This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks", "review access control weaknesses", "analyze API security issues", "assess security misconfigurations", "understand client-side vulnerabilities", "examine mobile and IoT security flaws", or "reference the OWASP-aligned vulnerability taxonomy". Use this skill to provide comprehensive vulnerability defin
Add this skill
npx mdskills install sickn33/top-web-vulnerabilitiesComprehensive vulnerability reference with clear definitions, impacts, and mitigations for 100+ security flaws
1---2name: Top 100 Web Vulnerabilities Reference3description: This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks", "review access control weaknesses", "analyze API security issues", "assess security misconfigurations", "understand client-side vulnerabilities", "examine mobile and IoT security flaws", or "reference the OWASP-aligned vulnerability taxonomy". Use this skill to provide comprehensive vulnerability definitions, root causes, impacts, and mitigation strategies across all major web security categories.4metadata:5 author: zebbern6 version: "1.1"7---89# Top 100 Web Vulnerabilities Reference1011## Purpose1213Provide a comprehensive, structured reference for the 100 most critical web application vulnerabilities organized by category. This skill enables systematic vulnerability identification, impact assessment, and remediation guidance across the full spectrum of web security threats. Content organized into 15 major vulnerability categories aligned with industry standards and real-world attack patterns.1415## Prerequisites1617- Basic understanding of web application architecture (client-server model, HTTP protocol)18- Familiarity with common web technologies (HTML, JavaScript, SQL, XML, APIs)19- Understanding of authentication and authorization concepts20- Access to web application security testing tools (Burp Suite, OWASP ZAP)21- Knowledge of secure coding principles recommended2223## Outputs and Deliverables2425- Complete vulnerability catalog with definitions, root causes, impacts, and mitigations26- Category-based vulnerability groupings for systematic assessment27- Quick reference for security testing and remediation28- Foundation for vulnerability assessment checklists and security policies2930---3132## Core Workflow3334### Phase 1: Injection Vulnerabilities Assessment3536Evaluate injection attack vectors targeting data processing components:3738**SQL Injection (1)**39- Definition: Malicious SQL code inserted into input fields to manipulate database queries40- Root Cause: Lack of input validation, improper use of parameterized queries41- Impact: Unauthorized data access, data manipulation, database compromise42- Mitigation: Use parameterized queries/prepared statements, input validation, least privilege database accounts4344**Cross-Site Scripting - XSS (2)**45- Definition: Injection of malicious scripts into web pages viewed by other users46- Root Cause: Insufficient output encoding, lack of input sanitization47- Impact: Session hijacking, credential theft, website defacement48- Mitigation: Output encoding, Content Security Policy (CSP), input sanitization4950**Command Injection (5, 11)**51- Definition: Execution of arbitrary system commands through vulnerable applications52- Root Cause: Unsanitized user input passed to system shells53- Impact: Full system compromise, data exfiltration, lateral movement54- Mitigation: Avoid shell execution, whitelist valid commands, strict input validation5556**XML Injection (6), LDAP Injection (7), XPath Injection (8)**57- Definition: Manipulation of XML/LDAP/XPath queries through malicious input58- Root Cause: Improper input handling in query construction59- Impact: Data exposure, authentication bypass, information disclosure60- Mitigation: Input validation, parameterized queries, escape special characters6162**Server-Side Template Injection - SSTI (13)**63- Definition: Injection of malicious code into template engines64- Root Cause: User input embedded directly in template expressions65- Impact: Remote code execution, server compromise66- Mitigation: Sandbox template engines, avoid user input in templates, strict input validation6768### Phase 2: Authentication and Session Security6970Assess authentication mechanism weaknesses:7172**Session Fixation (14)**73- Definition: Attacker sets victim's session ID before authentication74- Root Cause: Session ID not regenerated after login75- Impact: Session hijacking, unauthorized account access76- Mitigation: Regenerate session ID on authentication, use secure session management7778**Brute Force Attack (15)**79- Definition: Systematic password guessing using automated tools80- Root Cause: Lack of account lockout, rate limiting, or CAPTCHA81- Impact: Unauthorized access, credential compromise82- Mitigation: Account lockout policies, rate limiting, MFA, CAPTCHA8384**Session Hijacking (16)**85- Definition: Attacker steals or predicts valid session tokens86- Root Cause: Weak session token generation, insecure transmission87- Impact: Account takeover, unauthorized access88- Mitigation: Secure random token generation, HTTPS, HttpOnly/Secure cookie flags8990**Credential Stuffing and Reuse (22)**91- Definition: Using leaked credentials to access accounts across services92- Root Cause: Users reusing passwords, no breach detection93- Impact: Mass account compromise, data breaches94- Mitigation: MFA, breach password checks, unique credential requirements9596**Insecure "Remember Me" Functionality (85)**97- Definition: Weak persistent authentication token implementation98- Root Cause: Predictable tokens, inadequate expiration controls99- Impact: Unauthorized persistent access, session compromise100- Mitigation: Strong token generation, proper expiration, secure storage101102**CAPTCHA Bypass (86)**103- Definition: Circumventing bot detection mechanisms104- Root Cause: Weak CAPTCHA algorithms, improper validation105- Impact: Automated attacks, credential stuffing, spam106- Mitigation: reCAPTCHA v3, layered bot detection, rate limiting107108### Phase 3: Sensitive Data Exposure109110Identify data protection failures:111112**IDOR - Insecure Direct Object References (23, 42)**113- Definition: Direct access to internal objects via user-supplied references114- Root Cause: Missing authorization checks on object access115- Impact: Unauthorized data access, privacy breaches116- Mitigation: Access control validation, indirect reference maps, authorization checks117118**Data Leakage (24)**119- Definition: Inadvertent disclosure of sensitive information120- Root Cause: Inadequate data protection, weak access controls121- Impact: Privacy breaches, regulatory penalties, reputation damage122- Mitigation: DLP solutions, encryption, access controls, security training123124**Unencrypted Data Storage (25)**125- Definition: Storing sensitive data without encryption126- Root Cause: Failure to implement encryption at rest127- Impact: Data breaches if storage compromised128- Mitigation: Full-disk encryption, database encryption, secure key management129130**Information Disclosure (33)**131- Definition: Exposure of system details through error messages or responses132- Root Cause: Verbose error handling, debug information in production133- Impact: Reconnaissance for further attacks, credential exposure134- Mitigation: Generic error messages, disable debug mode, secure logging135136### Phase 4: Security Misconfiguration137138Assess configuration weaknesses:139140**Missing Security Headers (26)**141- Definition: Absence of protective HTTP headers (CSP, X-Frame-Options, HSTS)142- Root Cause: Inadequate server configuration143- Impact: XSS attacks, clickjacking, protocol downgrade144- Mitigation: Implement CSP, X-Content-Type-Options, X-Frame-Options, HSTS145146**Default Passwords (28)**147- Definition: Unchanged default credentials on systems/applications148- Root Cause: Failure to change vendor defaults149- Impact: Unauthorized access, system compromise150- Mitigation: Mandatory password changes, strong password policies151152**Directory Listing (29)**153- Definition: Web server exposes directory contents154- Root Cause: Improper server configuration155- Impact: Information disclosure, sensitive file exposure156- Mitigation: Disable directory indexing, use default index files157158**Unprotected API Endpoints (30)**159- Definition: APIs lacking authentication or authorization160- Root Cause: Missing security controls on API routes161- Impact: Unauthorized data access, API abuse162- Mitigation: OAuth/API keys, access controls, rate limiting163164**Open Ports and Services (31)**165- Definition: Unnecessary network services exposed166- Root Cause: Failure to minimize attack surface167- Impact: Exploitation of vulnerable services168- Mitigation: Port scanning audits, firewall rules, service minimization169170**Misconfigured CORS (35)**171- Definition: Overly permissive Cross-Origin Resource Sharing policies172- Root Cause: Wildcard origins, improper CORS configuration173- Impact: Cross-site request attacks, data theft174- Mitigation: Whitelist trusted origins, validate CORS headers175176**Unpatched Software (34)**177- Definition: Systems running outdated vulnerable software178- Root Cause: Neglected patch management179- Impact: Exploitation of known vulnerabilities180- Mitigation: Patch management program, vulnerability scanning, automated updates181182### Phase 5: XML-Related Vulnerabilities183184Evaluate XML processing security:185186**XXE - XML External Entity Injection (37)**187- Definition: Exploitation of XML parsers to access files or internal systems188- Root Cause: External entity processing enabled189- Impact: File disclosure, SSRF, denial of service190- Mitigation: Disable external entities, use safe XML parsers191192**XEE - XML Entity Expansion (38)**193- Definition: Excessive entity expansion causing resource exhaustion194- Root Cause: Unlimited entity expansion allowed195- Impact: Denial of service, parser crashes196- Mitigation: Limit entity expansion, configure parser restrictions197198**XML Bomb (Billion Laughs) (39)**199- Definition: Crafted XML with nested entities consuming resources200- Root Cause: Recursive entity definitions201- Impact: Memory exhaustion, denial of service202- Mitigation: Entity expansion limits, input size restrictions203204**XML Denial of Service (65)**205- Definition: Specially crafted XML causing excessive processing206- Root Cause: Complex document structures without limits207- Impact: CPU/memory exhaustion, service unavailability208- Mitigation: Schema validation, size limits, processing timeouts209210### Phase 6: Broken Access Control211212Assess authorization enforcement:213214**Inadequate Authorization (40)**215- Definition: Failure to properly enforce access controls216- Root Cause: Weak authorization policies, missing checks217- Impact: Unauthorized access to sensitive resources218- Mitigation: RBAC, centralized IAM, regular access reviews219220**Privilege Escalation (41)**221- Definition: Gaining elevated access beyond intended permissions222- Root Cause: Misconfigured permissions, system vulnerabilities223- Impact: Full system compromise, data manipulation224- Mitigation: Least privilege, regular patching, privilege monitoring225226**Forceful Browsing (43)**227- Definition: Direct URL manipulation to access restricted resources228- Root Cause: Weak access controls, predictable URLs229- Impact: Unauthorized file/directory access230- Mitigation: Server-side access controls, unpredictable resource paths231232**Missing Function-Level Access Control (44)**233- Definition: Unprotected administrative or privileged functions234- Root Cause: Authorization only at UI level235- Impact: Unauthorized function execution236- Mitigation: Server-side authorization for all functions, RBAC237238### Phase 7: Insecure Deserialization239240Evaluate object serialization security:241242**Remote Code Execution via Deserialization (45)**243- Definition: Arbitrary code execution through malicious serialized objects244- Root Cause: Untrusted data deserialized without validation245- Impact: Complete system compromise, code execution246- Mitigation: Avoid deserializing untrusted data, integrity checks, type validation247248**Data Tampering (46)**249- Definition: Unauthorized modification of serialized data250- Root Cause: Missing integrity verification251- Impact: Data corruption, privilege manipulation252- Mitigation: Digital signatures, HMAC validation, encryption253254**Object Injection (47)**255- Definition: Malicious object instantiation during deserialization256- Root Cause: Unsafe deserialization practices257- Impact: Code execution, unauthorized access258- Mitigation: Type restrictions, class whitelisting, secure libraries259260### Phase 8: API Security Assessment261262Evaluate API-specific vulnerabilities:263264**Insecure API Endpoints (48)**265- Definition: APIs without proper security controls266- Root Cause: Poor API design, missing authentication267- Impact: Data breaches, unauthorized access268- Mitigation: OAuth/JWT, HTTPS, input validation, rate limiting269270**API Key Exposure (49)**271- Definition: Leaked or exposed API credentials272- Root Cause: Hardcoded keys, insecure storage273- Impact: Unauthorized API access, abuse274- Mitigation: Secure key storage, rotation, environment variables275276**Lack of Rate Limiting (50)**277- Definition: No controls on API request frequency278- Root Cause: Missing throttling mechanisms279- Impact: DoS, API abuse, resource exhaustion280- Mitigation: Rate limits per user/IP, throttling, DDoS protection281282**Inadequate Input Validation (51)**283- Definition: APIs accepting unvalidated user input284- Root Cause: Missing server-side validation285- Impact: Injection attacks, data corruption286- Mitigation: Strict validation, parameterized queries, WAF287288**API Abuse (75)**289- Definition: Exploiting API functionality for malicious purposes290- Root Cause: Excessive trust in client input291- Impact: Data theft, account takeover, service abuse292- Mitigation: Strong authentication, behavior analysis, anomaly detection293294### Phase 9: Communication Security295296Assess transport layer protections:297298**Man-in-the-Middle Attack (52)**299- Definition: Interception of communication between parties300- Root Cause: Unencrypted channels, compromised networks301- Impact: Data theft, session hijacking, impersonation302- Mitigation: TLS/SSL, certificate pinning, mutual authentication303304**Insufficient Transport Layer Security (53)**305- Definition: Weak or outdated encryption for data in transit306- Root Cause: Outdated protocols (SSLv2/3), weak ciphers307- Impact: Traffic interception, credential theft308- Mitigation: TLS 1.2+, strong cipher suites, HSTS309310**Insecure SSL/TLS Configuration (54)**311- Definition: Improperly configured encryption settings312- Root Cause: Weak ciphers, missing forward secrecy313- Impact: Traffic decryption, MITM attacks314- Mitigation: Modern cipher suites, PFS, certificate validation315316**Insecure Communication Protocols (55)**317- Definition: Use of unencrypted protocols (HTTP, Telnet, FTP)318- Root Cause: Legacy systems, security unawareness319- Impact: Traffic sniffing, credential exposure320- Mitigation: HTTPS, SSH, SFTP, VPN tunnels321322### Phase 10: Client-Side Vulnerabilities323324Evaluate browser-side security:325326**DOM-based XSS (56)**327- Definition: XSS through client-side JavaScript manipulation328- Root Cause: Unsafe DOM manipulation with user input329- Impact: Session theft, credential harvesting330- Mitigation: Safe DOM APIs, CSP, input sanitization331332**Insecure Cross-Origin Communication (57)**333- Definition: Improper handling of cross-origin requests334- Root Cause: Relaxed CORS/SOP policies335- Impact: Data leakage, CSRF attacks336- Mitigation: Strict CORS, CSRF tokens, origin validation337338**Browser Cache Poisoning (58)**339- Definition: Manipulation of cached content340- Root Cause: Weak cache validation341- Impact: Malicious content delivery342- Mitigation: Cache-Control headers, HTTPS, integrity checks343344**Clickjacking (59, 71)**345- Definition: UI redress attack tricking users into clicking hidden elements346- Root Cause: Missing frame protection347- Impact: Unintended actions, credential theft348- Mitigation: X-Frame-Options, CSP frame-ancestors, frame-busting349350**HTML5 Security Issues (60)**351- Definition: Vulnerabilities in HTML5 APIs (WebSockets, Storage, Geolocation)352- Root Cause: Improper API usage, insufficient validation353- Impact: Data leakage, XSS, privacy violations354- Mitigation: Secure API usage, input validation, sandboxing355356### Phase 11: Denial of Service Assessment357358Evaluate availability threats:359360**DDoS - Distributed Denial of Service (61)**361- Definition: Overwhelming systems with traffic from multiple sources362- Root Cause: Botnets, amplification attacks363- Impact: Service unavailability, revenue loss364- Mitigation: DDoS protection services, rate limiting, CDN365366**Application Layer DoS (62)**367- Definition: Targeting application logic to exhaust resources368- Root Cause: Inefficient code, resource-intensive operations369- Impact: Application unavailability, degraded performance370- Mitigation: Rate limiting, caching, WAF, code optimization371372**Resource Exhaustion (63)**373- Definition: Depleting CPU, memory, disk, or network resources374- Root Cause: Inefficient resource management375- Impact: System crashes, service degradation376- Mitigation: Resource quotas, monitoring, load balancing377378**Slowloris Attack (64)**379- Definition: Keeping connections open with partial HTTP requests380- Root Cause: No connection timeouts381- Impact: Web server resource exhaustion382- Mitigation: Connection timeouts, request limits, reverse proxy383384### Phase 12: Server-Side Request Forgery385386Assess SSRF vulnerabilities:387388**SSRF - Server-Side Request Forgery (66)**389- Definition: Manipulating server to make requests to internal resources390- Root Cause: Unvalidated user-controlled URLs391- Impact: Internal network access, data theft, cloud metadata access392- Mitigation: URL whitelisting, network segmentation, egress filtering393394**Blind SSRF (87)**395- Definition: SSRF without direct response visibility396- Root Cause: Similar to SSRF, harder to detect397- Impact: Data exfiltration, internal reconnaissance398- Mitigation: Allowlists, WAF, network restrictions399400**Time-Based Blind SSRF (88)**401- Definition: Inferring SSRF success through response timing402- Root Cause: Processing delays indicating request outcomes403- Impact: Prolonged exploitation, detection evasion404- Mitigation: Request timeouts, anomaly detection, timing monitoring405406### Phase 13: Additional Web Vulnerabilities407408| # | Vulnerability | Root Cause | Impact | Mitigation |409|---|--------------|-----------|--------|------------|410| 67 | HTTP Parameter Pollution | Inconsistent parsing | Injection, ACL bypass | Strict parsing, validation |411| 68 | Insecure Redirects | Unvalidated targets | Phishing, malware | Whitelist destinations |412| 69 | File Inclusion (LFI/RFI) | Unvalidated paths | Code exec, disclosure | Whitelist files, disable RFI |413| 70 | Security Header Bypass | Misconfigured headers | XSS, clickjacking | Proper headers, audits |414| 72 | Inadequate Session Timeout | Excessive timeouts | Session hijacking | Idle termination, timeouts |415| 73 | Insufficient Logging | Missing infrastructure | Detection gaps | SIEM, alerting |416| 74 | Business Logic Flaws | Insecure design | Fraud, unauthorized ops | Threat modeling, testing |417418### Phase 14: Mobile and IoT Security419420| # | Vulnerability | Root Cause | Impact | Mitigation |421|---|--------------|-----------|--------|------------|422| 76 | Insecure Mobile Storage | Plain text, weak crypto | Data theft | Keychain/Keystore, encrypt |423| 77 | Insecure Mobile Transmission | HTTP, cert failures | Traffic interception | TLS, cert pinning |424| 78 | Insecure Mobile APIs | Missing auth/validation | Data exposure | OAuth/JWT, validation |425| 79 | App Reverse Engineering | Hardcoded creds | Credential theft | Obfuscation, RASP |426| 80 | IoT Management Issues | Weak auth, no TLS | Device takeover | Strong auth, TLS |427| 81 | Weak IoT Authentication | Default passwords | Unauthorized access | Unique creds, MFA |428| 82 | IoT Vulnerabilities | Design flaws, old firmware | Botnet recruitment | Updates, segmentation |429| 83 | Smart Home Access | Insecure defaults | Privacy invasion | MFA, segmentation |430| 84 | IoT Privacy Issues | Excessive collection | Surveillance | Data minimization |431432### Phase 15: Advanced and Zero-Day Threats433434| # | Vulnerability | Root Cause | Impact | Mitigation |435|---|--------------|-----------|--------|------------|436| 89 | MIME Sniffing | Missing headers | XSS, spoofing | X-Content-Type-Options |437| 91 | CSP Bypass | Weak config | XSS despite CSP | Strict CSP, nonces |438| 92 | Inconsistent Validation | Decentralized logic | Control bypass | Centralized validation |439| 93 | Race Conditions | Missing sync | Privilege escalation | Proper locking |440| 94-95 | Business Logic Flaws | Missing validation | Financial fraud | Server-side validation |441| 96 | Account Enumeration | Different responses | Targeted attacks | Uniform responses |442| 98-99 | Unpatched Vulnerabilities | Patch delays | Zero-day exploitation | Patch management |443| 100 | Zero-Day Exploits | Unknown vulns | Unmitigated attacks | Defense in depth |444445---446447## Quick Reference448449### Vulnerability Categories Summary450451| Category | Vulnerability Numbers | Key Controls |452|----------|----------------------|--------------|453| Injection | 1-13 | Parameterized queries, input validation, output encoding |454| Authentication | 14-23, 85-86 | MFA, session management, account lockout |455| Data Exposure | 24-27 | Encryption at rest/transit, access controls, DLP |456| Misconfiguration | 28-36 | Secure defaults, hardening, patching |457| XML | 37-39, 65 | Disable external entities, limit expansion |458| Access Control | 40-44 | RBAC, least privilege, authorization checks |459| Deserialization | 45-47 | Avoid untrusted data, integrity validation |460| API Security | 48-51, 75 | OAuth, rate limiting, input validation |461| Communication | 52-55 | TLS 1.2+, certificate validation, HTTPS |462| Client-Side | 56-60 | CSP, X-Frame-Options, safe DOM |463| DoS | 61-65 | Rate limiting, DDoS protection, resource limits |464| SSRF | 66, 87-88 | URL whitelisting, egress filtering |465| Mobile/IoT | 76-84 | Encryption, authentication, secure storage |466| Business Logic | 74, 92-97 | Threat modeling, logic testing |467| Zero-Day | 98-100 | Defense in depth, threat intelligence |468469### Critical Security Headers470471```472Content-Security-Policy: default-src 'self'; script-src 'self'473X-Content-Type-Options: nosniff474X-Frame-Options: DENY475X-XSS-Protection: 1; mode=block476Strict-Transport-Security: max-age=31536000; includeSubDomains477Referrer-Policy: strict-origin-when-cross-origin478Permissions-Policy: geolocation=(), microphone=()479```480481### OWASP Top 10 Mapping482483| OWASP 2021 | Related Vulnerabilities |484|------------|------------------------|485| A01: Broken Access Control | 40-44, 23, 74 |486| A02: Cryptographic Failures | 24-25, 53-55 |487| A03: Injection | 1-13, 37-39 |488| A04: Insecure Design | 74, 92-97 |489| A05: Security Misconfiguration | 26-36 |490| A06: Vulnerable Components | 34, 98-100 |491| A07: Auth Failures | 14-23, 85-86 |492| A08: Data Integrity | 45-47 |493| A09: Logging Failures | 73 |494| A10: SSRF | 66, 87-88 |495496---497498## Constraints and Limitations499500- Vulnerability definitions represent common patterns; specific implementations vary501- Mitigations must be adapted to technology stack and architecture502- New vulnerabilities emerge continuously; reference should be updated503- Some vulnerabilities overlap across categories (e.g., IDOR appears in multiple contexts)504- Effectiveness of mitigations depends on proper implementation505- Automated scanners cannot detect all vulnerability types (especially business logic)506507---508509## Troubleshooting510511### Common Assessment Challenges512513| Challenge | Solution |514|-----------|----------|515| False positives in scanning | Manual verification, contextual analysis |516| Business logic flaws missed | Manual testing, threat modeling, abuse case analysis |517| Encrypted traffic analysis | Proxy configuration, certificate installation |518| WAF blocking tests | Rate adjustment, IP rotation, payload encoding |519| Session handling issues | Cookie management, authentication state tracking |520| API discovery | Swagger/OpenAPI enumeration, traffic analysis |521522### Vulnerability Verification Techniques523524| Vulnerability Type | Verification Approach |525|-------------------|----------------------|526| Injection | Payload testing with encoded variants |527| XSS | Alert boxes, cookie access, DOM inspection |528| CSRF | Cross-origin form submission testing |529| SSRF | Out-of-band DNS/HTTP callbacks |530| XXE | External entity with controlled server |531| Access Control | Horizontal/vertical privilege testing |532| Authentication | Credential rotation, session analysis |533534---535536## References537538- OWASP Top 10 Web Application Security Risks539- CWE/SANS Top 25 Most Dangerous Software Errors540- OWASP Testing Guide541- OWASP Application Security Verification Standard (ASVS)542- NIST Cybersecurity Framework543- Source: Kumar MS - Top 100 Web Vulnerabilities544
Full transparency — inspect the skill content before installing.