Description: SQL Injection occurs when an attacker can manipulate SQL queries by injecting malicious input, potentially gaining unauthorized access or manipulating data.
Documentation: SQL Injection Testing
Description: XSS vulnerabilities allow attackers to inject malicious scripts into web pages viewed by other users, which can lead to data theft or unauthorized actions.
Documentation: Cross-Site Scripting (XSS)
Description: Broken Authentication vulnerabilities occur when authentication mechanisms are not properly implemented, potentially allowing unauthorized access to user accounts or sensitive data.
Documentation: Broken Authentication
Common Passwords List: Common Passwords
Description: Sensitive Data Exposure vulnerabilities occur when sensitive data is not adequately protected, potentially leading to data breaches or unauthorized access.
Documentation: Sensitive Data Exposure
Description: Broken Access Control vulnerabilities occur when users are able to access resources or perform actions that they should not be permitted to.
Documentation: Broken Access Control
Description: CSRF vulnerabilities occur when attackers trick users into performing actions on a web application where they are authenticated, potentially leading to unauthorized actions.
Documentation: Cross-Site Request Forgery (CSRF)
Description: Insecure Deserialization vulnerabilities occur when attackers exploit deserialization processes to execute arbitrary code or tamper with application logic.
Documentation: Insecure Deserialization
Description: Security Misconfiguration vulnerabilities occur when an application or server is not securely configured, potentially exposing it to various attacks.
Documentation: Security Misconfiguration