3
CHAPTER 3

Security & Access Control

Vulnerabilities and security flaws that expose systems to unauthorized access
[71 examples]

SQL injection

Malicious input injected into database queries, posing security risks.

securitydatabasevulnerability
[27 examples]

Command injection

Malicious commands injected via user input fields.

securityvulnerabilityshell
[7 examples]

Hardcoded credentials

Credentials embedded directly into source code, risking security.

securityconfigurationcode quality
[2 examples]

Hardcoded timestamp

Explicit timestamp coded, causing incorrect date/time data.

code qualityconfiguration
[1 examples]

Information disclosure

Sensitive information exposed unintentionally.

securityvulnerability
[2 examples]

Missing rate limiting

Request frequency limits missing, risking overload or abuse.

securityconfigurationperformance
[32 examples]

Path traversal

Unauthorized directory access via manipulated paths.

securityvulnerability
[1 examples]

Privilege escalation

Unauthorized elevation of user privileges.

securityvulnerability