3
CHAPTER 3
Security & Access Control
Vulnerabilities and security flaws that expose systems to unauthorized access
[71 examples] SQL injectionMalicious input injected into database queries, posing security risks. securitydatabasevulnerability |
[27 examples] Command injectionMalicious commands injected via user input fields. securityvulnerabilityshell |
[7 examples] Hardcoded credentialsCredentials embedded directly into source code, risking security. securityconfigurationcode quality |
[2 examples] Hardcoded timestampExplicit timestamp coded, causing incorrect date/time data. code qualityconfiguration |
[1 examples] Information disclosureSensitive information exposed unintentionally. securityvulnerability |
[2 examples] Missing rate limitingRequest frequency limits missing, risking overload or abuse. securityconfigurationperformance |
[32 examples] Path traversalUnauthorized directory access via manipulated paths. securityvulnerability |
[1 examples] Privilege escalationUnauthorized elevation of user privileges. securityvulnerability |
Want to avoid this bug in your codebase? Try Greptile.
Avoid this bug!