAST detects automatically.

5 Critical 7 Medium 17 High 1 Low 30 total entries

Broken Access Control / IDOR

Critical

Broken access control and Insecure Direct Object Reference (IDOR) flaws let attackers access or modify resources they don't own. Learn detection patterns and secure authorization practices.

CWE-639 A01:2021 Broken Access Control

Broken Authentication

Critical

Broken Authentication encompasses flaws in authentication mechanisms that allow attackers to compromise passwords, session tokens, or exploit implementation flaws to assume other users' identities.

CWE-287 A07:2021 Identification and Authentication Failures

Clickjacking / UI Redress Attack

Medium

Clickjacking tricks users into clicking invisible iframe overlays to perform unintended actions. Learn how X-Frame-Options, Content Security Policy, and frame-busting prevent these attacks.

CWE-1021 A05:2021 Security Misconfiguration

Cross-Site Request Forgery (CSRF)

High

CSRF tricks authenticated users into unknowingly submitting malicious requests. Learn how CSRF tokens, SameSite cookies, and origin validation prevent these attacks.

CWE-352 A01:2021 Broken Access Control

Cross-Site Scripting (XSS)

High

XSS occurs when applications include untrusted data in web pages without proper encoding, allowing attackers to execute malicious scripts in victims' browsers.

CWE-79 A03:2021 Injection

Hardcoded Credentials and Secrets

High

Hardcoded credentials occur when passwords, API keys, cryptographic keys, or other secrets are embedded directly in source code, configuration files, or build artifacts, making them accessible to anyone with code access.

CWE-798 A07:2021 Identification and Authentication Failures

HTTP Response Splitting

High

HTTP response splitting injects CRLF sequences into HTTP headers, allowing attackers to craft malicious responses, conduct cache poisoning, and perform cross-site scripting attacks.

CWE-113 A03:2021 Injection

Insecure Deserialization

High

Insecure Deserialization occurs when an application deserializes untrusted data without validation, potentially allowing attackers to execute arbitrary code, tamper with application logic, or perform denial-of-service attacks.

CWE-502 A08:2021 Software and Data Integrity Failures

Insecure JWT Implementation

High

Flawed JWT implementations allow attackers to forge tokens, bypass authentication, and escalate privileges. Learn common JWT pitfalls including algorithm confusion, none algorithm, and weak secrets.

CWE-347 A02:2021 Cryptographic Failures

Insecure Randomness

Medium

Using weak or predictable random number generators for security-sensitive values like tokens, session IDs, and OTPs allows attackers to predict or brute-force these values. Learn which APIs to use.

CWE-330 A02:2021 Cryptographic Failures

LDAP Injection

High

LDAP Injection allows attackers to manipulate directory queries, bypass authentication, and extract sensitive directory information. Learn how to detect and prevent it.

CWE-90 A03:2021 Injection

Log Injection / Log Forging

Medium

Log injection allows attackers to insert fake log entries or newline characters into application logs, obscuring malicious activity and potentially attacking log management systems downstream.

CWE-117 A09:2021 Security Logging and Monitoring Failures

Mass Assignment

High

Mass assignment vulnerabilities allow attackers to set unintended model properties by submitting extra fields in HTTP requests, leading to privilege escalation and data tampering. Learn how to use DTOs and property allow-lists.

CWE-915 A04:2021 Insecure Design

Missing Security Headers

Low

Missing HTTP security headers leave applications vulnerable to clickjacking, MIME sniffing, XSS, and information disclosure. Learn which headers are essential and how to configure them.

CWE-693 A05:2021 Security Misconfiguration

NoSQL Injection (MongoDB)

High

NoSQL injection attacks manipulate MongoDB and other NoSQL queries using operator injection, allowing authentication bypass and unauthorized data access. Learn detection and prevention.

CWE-943 A03:2021 Injection

Open Redirect

Medium

Open redirect vulnerabilities allow attackers to redirect users from a trusted site to a malicious URL, enabling phishing and credential harvesting. Learn detection and prevention.

CWE-601 A01:2021 Broken Access Control

OS Command Injection

Critical

OS Command Injection occurs when an application passes unsanitized user input to a system shell, allowing attackers to execute arbitrary commands on the host operating system. Learn how to detect and prevent command injection across languages.

CWE-78 A03:2021 Injection

Path Traversal

High

Path Traversal (Directory Traversal) allows attackers to access files outside the intended directory by manipulating file path inputs with sequences like ../. Learn how to detect and prevent path traversal across languages.

CWE-22 A01:2021 Broken Access Control

Prototype Pollution

High

Prototype pollution is a JavaScript vulnerability that allows attackers to inject properties into Object.prototype, affecting all objects in the application and potentially leading to RCE or privilege escalation.

CWE-1321 A03:2021 Injection

Race Condition / TOCTOU

High

Race conditions occur when application behavior depends on the timing of concurrent operations. TOCTOU flaws allow attackers to exploit the gap between check and use, leading to privilege escalation, double-spending, and data corruption.

CWE-362 A04:2021 Insecure Design

Sensitive Data Exposure in Logs

Medium

Logging sensitive data such as passwords, tokens, PII, and credit card numbers creates security and compliance risks when logs are stored, transmitted, or accessed by unauthorized parties.

CWE-532 A09:2021 Security Logging and Monitoring Failures

Server-Side Request Forgery (SSRF)

High

Server-Side Request Forgery occurs when an attacker can make a server-side application send HTTP requests to an attacker-chosen destination, enabling access to internal services, cloud metadata, and internal networks.

CWE-918 A10:2021 Server-Side Request Forgery

Server-Side Template Injection (SSTI)

Critical

SSTI occurs when user input is embedded in server-side templates and evaluated as code, leading to remote code execution. Learn detection and prevention across Jinja2, Twig, Razor, and more.

CWE-94 A03:2021 Injection

SQL Injection (SQLi)

Critical

SQL Injection occurs when untrusted input is concatenated into SQL queries, allowing attackers to read, modify, or delete database contents. Learn how to detect and prevent SQLi across languages.

CWE-89 A03:2021 Injection

Unrestricted File Upload

High

Unrestricted file upload vulnerabilities allow attackers to upload malicious files that can lead to remote code execution, XSS, or server compromise. Learn validation and storage best practices.

CWE-434 A04:2021 Insecure Design

Use of Broken or Weak Cryptographic Algorithms

Medium

Insecure cryptography occurs when applications use outdated, broken, or improperly configured cryptographic algorithms, making encrypted data vulnerable to decryption, tampering, or forgery.

CWE-327 A02:2021 Cryptographic Failures

Weak Password Hashing

High

Storing passwords with weak or fast hash algorithms (MD5, SHA-1, unsalted SHA-256) allows attackers to crack them rapidly after a database breach. Learn proper password hashing with bcrypt, Argon2, and PBKDF2.

CWE-916 A02:2021 Cryptographic Failures

XML External Entity (XXE) Injection

High

XML External Entity (XXE) injection occurs when an application parses XML input containing references to external entities, allowing attackers to read local files, perform SSRF, or cause denial of service.

CWE-611 A05:2021 Security Misconfiguration

XML Injection

Medium

XML injection allows attackers to insert malicious XML content into documents, leading to data corruption, access control bypass, and manipulation of XML-based application logic.

CWE-91 A03:2021 Injection

XPath Injection

High

XPath injection allows attackers to manipulate XML database queries to bypass authentication, extract unauthorized data, and enumerate XML document structure. Learn detection and secure parameterization.

CWE-643 A03:2021 Injection

Detect all of these in your code automatically

Offensive360 SAST scans your codebase for every vulnerability in this library — and hundreds more. Get a full security report in minutes.

Start a Free Scan