Vulnerability Masterlist
Comprehensive database of security vulnerabilities with real-world payloads, exploitation techniques, and remediation guidance for security professionals.
SQL Injection
Interference with queries an application makes to its database, potentially leading to data theft or deletion.
OS Command Injection
Executing arbitrary operating system commands on the server through vulnerable applications.
Insecure Deserialization
Exploiting deserialization of untrusted data to achieve remote code execution.
Server-Side Template Injection
Injecting template directives to execute arbitrary code on the server.
Cross-Site Scripting (XSS)
Injecting malicious scripts into web pages viewed by other users, enabling session hijacking and data theft.
Server-Side Request Forgery
Inducing the server to make HTTP requests to arbitrary domains, accessing internal services.
Local File Inclusion
Including files from the server filesystem, potentially exposing sensitive configuration and source code.
XML External Entity (XXE)
Processing XML input containing external entity references, leading to file disclosure or SSRF.
Path Traversal
Accessing files and directories outside the intended directory using ../ sequences.
JWT Token Attacks
Exploiting weak JWT implementations to bypass authentication and forge tokens.
Insecure Direct Object Reference
Accessing objects directly based on user-supplied input without proper authorization checks.
CRLF Injection
Injection of carriage return and line feed characters to manipulate HTTP headers.