Security Vulnerability Database

50 vulnerabilities with real code examples, exploit scenarios, and fix instructions.

Exposed Secrets

Stripe API Keys Committed to Source Code

critical

Learn why Stripe API keys in source code are critical vulnerabilities. See real examples and how to fix exposed Stripe secret keys in your codebase.

.env File Accessible Publicly or Committed to Git

critical

Discover how exposed .env files leak database passwords, API keys, and secrets. Learn to secure your .env files from public access and git commits.

GitHub Personal Access Token Leaked in Code

critical

GitHub personal access tokens in source code let attackers access private repos and push malicious code. Learn how to detect and fix token leaks.

Database Credentials Hardcoded in Application Source

critical

Hardcoded database passwords give attackers direct access to your data. Learn why this happens and how to properly manage database credentials.

AWS Access Keys Committed to Source Code

critical

Exposed AWS access keys let attackers take over your cloud account. Learn how to detect leaked AWS keys and secure your credentials properly.

JWT Signing Secret Hardcoded in Application Source

high

A hardcoded JWT secret lets attackers forge authentication tokens and impersonate users. Learn how to secure JWT signing keys properly.

Firebase Service Account Key Exposed in Client Code

high

Exposed Firebase service account keys give attackers full admin access to your project. Learn how to detect and fix this critical vulnerability.

Encryption Key Hardcoded in Application Source

high

Hardcoded encryption keys make your encryption useless. Learn how to properly manage encryption keys using environment variables and KMS.

Slack Webhook URL Committed to Source Code

medium

Exposed Slack webhook URLs let attackers post phishing messages to your channels. Learn how to secure Slack webhooks and prevent abuse.

SSH Private Key Committed to Version Control

critical

SSH private keys in git repos give attackers direct server access. Learn how to detect exposed SSH keys and secure your deployment process.

Web Security

CORS Wildcard Misconfiguration Allows Unauthorized Cross-Origin Access

high

Learn why setting Access-Control-Allow-Origin to * is dangerous, how attackers exploit permissive CORS policies, and how to configure a secure origin allowlist.

Missing Content Security Policy Header Enables Script Injection

medium

Discover why a missing Content Security Policy header leaves your app open to XSS attacks and how to build a robust CSP for Next.js and Express applications.

Missing HTTP Security Headers Expose Application to Common Attacks

medium

Learn which HTTP security headers your app needs, why missing them is risky, and how to add X-Frame-Options, HSTS, and more in Next.js and Express.

Open Redirect Vulnerability Enables Phishing and Token Theft

medium

Understand how open redirect vulnerabilities enable phishing attacks, learn to identify unsafe redirect patterns, and implement proper URL validation in your app.

Clickjacking Vulnerability Due to Missing Frame Protection

medium

Learn how clickjacking attacks work, why missing X-Frame-Options headers are dangerous, and how to protect your app with frame-ancestors and CSP directives.

Missing HTTPS Redirect Exposes Traffic to Interception

high

Learn why missing HTTP-to-HTTPS redirects expose your users to man-in-the-middle attacks and how to configure proper redirects with HSTS.

Insecure Cookie Flags Allow Session Hijacking and CSRF

high

Understand why missing Secure, HttpOnly, and SameSite cookie flags are dangerous and learn how to configure cookies correctly in Next.js and Express.

Exposed Source Maps in Production Leak Application Source Code

medium

Learn why publicly accessible source maps in production reveal your entire frontend codebase and how to disable or restrict them in Next.js and Webpack.

Missing CSRF Protection Allows Unauthorized State-Changing Requests

high

Understand how CSRF attacks exploit cookie-based authentication, learn the synchronizer token pattern, and implement CSRF protection in Next.js APIs.

Missing Subresource Integrity on CDN Scripts Enables Supply Chain Attacks

low

Learn how missing Subresource Integrity hashes on CDN scripts expose your app to supply chain attacks and how to generate and maintain SRI hashes.

Infrastructure

AWS S3 Bucket With Public Access Enabled

critical

Learn why public AWS S3 buckets cause data breaches and how to lock them down with Block Public Access, IAM policies, and automated auditing.

Overly Permissive AWS IAM Policies

critical

Wildcard IAM policies grant full AWS account access. Learn how to audit, scope, and lock down IAM roles using least privilege principles.

Docker Socket Exposed to Containers

critical

Mounting docker.sock in containers grants host root access. Learn secure alternatives like socket proxies, rootless Docker, and Kaniko.

Admin Panel Accessible Without Authentication

high

Public admin panels let attackers control your application. Learn to secure them with VPNs, authentication, IP restrictions, and network segmentation.

Debug Mode Enabled in Production

high

Debug mode in production leaks source code, secrets, and database details. Learn how to disable it and use safe configuration defaults.

No Rate Limiting on API Endpoints

medium

APIs without rate limiting are vulnerable to brute-force, scraping, and DDoS attacks. Learn to implement rate limits with Express and nginx.

Git Directory Accessible via Web Server

high

An accessible .git folder lets attackers download your full repo, including secrets. Learn to block it with nginx rules and secure deployments.

GraphQL Introspection Enabled in Production

medium

GraphQL introspection exposes your entire API schema to attackers. Learn to disable it in production and add field-level authorization.

Stack Traces and Error Details Shown to Users

medium

Detailed error messages reveal stack traces, queries, and file paths. Learn to implement safe error handling with logging and correlation IDs.

MongoDB Running Without Authentication

critical

Unauthenticated MongoDB instances are targeted by ransomware bots. Learn to enable auth, bind to localhost, and secure your database.

Code Injection

SQL Injection via Unsanitized Input

critical

Learn how SQL injection attacks work, see vulnerable and fixed code examples, and discover best practices for preventing SQLi in your applications.

Cross-Site Scripting (XSS)

high

Understand how XSS attacks work, explore real-world vulnerable code patterns, and learn how to prevent cross-site scripting in modern web apps.

OS Command Injection

critical

Learn how OS command injection attacks exploit shell execution in Node.js apps, and discover secure alternatives to prevent arbitrary command execution.

Server-Side Request Forgery (SSRF)

high

Understand server-side request forgery, learn how attackers reach internal services through your app, and implement defenses to block SSRF.

Path Traversal (Directory Traversal)

high

Learn how path traversal attacks escape upload directories, read sensitive files, and how to validate file paths to prevent directory traversal.

JavaScript Prototype Pollution

high

Understand JavaScript prototype pollution, how attackers exploit deep merge functions, and learn safe coding patterns to prevent prototype chain attacks.

Insecure Deserialization of User Input

critical

Learn how insecure deserialization enables remote code execution, see examples in Python and Node.js, and discover how to safely handle serialized data.

Server-Side Template Injection (SSTI)

critical

Discover how server-side template injection works, learn to detect SSTI in Flask and Express apps, and implement fixes to prevent template-based RCE.

XML External Entity (XXE) Attack

high

Learn how XXE attacks exploit XML parsers to read files and perform SSRF, and discover how to configure your parser securely to prevent XXE.

NoSQL Injection in MongoDB Queries

high

Learn how NoSQL injection attacks bypass MongoDB authentication, see real exploit payloads, and implement input validation to secure your queries.

Authentication

API Endpoints Without Authentication Checks

critical

Learn how missing authentication on API endpoints exposes data, and discover patterns for enforcing auth on every route by default.

Insecure Direct Object Reference (IDOR)

high

Understand how IDOR attacks let users access other users' data by changing IDs, and learn how to implement proper authorization checks.

Weak Password Hashing (MD5/SHA1)

high

Understand why MD5 and SHA1 are unsafe for passwords, see GPU cracking speeds, and learn to migrate to bcrypt or Argon2 for proper password security.

Session Fixation Attacks

high

Learn how session fixation attacks hijack user sessions, why session regeneration is critical, and how to secure your session management.

Insecure OAuth Configuration

high

Discover common OAuth 2.0 misconfigurations, learn why the state parameter matters, and implement secure token handling in your authentication flow.

Default Admin Credentials in Production

critical

Learn why default passwords are one of the most exploited vulnerabilities, and implement deployment checks to ensure credentials are always changed.

Missing Input Validation on User Data

high

Learn why server-side input validation is essential, see how missing validation enables attacks, and implement schema-based validation with Zod.

Unrestricted File Upload Vulnerabilities

high

Learn how unrestricted file uploads enable web shell attacks and remote code execution, and implement content validation to secure file handling.

Broken Access Control and Missing Authorization

critical

Learn how broken access control lets regular users reach admin features, and implement role-based authorization to enforce least privilege.

Insecure Password Reset Flow

high

Learn how insecure password reset flows enable account takeover, and implement secure token generation, expiration, and validation patterns.

Scan Your Site for Free

Enter any URL to check for security vulnerabilities, misconfigurations, and exposed secrets in seconds.