Reference

Vulnerability Encyclopedia
understand, detect, remediate

A practical reference for security professionals. Each entry covers what the vulnerability is, how to find it, and how to fix it, with CVSS scoring, compliance mapping, and detection guidance.

No credit card required. Free plan available forever.

30 vulnerabilities

CriticalCWE-89

SQL Injection

SQL injection allows attackers to manipulate database queries through unsanitised user input, potentially leading to full data breaches, authentication bypass, and remote code execution.

Read more
CriticalCWE-78

OS Command Injection

Command injection allows attackers to execute arbitrary operating system commands on the host server by injecting malicious input into application functions that pass data to system shells.

Read more
CriticalCWE-502

Insecure Deserialization

Insecure deserialization allows attackers to manipulate serialised objects to achieve remote code execution, privilege escalation, or injection attacks when the application deserialises untrusted data.

Read more
CriticalCWE-347

JWT Security Vulnerabilities

JWT vulnerabilities include weak signing algorithms, missing expiration claims, the "none" algorithm bypass, and algorithm confusion attacks that can lead to authentication bypass and token forgery.

Read more
CriticalCWE-798

Default Credentials

Default credentials provide attackers with immediate, unauthenticated access to systems and applications. They are among the first things automated scanners and botnets check.

Read more
CriticalCWE-798

Hardcoded Secrets

Hardcoded secrets (API keys, passwords, tokens, and private keys embedded in source code) are a leading cause of data breaches when code is shared, committed to repositories, or decompiled.

Read more
HighCWE-79

Cross-Site Scripting (XSS)

XSS allows attackers to inject malicious scripts into web pages viewed by other users, enabling session hijacking, credential theft, and defacement.

Read more
HighCWE-918

Server-Side Request Forgery (SSRF)

SSRF allows attackers to make the server send requests to internal services, cloud metadata endpoints, or other restricted resources, potentially leading to data exfiltration or remote code execution.

Read more
HighCWE-639

Insecure Direct Object Reference (IDOR)

IDOR occurs when an application exposes internal object references without authorisation checks, allowing attackers to access or modify other users' data by simply changing a parameter value.

Read more
HighCWE-287

Broken Authentication

Broken authentication encompasses weaknesses in login mechanisms (weak brute-force protection, predictable tokens, insecure password recovery) that allow attackers to compromise user accounts.

Read more
HighCWE-200

Sensitive Data Exposure

Sensitive data exposure occurs when applications inadvertently leak PII, credentials, API keys, or internal details through responses, logs, error messages, or insecure storage.

Read more
HighCWE-22

Path Traversal

Path traversal (directory traversal) allows attackers to access files and directories outside the intended web root by manipulating file path references with sequences like "../".

Read more
HighCWE-611

XML External Entity (XXE) Injection

XXE injection exploits misconfigured XML parsers to read local files, perform SSRF, or cause denial of service through entity expansion attacks.

Read more
HighCWE-942

CORS Misconfiguration

CORS misconfiguration occurs when overly permissive cross-origin resource sharing policies allow malicious websites to read sensitive data from your application on behalf of authenticated users.

Read more
HighCWE-672

Subdomain Takeover

Subdomain takeover occurs when a DNS record points to a deprovisioned cloud resource, allowing attackers to claim the resource and serve malicious content on a trusted subdomain.

Read more
HighCWE-434

Unrestricted File Upload

Unrestricted file upload vulnerabilities allow attackers to upload malicious files (web shells, scripts, or executables) that can lead to remote code execution on the server.

Read more
HighCWE-384

Session Fixation & Session Management

Session fixation allows attackers to set a user's session ID before authentication, gaining access to the authenticated session. Weak session management amplifies the risk.

Read more
HighCWE-1035

Vulnerable & Outdated Dependencies

Using libraries and frameworks with known vulnerabilities is one of the most common security risks. Attackers actively exploit published CVEs in outdated dependencies.

Read more
HighCWE-284

Broken Access Control

Broken access control, the #1 OWASP Top 10 category, allows users to act outside their intended permissions, accessing other users' data or performing unauthorised administrative actions.

Read more
HighCWE-284

Cloud Storage Misconfiguration

Misconfigured cloud storage buckets (AWS S3, Google Cloud Storage, Azure Blob) with public access are a leading cause of large-scale data breaches, exposing sensitive files to the internet.

Read more
MediumCWE-352

Cross-Site Request Forgery (CSRF)

CSRF tricks authenticated users into submitting unintended requests, allowing attackers to change account settings, transfer funds, or modify data without the user's knowledge.

Read more
MediumCWE-16

Security Misconfiguration

Security misconfiguration is one of the most common vulnerability categories. Missing security headers, default credentials, verbose error messages, and unnecessary services expose applications to attack.

Read more
MediumCWE-601

Open Redirect

Open redirect vulnerabilities allow attackers to redirect users from a trusted domain to a malicious site, enabling phishing attacks that leverage the trust of the vulnerable domain.

Read more
MediumCWE-326

TLS/SSL Misconfiguration

TLS/SSL misconfigurations (deprecated protocols, weak ciphers, expired certificates, and missing HSTS) expose encrypted communications to interception and downgrade attacks.

Read more
MediumCWE-693

Missing Security Headers

Missing HTTP security headers leave applications vulnerable to clickjacking, XSS, MIME sniffing, and other client-side attacks that are easily prevented with proper header configuration.

Read more
MediumCWE-521

Weak Password Policy

Weak password policies permit short or simple passwords that are easily guessed or cracked through brute-force, dictionary, or credential stuffing attacks.

Read more
MediumCWE-307

Missing Rate Limiting

Missing rate limiting allows attackers to send unlimited requests to sensitive endpoints, enabling brute-force attacks, credential stuffing, account enumeration, and denial of service.

Read more
MediumCWE-350

DNS Misconfiguration

DNS misconfigurations (missing or incorrect SPF, DKIM, and DMARC records) allow attackers to spoof your domain in phishing emails, damaging reputation and enabling social engineering.

Read more
LowCWE-548

Directory Listing

Directory listing reveals the contents of web server directories to anyone who requests them, potentially exposing backup files, configuration files, source code, and other sensitive data.

Read more
LowCWE-209

Information Disclosure

Information disclosure through verbose error messages, stack traces, server banners, and debug pages gives attackers valuable intelligence about your application's internals and attack surface.

Read more

Detect vulnerabilities automatically

SecPortal scans for all these vulnerabilities with 33+ built-in modules. External scanning, authenticated testing, and code analysis. Start free.

No credit card required. Free plan available forever.