Skip to content

Index

☠️ Vulnerabilities🔗

#️⃣ 👾Type 📖Definition ✨Example 🛡️Remediation
1 Brute Force An automated program that tries all possible combinations to guess sensitive information Guessing passwords, hashes or API secrets Rate limiting
2 Privilege Escalation Someone gains unauthorized access with higher privileges than they were initially granted Becoming admin from a regular user Least privilege, proper access control, and employee awareness
3 Impersonation This is a type of phishing attack where an attacker pretends to be someone else in order to steal data, gain unauthorize access, or disrupt operations Sending email as your manager at your employer Employee awareness, proper identity and access management
4 Denial of Service A malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of Internet traffic such as bogus packets, requests for connections, or malformed messages Making countless requests to a web server until its resources are exhausted Rate limiting
5 SQL Injection Malicious SQL code for backend database manipulation to access information that was not intended to be displayed Extracting username and passwords from the database Input validation escaping and sanitization, stored procedures, prepared statement with parameterized queries
6 Weak Encryption Use of encryption algorithms that are not robust enough to withstand attacks Insufficient key length which makes brute forcing easy or outdated encryption algorithms with known vulnerabilities Secure encryption algorithms
7 Weak Hashing Use of hashing algorithms that are not robust enough to withstand attacks Outdated hashing algorithm which produces collisions Secure hashing algorithms
8 Credential Theft Credential theft occurs when malicious actors steal login details and use them to access services or applications to steadily elevate their privileges Stolen API key is used to perform malicious API calls to withdraw customer account funds Secure storage and secure transportation
9 Cookie Poisoning Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain unauthorized access to a user's account Steal session cookie through Cross-Site Scripting HTTPS, secure and httpOnly flags are set on cookie, Cookie expiration
10 Logic Error Flaws in the design and implementation of an application that allow an attacker to elicit unintended behavior Accepting negative values when a customer is transferring funds Testing all edge cases
11 Host Header Injection Attackers exploit this vulnerability to manipulate the Host header and cause the application to behave in unexpected ways Redirecting users to malicious sites for phishing or malware distribution Input validation and sanitization
12 Referrer Leakage When sensitive information is inadvertently included in the HTTP referrer header and sent to external sites If session IDs in the referrer header are leaked, attackers might gain unauthorized access to user accounts Avoid Sensitive Data in URLs, No Referrer tag is set
13 Insufficient Logging Attackers rely on insufficient logging to achieve their goals without being detected An attacker brute forces passwords without being detected and stopped Proper logging and monitoring
14 Information Leakage When a website unintentionally reveals sensitive information to its users A server reveals passwords in error messages Employee awareness, sanitize output, enforce least privilege
15 Eavesdropping An eavesdropping attack occurs when a attacker intercepts, deletes, or modifies data that is transmitted between two devices An attacker is able to transmit and modify login credentials being sent on unencrypted HTTP network HTTPS, HTTP Strict Transport Security
16 Website Defacement Website defacement is the unauthorized alteration of the visual appearance or content of a website by a malicious actor Attacker published profanity, hate speech, politically motivated messages, or even links to malicious websites Content moderation, community guidelines
17 Vulnerable Dependency Libraries or dependencies used by your application which has known vulnerabilities that can impact your application. An attacker steals funds by exploiting a remote code execution vulnerability in a database library used by an application Dependency scans, regularly updating, stay up to date with new vulnerabilities in used libraries
18 Injection An umbrella term used for injections based attacks where an attacker injection malicious input to manipulate your application logic. (SQL injection, header injection, cross-site scripting, LDAP injection etc.) An attacker uses SQL injection to steal password hashes from the database Input validation and sanitization
19 Misconfiguration When a system or application configuration settings are missing or are erroneously implemented, allowing unauthorized access An admin account for AWS is using a default password Least privilege, employee awareness, automated scans
20 Path Traversal Path traversal is a type of security vulnerability that can occur when a web application or service allows an attacker to access server files or directories that are outside the intended directory structure. This can lead to the unauthorized reading or modification of sensitive data Admin route is left unchecked and can be accessible publicly Input validation and sanitization
21 Location Spoofing Manipulate the location data shared by their device Attacker located across the globe spoofs their location to avoid suspicion IP verification, Browser location API
22 Insecure Direct Object Reference when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources in the system directly An attacker changes the id parameter in the URL (e.g., to id=admin) to access another user's profile without authorization Proper access control, input validation and sanitization
23 Man in the Middle Communications between two parties is intercepted by an attack and data is either stolen or modified The attacker gains access to a user's email account and intercepts emails between the user and their contacts. The attacker can alter the contents of these emails or use the information for malicious purposes HTTPS
24 Roll Your Own Code Developers writing their own encryption algorithms or session management mechanisms, instead of using established, thoroughly tested libraries or frameworks Writing your own encryption algorithm which is not thoroughly tested Use popular well tested frameworks, libraries or algorithms
25 Cross-Site Request Forgery An attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated If a social media site doesn't properly verify requests, an attacker could create a malicious site that posts unwanted content or spam on the victim's social media profile when they visit the malicious site CSRF token, SameSite cookie, check Referrer Header
26 Session Hijacking The malicious act of taking control of a user's web session An attacker steals a user's session cookie through XSS (Cross-Site Scripting) attacks, packet sniffing, or other methods. Once the attacker has the cookie, they can use it to impersonate the user on the web application Secure cookies, SameSite cookies, httpOnly cookies, cookie expiration
27 Replay Attack It involves an attacker capturing a valid web request and retransmitting it one or more times. This can lead to unauthorized actions or access If a Two-Factor Authentication system doesn't properly validate the uniqueness or time sensitivity of the authentication codes, an attacker could intercept and reuse these codes to gain unauthorized access HTTPS, rate limiting, input validation
28 Insider Threat A cyber security risk that originates from within an organization A current or former employee, contractor, vendor, or partner, abuses their legitimate access rights, causing harm to the organization's networks, systems, and data. Least privilege
29 Misuse of Privileges This involves users who have legitimate access but engage in actions that are outside of their roles or responsibilities, often for malicious purposes A user with admin privileges browses through confidential files and extracts or deletes information Least privilege, logging and monitoring
30 Intellectual Property Theft Theft of propriety code, application or system A malicious contributor clones your repository and labels it as theirs Least privilege, proper access control
31 Data Exfiltration An attacker steals information form a software system An attack extracts financial data from a compromised server Least privilege, logging and monitoring, proper access control
32 Unauthorized Access An attacker gains access to an organization's software application without permission An attacker gains unauthorized access to a user account through phishing logging and monitoring, proper access control
33 Hardcoded Secret Including sensitive information such as passwords, API or encryption keys inside the codebase Including PayPal API key inside an opensource project that everyone can see Secret scans
34 Vulnerable Code An umbrella term used for a flaw in your code that creates a potential risk of compromising security An attacker injects malicious SQL code to delete an application's database tabled Input validation and sanitization, automated scans, proper access control
35 Zero Day An unknown or undressed security flaw in a software system An attacker is able to exploit a zero-day vulnerability in a SaaS product which gives them unauthorized access to an admin account Keep software up to date, least privilege, security audits, vulnerability disclosure