Vulnerability Templates

A comprehensive library of vulnerability templates for penetration testing, organized by category. Use these as starting points for documenting findings in your security assessments.

Categories

Business Logic Vulnerability

The application contains flaws in its business logic that allow users to perform actions or access functionality in unin...

High
CVSS 7.5
Clickjacking

The application can be embedded in an iframe on a malicious site, allowing attackers to trick users into clicking hidden...

Medium
CVSS 4.7
Command Injection

The application passes user-supplied input to system shell commands without proper sanitization, allowing attackers to i...

Critical
CVSS 9.8
Cookie Without HttpOnly Flag

Session cookies are set without the HttpOnly flag, making them accessible to client-side JavaScript and vulnerable to th...

Low
CVSS 3.7
Cookie Without Secure Flag

Session cookies or other sensitive cookies are set without the Secure flag, allowing them to be transmitted over unencry...

Low
CVSS 3.7
CORS Misconfiguration

The application implements an overly permissive Cross-Origin Resource Sharing policy, reflecting arbitrary origins or al...

High
CVSS 7.5
CRLF Injection

The application includes user input in HTTP response headers without filtering carriage return and line feed characters,...

Medium
CVSS 6.1
Cross-Site Scripting (XSS) - Reflected

The application reflects user-supplied input in HTTP responses without proper encoding or sanitization, allowing attacke...

High
CVSS 6.1
Cross-Site Scripting (XSS) - DOM-Based

The application's client-side JavaScript processes user-supplied input in an unsafe way, writing it to the DOM without p...

High
CVSS 6.1
Directory Listing Enabled

The web server is configured to display directory listings when no index file is present, exposing the file structure an...

Low
CVSS 5.3
Host Header Injection

The application trusts the Host header for generating URLs, redirects, or password reset links without proper validation...

Medium
CVSS 6.1
HTML Injection

The application renders user-supplied HTML content without proper sanitization, allowing attackers to inject arbitrary H...

Medium
CVSS 5.4
1 of 2