A reference guide to common security vulnerabilities and their mitigations.
Injection of malicious SQL queries to manipulate backend databases.
CriticalInjecting malicious scripts into web pages viewed by other users.
HighForcing an end user to execute unwanted actions on a web application.
HighAttacker can execute arbitrary code on the target server.
CriticalInsecure Direct Object References allowing access to unauthorized data.
HighServer-Side Request Forgery abusing server functionality to access internal resources.
HighLocal File Inclusion allowing attackers to read internal files.
HighXML External Entity attack abusing XML parsers.
HighWeaknesses in session management or credential handling.
Critical