Injection Attacks
SQL Injection (sqli)
Severity: Critical User input incorporated into SQL queries without proper sanitization.NoSQL Injection (nosql-injection)
Severity: Critical User input in NoSQL database queries.Command Injection (command-injection)
Severity: Critical User input passed to system commands.Code Evaluation (code-evaluation)
Severity: Critical Dynamic code execution with user input.Server-Side Template Injection (ssti)
Severity: Critical User input in server-side templates.Cross-Site Scripting (XSS)
Severity: High User input rendered in HTML without proper encoding.Request Forgery
Server-Side Request Forgery (ssrf)
Severity: High Server makes requests to URLs controlled by user input.Cross-Site Request Forgery (csrf)
Severity: Medium State-changing requests without CSRF protection.Access Control
Insecure Direct Object Reference (idor)
Severity: High Access to resources without proper authorization checks.Broken Access Control (broken-access-control)
Severity: High Missing or improper access control checks. Impact: Privilege escalation, unauthorized actions.Broken Authentication (broken-authentication)
Severity: High Flawed authentication implementation. Impact: Account takeover, unauthorized access.File System
Path Traversal (path-traversal)
Severity: High User input in file paths allowing access outside intended directory.Unrestricted File Upload (unrestricted-file-upload)
Severity: High File uploads without proper validation. Impact: Remote code execution, malware hosting.Other Attack Vectors
Remote Code Execution (rce)
Severity: Critical Any method allowing arbitrary code execution. Impact: Full system compromise.XML External Entity (xxe)
Severity: High XML parsing with external entity processing enabled.Open Redirect (open-redirect)
Severity: Medium Redirects to URLs controlled by user input.Prototype Pollution (prototype-pollution)
Severity: High Modification of JavaScript object prototypes via user input. Impact: Denial of service, potential RCE.Insecure Deserialization (insecure-deserialization)
Severity: Critical Deserializing untrusted data without validation. Impact: Remote code execution.Header Injection (header-injection)
Severity: Medium User input in HTTP headers. Impact: Response splitting, cache poisoning.Log Injection (log-injection)
Severity: Low User input in log messages without sanitization. Impact: Log forging, log analysis bypass.Session Fixation (session-fixation)
Severity: Medium Session ID can be set by attacker. Impact: Session hijacking.Race Condition (race-condition)
Severity: Medium Time-of-check to time-of-use vulnerabilities. Impact: Security bypass, data corruption.Denial of Service (dos)
Severity: Medium Code patterns that can cause service unavailability. Impact: Service disruption.Regex Injection (regex-injection)
Severity: Medium User input in regular expressions (ReDoS risk). Impact: Denial of service.PostMessage Misuse (postmessage-misuse)
Severity: Medium Improper handling of cross-origin messages. Impact: Cross-origin attacks.Related Pages
Compliance Issues
Security weaknesses
Security Overview
All security categories
Issues
View your findings
How It Works
Detection explained

