Server Security Misconfiguration
  • Unsafe Cross-Origin Resource Sharing
  • Path Traversal
  • Directory Listing Enabled
  • Same-Site Scripting
  • SSL Attack (BREACH, POODLE etc.)
  • Using Default Credentials
  • Misconfigured DNS
  • Mail Server Misconfiguration
  • Lack of Password Confirmation
  • No Rate Limiting on Form
  • Unsafe File Upload
  • Cookie Scoped to Parent Domain
  • Missing Secure or HTTPOnly Cookie Flag
  • Clickjacking
  • OAuth Misconfiguration
  • Captcha Bypass
  • Exposed Admin Portal
  • Missing DNSSEC
  • Fingerprinting/Banner Disclosure
  • Username Enumeration
  • Potentially Unsafe HTTP Method Enabled
  • Insecure SSL
  • Reflected File Download (RFD)
  • Lack of Security Headers
  • Bitsquatting



  • SPVREDDY Server-Side Injection

    Select a high-level classification on the left, or use the search function to specify the vulnerability name and variant of your exploit.

  • File Inclusion
    • Local
  • Parameter Pollution
    • Social Media Sharing Buttons
  • Remote Code Execution (RCE)
  • SQL Injection
    • Error-Based
    • Blind
  • XML External Entity Injection (XXE)
  • HTTP Response Manipulation
    • Response Splitting (CRLF)
  • Content Spoofing
    • iframe Injection
    • External Authentication Injection
    • Email HTML Injection
    • Text Injection
    • Homograph/IDN-Based



    SPVREDDY


    SPVREDDY


    SPVREDDY Broken Authentication and Session Management

    Select a high-level classification on the left, or use the search function to specify the vulnerability name and variant of your exploit.

  • Authentication Bypass
  • Privilege Escalation
  • Weak Login Function
    • Over HTTP
  • Session Fixation
  • Failure to Invalidate Session
    • On Logout
    • On Password Reset
    • On Password Change
    • All Sessions
    • On Email Change
    • Long Timeout
  • Concurrent Logins
  • Weak Registration Implementation
    • Over HTTP



    SPVREDDY


    SPVREDDY


    SPVREDDY Sensitive Data Exposure
  • Critically Sensitive Data
  • EXIF Geolocation Data Not Stripped From Uploaded Images
  • Visible Detailed Error/Debug Page
  • Disclosure of Known Public Information
  • Token Leakage via Referer
  • Sensitive Token in URL
  • Non-Sensitive Token in URL
  • Weak Password Reset Implementation
  • Mixed Content (HTTPS Sourcing HTTP)
  • Sensitive Data Hardcoded
  • Internal IP Disclosure
  • Cross Site Script Inclusion (XSSI)
  • JSON Hijacking



  • SPVREDDY


    SPVREDDY


    SPVREDDY Cross-Site Scripting (XSS)

    Select a high-level classification on the left, or use the search function to specify the vulnerability name and variant of your exploit.

  • Stored
    • Non-Admin to Anyone
    • Admin to Anyone
    • Self
  • Reflected
    • Non-Self
    • Self
  • Cookie-Based
  • IE-Only
    • Older Version (IE 10/11)
    • XSS Filter Disabled
    • Older Version (< IE10)
  • Referer
  • TRACE Method
  • Universal (UXSS)
  • Off-Domain
    • Data URI



    SPVREDDY


    SPVREDDY


    SPVREDDY Broken Access Control
  • Insecure Direct Object References (IDOR)
  • Server-Side Request Forgery (SSRF)
  • Username Enumeration
  • Exposed Sensitive Android Intent
  • Exposed Sensitive iOS URL Scheme



  • SPVREDDY


    SPVREDDY


    SPVREDDY Cross-Site Request Forgery (CSRF)
  • Application-Wide
  • Action-Specific



  • SPVREDDY


    SPVREDDY


    SPVREDDY Application-Level Denial-of-Service (DoS)
  • Critical Impact and/or Easy Difficulty
  • High Impact and/or Medium Difficulty
  • App Crash



  • SPVREDDY


    SPVREDDY


    SPVREDDY Unvalidated Redirects and Forwards
  • Open Redirect
  • Tabnabbing
  • Lack of Security Speed Bump Page



  • SPVREDDY


    SPVREDDY


    SPVREDDY External Behavior

    Select a high-level classification on the left, or use the search function to specify the vulnerability name and variant of your exploit.

  • Browser Feature
    • Plaintext Password Field
    • Save Password
    • Autocomplete Enabled
    • Autocorrect Enabled
    • Aggressive Offline Caching
  • CSV Injection
  • Captcha Bypass
    • Crowdsourcing
  • System Clipboard Leak
    • Shared Links
  • User Password Persisted in Memory



    SPVREDDY


    SPVREDDY


    SPVREDDY Insufficient Security Configurability

    Select a high-level classification on the left, or use the search function to specify the vulnerability name and variant of your exploit.

  • Weak Password Policy
  • No Password Policy
  • Weak Password Reset Implementation
    • Token is Not Invalidated After Use
    • Token is Not Invalidated After Email Change
    • Token is Not Invalidated After Password Change
    • Token Has Long Timed Expiry
    • Token is Not Invalidated After New Token is Requested
  • Lack of Verification Email
  • Lack of Notification Email
  • Weak Registration Implementation
    • Allows Disposable Email Addresses
  • Weak 2FA Implementation
    • Missing Failsafe



    SPVREDDY


    SPVREDDY


    SPVREDDY Using Components with Known Vulnerabilities

    Select a high-level classification on the left, or use the search function to specify the vulnerability name and variant of your exploit.

  • Rosetta Flash
  • Outdated Software Version
  • Captcha Bypass
    • OCR (Optical Character Recognition)



    SPVREDDY


    SPVREDDY


    SPVREDDY Insecure Data Storage
  • Sensitive Application Data Stored Unencrypted
  • Server-Side Credentials Storage
  • Non-Sensitive Application Data Stored Unencrypted
  • Screen Caching Enabled



  • SPVREDDY


    SPVREDDY


    SPVREDDY Lack of Binary Hardening
  • Lack of Exploit Mitigations
  • Lack of Jailbreak Detection
  • Lack of Obfuscation
  • Runtime Instrumentation-Based



  • SPVREDDY


    SPVREDDY


    SPVREDDY Insecure Data Transport
  • Cleartext Transmission of Sensitive Data
  • Executable Download



  • SPVREDDY


    SPVREDDY


    SPVREDDY Insecure OS/Firmware
  • Command Injection
  • Hardcoded Password



  • SPVREDDY


    SPVREDDY


    SPVREDDY Broken Cryptography
  • Cryptographic Flaw



  • SPVREDDY


    SPVREDDY


    SPVREDDY Privacy Concerns
  • Unnecessary Data Collection



  • SPVREDDY


    SPVREDDY


    SPVREDDY Network Security Misconfiguration
  • Telnet Enabled



  • SPVREDDY


    SPVREDDY


    SPVREDDY Mobile Security Misconfiguration
  • SSL Certificate Pinning
  • Tapjacking



  • SPVREDDY


    SPVREDDY


    SPVREDDY Client-Side Injection
  • Binary Planting