Top 100 Web Vulnerabilities Reference by claudiodearaujo/izacenter
npx skills add https://github.com/claudiodearaujo/izacenter --skill 'Top 100 Web Vulnerabilities Reference'提供一个全面的、结构化的参考,涵盖按类别组织的 100 个最关键的 Web 应用程序漏洞。此技能支持跨整个 Web 安全威胁谱系进行系统性的漏洞识别、影响评估和修复指导。内容按照行业标准和现实世界攻击模式,组织成 15 个主要漏洞类别。
评估针对数据处理组件的注入攻击向量:
SQL 注入 (1)
跨站脚本攻击 - XSS (2)
命令注入 (5, 11)
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
服务器端模板注入 - SSTI (13)
评估身份验证机制的弱点:
会话固定 (14)
暴力破解攻击 (15)
会话劫持 (16)
凭据填充和重用 (22)
不安全的“记住我”功能 (85)
CAPTCHA 绕过 (86)
识别数据保护失败:
IDOR - 不安全的直接对象引用 (23, 42)
数据泄露 (24)
未加密的数据存储 (25)
信息泄露 (33)
评估配置弱点:
缺少安全标头 (26)
默认密码 (28)
目录列表 (29)
未受保护的 API 端点 (30)
开放端口和服务 (31)
配置错误的 CORS (35)
未打补丁的软件 (34)
评估 XML 处理安全性:
XXE - XML 外部实体注入 (37)
XEE - XML 实体扩展 (38)
XML 炸弹(十亿次大笑攻击) (39)
XML 拒绝服务 (65)
评估授权执行:
授权不足 (40)
权限提升 (41)
强制浏览 (43)
缺少功能级访问控制 (44)
评估对象序列化安全性:
通过反序列化实现远程代码执行 (45)
数据篡改 (46)
对象注入 (47)
评估 API 特定漏洞:
不安全的 API 端点 (48)
API 密钥暴露 (49)
缺少速率限制 (50)
输入验证不足 (51)
API 滥用 (75)
评估传输层保护:
中间人攻击 (52)
传输层安全性不足 (53)
不安全的 SSL/TLS 配置 (54)
不安全的通信协议 (55)
评估浏览器端安全性:
基于 DOM 的 XSS (56)
不安全的跨源通信 (57)
浏览器缓存投毒 (58)
点击劫持 (59, 71)
HTML5 安全问题 (60)
评估可用性威胁:
DDoS - 分布式拒绝服务 (61)
应用层 DoS (62)
资源耗尽 (63)
Slowloris 攻击 (64)
评估 SSRF 漏洞:
SSRF - 服务器端请求伪造 (66)
盲 SSRF (87)
基于时间的盲 SSRF (88)
---|---|---|---|---
67 | HTTP 参数污染 | 解析不一致 | 注入、访问控制列表 (ACL) 绕过 | 严格解析、验证
68 | 不安全的重定向 | 未验证的目标 | 网络钓鱼、恶意软件 | 白名单目标
69 | 文件包含 (LFI/RFI) | 未验证的路径 | 代码执行、泄露 | 白名单文件、禁用 RFI
70 | 安全标头绕过 | 配置错误的标头 | XSS、点击劫持 | 正确的标头、审计
72 | 会话超时不足 | 超时时间过长 | 会话劫持 | 空闲终止、超时
73 | 日志记录不足 | 缺少基础设施 | 检测缺口 | 安全信息和事件管理 (SIEM)、告警
74 | 业务逻辑缺陷 | 不安全的设计 | 欺诈、未经授权的操作 | 威胁建模、测试
---|---|---|---|---
76 | 不安全的移动存储 | 明文、弱加密 | 数据窃取 | Keychain/Keystore、加密
77 | 不安全的移动传输 | HTTP、证书失败 | 流量拦截 | TLS、证书固定
78 | 不安全的移动 API | 缺少身份验证/验证 | 数据暴露 | OAuth/JWT、验证
79 | 应用程序逆向工程 | 硬编码凭据 | 凭据窃取 | 混淆、运行时应用程序自我保护 (RASP)
80 | IoT 管理问题 | 弱身份验证、无 TLS | 设备接管 | 强身份验证、TLS
81 | 弱 IoT 身份验证 | 默认密码 | 未经授权的访问 | 唯一凭据、MFA
82 | IoT 漏洞 | 设计缺陷、旧固件 | 僵尸网络招募 | 更新、分段
83 | 智能家居访问 | 不安全的默认设置 | 隐私侵犯 | MFA、分段
84 | IoT 隐私问题 | 过度收集 | 监控 | 数据最小化
---|---|---|---|---
89 | MIME 嗅探 | 缺少标头 | XSS、欺骗 | X-Content-Type-Options
91 | CSP 绕过 | 配置弱 | 尽管有 CSP 仍发生 XSS | 严格的 CSP、随机数
92 | 验证不一致 | 分散的逻辑 | 控制绕过 | 集中式验证
93 | 竞争条件 | 缺少同步 | 权限提升 | 适当的锁定
94-95 | 业务逻辑缺陷 | 缺少验证 | 金融欺诈 | 服务器端验证
96 | 账户枚举 | 不同的响应 | 针对性攻击 | 统一的响应
98-99 | 未修补的漏洞 | 补丁延迟 | 零日利用 | 补丁管理
100 | 零日利用 | 未知漏洞 | 未缓解的攻击 | 纵深防御
| 类别 | 漏洞编号 | 关键控制措施 |
|---|---|---|
| 注入 | 1-13 | 参数化查询、输入验证、输出编码 |
| 身份验证 | 14-23, 85-86 | MFA、会话管理、账户锁定 |
| 数据暴露 | 24-27 | 静态/传输中加密、访问控制、DLP |
| 配置错误 | 28-36 | 安全默认设置、强化、打补丁 |
| XML | 37-39, 65 | 禁用外部实体、限制扩展 |
| 访问控制 | 40-44 | RBAC、最小权限、授权检查 |
| 反序列化 | 45-47 | 避免不受信任的数据、完整性验证 |
| API 安全 | 48-51, 75 | OAuth、速率限制、输入验证 |
| 通信 | 52-55 | TLS 1.2+、证书验证、HTTPS |
| 客户端 | 56-60 | CSP、X-Frame-Options、安全的 DOM |
| DoS | 61-65 | 速率限制、DDoS 防护、资源限制 |
| SSRF | 66, 87-88 | URL 白名单、出口过滤 |
| 移动/IoT | 76-84 | 加密、身份验证、安全存储 |
| 业务逻辑 | 74, 92-97 | 威胁建模、逻辑测试 |
| 零日 | 98-100 | 纵深防御、威胁情报 |
Content-Security-Policy: default-src 'self'; script-src 'self'
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains
Referrer-Policy: strict-origin-when-cross-origin
Permissions-Policy: geolocation=(), microphone=()
| OWASP 2021 | 相关漏洞 |
|---|---|
| A01: 失效的访问控制 | 40-44, 23, 74 |
| A02: 加密机制失效 | 24-25, 53-55 |
| A03: 注入 | 1-13, 37-39 |
| A04: 不安全的设计 | 74, 92-97 |
| A05: 安全配置错误 | 26-36 |
| A06: 易受攻击的组件 | 34, 98-100 |
| A07: 身份验证失败 | 14-23, 85-86 |
| A08: 数据完整性失效 | 45-47 |
| A09: 日志记录和监控不足 | 73 |
| A10: 服务器端请求伪造 | 66, 87-88 |
| 挑战 | 解决方案 |
|---|---|
| 扫描中的误报 | 手动验证、上下文分析 |
| 遗漏的业务逻辑缺陷 | 手动测试、威胁建模、滥用案例分析 |
| 加密流量分析 | 代理配置、证书安装 |
| WAF 阻止测试 | 速率调整、IP 轮换、负载编码 |
| 会话处理问题 | Cookie 管理、身份验证状态跟踪 |
| API 发现 | Swagger/OpenAPI 枚举、流量分析 |
| 漏洞类型 | 验证方法 |
|---|---|
| 注入 | 使用编码变体进行负载测试 |
| XSS | 警告框、Cookie 访问、DOM 检查 |
| CSRF | 跨源表单提交测试 |
| SSRF | 带外 DNS/HTTP 回调 |
| XXE | 使用受控服务器的外部实体 |
| 访问控制 | 水平/垂直权限测试 |
| 身份验证 | 凭据轮换、会话分析 |
每周安装次数
0
仓库
GitHub 星标数
1
首次出现
Jan 1, 1970
安全审计
Provide a comprehensive, structured reference for the 100 most critical web application vulnerabilities organized by category. This skill enables systematic vulnerability identification, impact assessment, and remediation guidance across the full spectrum of web security threats. Content organized into 15 major vulnerability categories aligned with industry standards and real-world attack patterns.
Evaluate injection attack vectors targeting data processing components:
SQL Injection (1)
Cross-Site Scripting - XSS (2)
Command Injection (5, 11)
XML Injection (6), LDAP Injection (7), XPath Injection (8)
Server-Side Template Injection - SSTI (13)
Assess authentication mechanism weaknesses:
Session Fixation (14)
Brute Force Attack (15)
Session Hijacking (16)
Credential Stuffing and Reuse (22)
Insecure "Remember Me" Functionality (85)
CAPTCHA Bypass (86)
Identify data protection failures:
IDOR - Insecure Direct Object References (23, 42)
Data Leakage (24)
Unencrypted Data Storage (25)
Information Disclosure (33)
Assess configuration weaknesses:
Missing Security Headers (26)
Default Passwords (28)
Directory Listing (29)
Unprotected API Endpoints (30)
Open Ports and Services (31)
Misconfigured CORS (35)
Unpatched Software (34)
Evaluate XML processing security:
XXE - XML External Entity Injection (37)
XEE - XML Entity Expansion (38)
XML Bomb (Billion Laughs) (39)
XML Denial of Service (65)
Assess authorization enforcement:
Inadequate Authorization (40)
Privilege Escalation (41)
Forceful Browsing (43)
Missing Function-Level Access Control (44)
Evaluate object serialization security:
Remote Code Execution via Deserialization (45)
Data Tampering (46)
Object Injection (47)
Evaluate API-specific vulnerabilities:
Insecure API Endpoints (48)
API Key Exposure (49)
Lack of Rate Limiting (50)
Inadequate Input Validation (51)
API Abuse (75)
Assess transport layer protections:
Man-in-the-Middle Attack (52)
Insufficient Transport Layer Security (53)
Insecure SSL/TLS Configuration (54)
Insecure Communication Protocols (55)
Evaluate browser-side security:
DOM-based XSS (56)
Insecure Cross-Origin Communication (57)
Browser Cache Poisoning (58)
Clickjacking (59, 71)
HTML5 Security Issues (60)
Evaluate availability threats:
DDoS - Distributed Denial of Service (61)
Application Layer DoS (62)
Resource Exhaustion (63)
Slowloris Attack (64)
Assess SSRF vulnerabilities:
SSRF - Server-Side Request Forgery (66)
Blind SSRF (87)
Time-Based Blind SSRF (88)
---|---|---|---|---
67 | HTTP Parameter Pollution | Inconsistent parsing | Injection, ACL bypass | Strict parsing, validation
68 | Insecure Redirects | Unvalidated targets | Phishing, malware | Whitelist destinations
69 | File Inclusion (LFI/RFI) | Unvalidated paths | Code exec, disclosure | Whitelist files, disable RFI
70 | Security Header Bypass | Misconfigured headers | XSS, clickjacking | Proper headers, audits
72 | Inadequate Session Timeout | Excessive timeouts | Session hijacking | Idle termination, timeouts
73 | Insufficient Logging | Missing infrastructure | Detection gaps | SIEM, alerting
74 | Business Logic Flaws | Insecure design | Fraud, unauthorized ops | Threat modeling, testing
---|---|---|---|---
76 | Insecure Mobile Storage | Plain text, weak crypto | Data theft | Keychain/Keystore, encrypt
77 | Insecure Mobile Transmission | HTTP, cert failures | Traffic interception | TLS, cert pinning
78 | Insecure Mobile APIs | Missing auth/validation | Data exposure | OAuth/JWT, validation
79 | App Reverse Engineering | Hardcoded creds | Credential theft | Obfuscation, RASP
80 | IoT Management Issues | Weak auth, no TLS | Device takeover | Strong auth, TLS
81 | Weak IoT Authentication | Default passwords | Unauthorized access | Unique creds, MFA
82 | IoT Vulnerabilities | Design flaws, old firmware | Botnet recruitment | Updates, segmentation
83 | Smart Home Access | Insecure defaults | Privacy invasion | MFA, segmentation
84 | IoT Privacy Issues | Excessive collection | Surveillance | Data minimization
---|---|---|---|---
89 | MIME Sniffing | Missing headers | XSS, spoofing | X-Content-Type-Options
91 | CSP Bypass | Weak config | XSS despite CSP | Strict CSP, nonces
92 | Inconsistent Validation | Decentralized logic | Control bypass | Centralized validation
93 | Race Conditions | Missing sync | Privilege escalation | Proper locking
94-95 | Business Logic Flaws | Missing validation | Financial fraud | Server-side validation
96 | Account Enumeration | Different responses | Targeted attacks | Uniform responses
98-99 | Unpatched Vulnerabilities | Patch delays | Zero-day exploitation | Patch management
100 | Zero-Day Exploits | Unknown vulns | Unmitigated attacks | Defense in depth
| Category | Vulnerability Numbers | Key Controls |
|---|---|---|
| Injection | 1-13 | Parameterized queries, input validation, output encoding |
| Authentication | 14-23, 85-86 | MFA, session management, account lockout |
| Data Exposure | 24-27 | Encryption at rest/transit, access controls, DLP |
| Misconfiguration | 28-36 | Secure defaults, hardening, patching |
| XML | 37-39, 65 | Disable external entities, limit expansion |
| Access Control | 40-44 | RBAC, least privilege, authorization checks |
| Deserialization | 45-47 | Avoid untrusted data, integrity validation |
| API Security | 48-51, 75 | OAuth, rate limiting, input validation |
| Communication | 52-55 |
Content-Security-Policy: default-src 'self'; script-src 'self'
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains
Referrer-Policy: strict-origin-when-cross-origin
Permissions-Policy: geolocation=(), microphone=()
| OWASP 2021 | Related Vulnerabilities |
|---|---|
| A01: Broken Access Control | 40-44, 23, 74 |
| A02: Cryptographic Failures | 24-25, 53-55 |
| A03: Injection | 1-13, 37-39 |
| A04: Insecure Design | 74, 92-97 |
| A05: Security Misconfiguration | 26-36 |
| A06: Vulnerable Components | 34, 98-100 |
| A07: Auth Failures | 14-23, 85-86 |
| A08: Data Integrity | 45-47 |
| A09: Logging Failures | 73 |
| A10: SSRF | 66, 87-88 |
| Challenge | Solution |
|---|---|
| False positives in scanning | Manual verification, contextual analysis |
| Business logic flaws missed | Manual testing, threat modeling, abuse case analysis |
| Encrypted traffic analysis | Proxy configuration, certificate installation |
| WAF blocking tests | Rate adjustment, IP rotation, payload encoding |
| Session handling issues | Cookie management, authentication state tracking |
| API discovery | Swagger/OpenAPI enumeration, traffic analysis |
| Vulnerability Type | Verification Approach |
|---|---|
| Injection | Payload testing with encoded variants |
| XSS | Alert boxes, cookie access, DOM inspection |
| CSRF | Cross-origin form submission testing |
| SSRF | Out-of-band DNS/HTTP callbacks |
| XXE | External entity with controlled server |
| Access Control | Horizontal/vertical privilege testing |
| Authentication | Credential rotation, session analysis |
Weekly Installs
0
Repository
GitHub Stars
1
First Seen
Jan 1, 1970
Security Audits
xdrop 文件传输脚本:Bun 环境下安全上传下载工具,支持加密分享
24,700 周安装
| TLS 1.2+, certificate validation, HTTPS |
| Client-Side | 56-60 | CSP, X-Frame-Options, safe DOM |
| DoS | 61-65 | Rate limiting, DDoS protection, resource limits |
| SSRF | 66, 87-88 | URL whitelisting, egress filtering |
| Mobile/IoT | 76-84 | Encryption, authentication, secure storage |
| Business Logic | 74, 92-97 | Threat modeling, logic testing |
| Zero-Day | 98-100 | Defense in depth, threat intelligence |