Digital garden

Home

❯

knowledge

❯

fundamentals

❯

security

❯

web

❯

web hacking

web hacking

Feb 04, 20261 min read

Web hacking

web-cache-poisoning host-header-injection

business-logic-vul

information disclosure vulnerability

race condition vulnerability

xss

  • reflected xss

open-redirect

sqli

  • time-based-sqli
  • error-based-sqli

access control vulnerability

  • idor

authentication-vul

insecure-deserialization

dos

wstg


Graph View

Backlinks

  • hackerone-anghami-2015-10-n-86468
  • hackerone-bcm_messenger-2020-04-m-764243
  • hackerone-bohemia-2018-09-h-287789
  • hackerone-clario-2020-05-m-783117
  • hackerone-eternal-2018-02-c-300176
  • hackerone-eternal-2018-03-c-358669
  • hackerone-eternal-2018-09-c-403616
  • hackerone-eternal-2019-05-m-507097
  • hackerone-ethernal-2018-09-l-404797
  • hackerone-figma-2020-10-l-996141
  • hackerone-greenhouseio-2020-05-l-819278
  • hackerone-irccloud-2020-07-h-906907
  • hackerone-khan-academy-2018-03-h-319279
  • hackerone-logitech-2020-09-l-978680
  • hackerone-mavenlink-2019-02-l-300179
  • hackerone-mtn-group-2020-03-h-761304
  • hackerone-nord-security-2020-02-h-751577
  • hackerone-paloalto-software-2020-05-c-854290
  • hackerone-phabricator-2019-08-n-661978
  • hackerone-reverb-2018-04-n-172549
  • hackerone-rocket_chat-2018-04-m-399166
  • hackerone-rocket_chat-2019-10-n-433792
  • hackerone-shopify-2015-10-n-57505
  • hackerone-shopify-2018-05-m-322661
  • hackerone-shopify-2019-09-n-691611
  • hackerone-shopify-2019-11-m-729424
  • hackerone-shopify-2020-02-c-791775
  • hackerone-shopify-2020-02-n-763994
  • hackerone-shopify-2020-04-n-798599
  • hackerone-shopify-2020-06-c-910300
  • hackerone-shopify-2020-06-m-273099
  • hackerone-shopify-2020-07-h-946053
  • hackerone-shopify-2020-07-l-905737
  • hackerone-shopify-2020-07-l-927567
  • hackerone-shopify-2020-08-h-948929
  • hackerone-shopify-2020-08-l-887879
  • hackerone-shopify-2020-08-l-953083
  • hackerone-shopify-2020-08-l-964550
  • hackerone-shopify-2020-08-m-869888
  • hackerone-shopify-2020-08-n-854299
  • hackerone-shopify-2020-08-n-962895
  • hackerone-shopify-2020-09-h-978125
  • hackerone-shopify-2020-09-l-860348
  • hackerone-shopify-2020-09-l-906201
  • hackerone-shopify-2020-09-l-947728
  • hackerone-shopify-2020-09-l-977851
  • hackerone-shopify-2020-09-n-858915
  • hackerone-shopify-2020-09-n-860197
  • hackerone-shopify-2020-09-n-869831
  • hackerone-shopify-2020-09-n-982510
  • hackerone-shopify-2020-10-m-975047
  • hackerone-shopify-2020-10-m-980511
  • hackerone-shopify-2020-10-m-981472
  • hackerone-starbucks-2017-02-h-198292
  • hackerone-stripo-2020-01-m-761382
  • hackerone-stripo-2020-02-l-739858
  • hackerone-stripo-2020-09-m-983331
  • hackerone-trint-2019-06-m-547663
  • hackerone-twitter-2019-04-m-544329
  • hackerone-udemy-2019-04-n-330135
  • hackerone-us-dept-of-defense-2019-08-h-519631
  • hackerone-us-dept-of-defense-2019-10-h-489483
  • hackerone-us-dept-of-defense-2020-06-h-491191
  • hackerone-us-dept-of-defense-h-741683
  • hackerone-us-gsa-2019-03-c-297478
  • hackerone-uzbey-2014-11-n-23014
  • hackerone-yelp-2020-08-c-391092
  • idor
  • reflected xss
  • ssti
  • xss
  • Portswigger-Insecure direct object references
  • Portswigger-Method-based access control can be circumvented
  • Portswigger-Multi-step process with no access control on one step
  • Portswigger-Referer-based access control
  • Portswigger-URL-based access control can be circumvented
  • Portswigger-Unprotected admin functionality with unpredictable URL
  • Portswigger-Unprotected admin functionality
  • Portswigger-User ID controlled by request parameter with data leakage in redirect
  • Portswigger-User ID controlled by request parameter with password disclosure
  • Portswigger-User ID controlled by request parameter, with unpredictable user IDs
  • Portswigger-User ID controlled by request parameter
  • Portswigger-User role can be modified in user profile
  • Portswigger-User role controlled by request parameter
  • Portswigger-2FA simple bypass
  • Portswigger-Authentication bypass via encryption oracle
  • Portswigger-High-level logic vulnerability
  • Portswigger-Inconsistent security controls
  • Portswigger-Infinite money logic flaw
  • Portswigger-Insufficient workflow validation
  • Portswigger-Low-level logic flaw
  • Portswigger-Password reset broken logic
  • Portswigger-Weak isolation on dual-use endpoint
  • Portswigger-excessive trust in client-side controls
  • Portswigger-Authentication bypass via information disclosure
  • Portswigger-Information disclosure in error messages
  • Portswigger-Information disclosure in version control history
  • Portswigger-Information disclosure on debug page
  • Portswigger-Source code disclosure via backup files
  • Portswigger-Arbitrary object injection in PHP
  • Portswigger-Basic server-side template injection (code context)
  • Portswigger-Basic server-side template injection
  • Portswigger-Server-side template injection in an unknown language with a documented exploit
  • Portswigger-Server-side template injection using documentation
  • Portswigger-Server-side template injection with information disclosure via user-supplied objects
  • Portswigger-Targeted web cache poisoning using an unknown header
  • Portswigger-Web cache poisoning to exploit a DOM vulnerability via a cache with strict cacheability criteria
  • Portswigger-Web cache poisoning with an unkeyed cookie
  • Portswigger-Web cache poisoning with an unkeyed header
  • Portswigger-Web cache poisoning with multiple headers
  • Portswigger-DOM XSS in document-write sink using source location-search
  • Portswigger-DOM XSS in innerHTML sink using source location-search
  • Portswigger-DOM XSS in jQuery anchor href attribute sink using location-search source
  • Portswigger-Reflected XSS in canonical link tag
  • Portswigger-Reflected XSS into HTML context with all tags blocked except custom ones
  • Portswigger-Reflected XSS into HTML context with most tags and attributes blocked
  • Portswigger-Reflected XSS into HTML context with nothing encoded
  • Portswigger-Reflected XSS into a JavaScript string with angle brackets HTML encoded
  • Portswigger-Reflected XSS into a JavaScript string with angle brackets and double quotes HTML-encoded and single quotes escaped
  • Portswigger-Reflected XSS into a JavaScript string with single quote and backslash escaped
  • Portswigger-Reflected XSS into attribute with angle brackets HTML-encoded
  • Portswigger-Reflected XSS with event handlers and href attributes blocked
  • Portswigger-Reflected XSS with some SVG markup allowed
  • Portswigger-Stored XSS into HTML context with nothing encoded
  • Portswigger-Stored XSS into anchor href attribute with double quotes HTML-encoded
  • XSS Challenge_Level1
  • XSS Challenge_Level10
  • XSS Challenge_Level11
  • XSS Challenge_Level12
  • XSS Challenge_Level13
  • XSS Challenge_Level14
  • XSS Challenge_Level2
  • XSS Challenge_Level3
  • XSS Challenge_Level4
  • XSS Challenge_Level5
  • XSS Challenge_Level6
  • XSS Challenge_Level7
  • XSS Challenge_Level8
  • XSS Challenge_Level9
  • XSS Game_Level1
  • XSS Game_Level2
  • XSS Game_Level3
  • XSS Game_Level4
  • XSS Game_Level5
  • XSS Game_Level6

Created with Quartz v4.5.1 © 2026

  • Blog