Security Knowledge Base
Vulnerability Wiki
Comprehensive reference for web security vulnerabilities. Each entry explains how the attack works, its impact, how ShieldReport detects it, and how to fix it with real code examples.
28
Vulnerabilities
17
Categories
OWASP
Aligned
Injection
Cross-Site Scripting (XSS)
highA03:2021 / CWE-79
Cross-Site Scripting (XSS) occurs when an attacker injects malicious scripts into web pages viewed by other users. The browser executes the script because it trusts the content served by the website.
SQL Injection (SQLi)
criticalA03:2021 / CWE-89
SQL Injection allows attackers to interfere with database queries by inserting malicious SQL code through user-controlled input fields.
XML External Entity (XXE)
highA05:2021 / CWE-611
XXE attacks target applications that parse XML input by exploiting external entity processing to read local files, perform SSRF, or cause denial of service.
Insecure Deserialization
criticalA08:2021 / CWE-502
Insecure deserialization occurs when applications deserialize data from untrusted sources without validation, allowing attackers to manipulate serialized objects.
Directory Traversal (Path Traversal)
highDirectory traversal attacks exploit insufficient input validation to access files and directories outside the intended directory, using sequences like ../ to navigate the file system.
Session Management
Broken Access Control
Server Security
Configuration
Missing Security Headers
mediumA05:2021 / CWE-693
Web applications that don't set security-related HTTP response headers leave browsers without instructions on how to protect against common attacks.
Security Misconfiguration
mediumA05:2021 / CWE-16
Security misconfiguration covers a broad range of issues from default credentials and unnecessary features enabled, to overly permissive CORS policies and exposed debug endpoints.
CORS Misconfiguration
mediumCross-Origin Resource Sharing (CORS) misconfigurations allow unauthorised websites to make authenticated requests to your API and read the responses.
Infrastructure-as-Code Security Misconfiguration
highInfrastructure-as-Code files (Docker Compose, Kubernetes YAML, Terraform) deployed with insecure defaults create attack vectors before code even reaches production. Privileged containers, exposed ports, missing resource limits, and insecure configurations are common.
Authentication
Data Protection
Sensitive Data Exposure
highA02:2021 / CWE-311
Applications that fail to properly protect sensitive data like financial information, healthcare records, or credentials through encryption and access controls.
Credential Leak Detection (Breach Database Exposure)
highEmployee and customer email addresses associated with your domain may appear in public data breaches. Attackers use these leaked credentials for credential stuffing attacks against your login endpoints.
Hardcoded Secrets and API Keys
criticalAPI keys, database passwords, private keys, and tokens embedded directly in source code, configuration files, or environment variable definitions are trivially discoverable by anyone with repository access.
Supply Chain
Using Components with Known Vulnerabilities
highA06:2021 / CWE-1035
Applications using libraries, frameworks, or dependencies with known security vulnerabilities inherit those risks.
WordPress Plugin and Theme Vulnerabilities
highA06:2021 / CWE-1035
WordPress plugins and themes are the primary attack vector for WordPress sites. Outdated, abandoned, or malicious plugins introduce vulnerabilities ranging from XSS and SQLi to remote code execution and backdoors.
Operations
Browser Security
DNS Security
Subdomain Takeover
highSubdomain takeover occurs when a DNS record (typically a CNAME) points to an external service that has been deprovisioned, allowing an attacker to claim that service and serve content on the subdomain.
DNS Misconfiguration (Missing SPF/DMARC)
mediumMissing or misconfigured SPF, DKIM, and DMARC records allow attackers to send emails that appear to come from your domain, enabling phishing and business email compromise.
API Security
Input Validation
Threat Detection
Application Security
Threat Intelligence
Security Tooling
Want to find these vulnerabilities in your site?
ShieldReport automatically detects all the vulnerabilities listed above. Run a free scan in under 2 minutes.
Start Free Scan