COMPLETE BUG BOUNTY MASTER LIST (200+ BUGS)


1. INJECTION ATTACKS (21)

Attacks where untrusted data is sent to an interpreter as part of a command or query

  1. SQL Injection (Classic)
  2. SQL Injection (Union-based)
  3. SQL Injection (Error-based)
  4. SQL Injection (Blind/Boolean-based)
  5. SQL Injection (Time-based)
  6. Second-Order SQL Injection
  7. NoSQL Injection (MongoDB)
  8. NoSQL Injection (JavaScript-based)
  9. Command Injection
  10. Blind Command Injection
  11. LDAP Injection
  12. Email Header Injection
  13. SMTP Injection
  14. XPath Injection
  15. XQuery Injection
  16. GraphQL Query Injection
  17. HTML Injection
  18. CRLF Injection (HTTP Response Splitting)
  19. Expression Language Injection (EL/OGNL)
  20. Template Injection (Server-Side)
  21. Log Injection/Log Forging

2. CROSS-SITE SCRIPTING (XSS) & CLIENT-SIDE (19)

Flaws allowing malicious script injection into web pages viewed by other users

  1. Reflected XSS
  2. Stored XSS
  3. DOM-Based XSS
  4. Blind XSS
  5. Mutation XSS (mXSS)
  6. Self-XSS
  7. Universal XSS (UXSS)
  8. XSS via SVG/Vector Images
  9. XSS via PDF/File Uploads
  10. XSS via WebSockets
  11. Cross-Site Request Forgery (CSRF)
  12. JSONP Injection/Callback Hijacking
  13. Clickjacking (UI Redressing)
  14. Open Redirect
  15. Cross-Origin Resource Sharing (CORS) Misconfiguration
  16. Cross-Origin Opener Policy (COOP) Bypass
  17. DOM Clobbering
  18. Tabnabbing/Reverse Tabnabbing
  19. PostMessage Vulnerabilities

3. BROKEN ACCESS CONTROL (22)

Failures in restrictions on what authenticated users are allowed to do

  1. Insecure Direct Object References (IDOR)
  2. Blind IDOR
  3. Horizontal Privilege Escalation
  4. Vertical Privilege Escalation
  5. Mass Assignment/Vulnerable Parameter Binding
  6. Directory Traversal/Path Traversal
  7. Local File Inclusion (LFI)
  8. Remote File Inclusion (RFI)
  9. Forced Browsing/Directory Enumeration
  10. Insecure API Endpoint Exposure
  11. Missing Function Level Access Control
  12. JWT None Algorithm Attack
  13. JWT Algorithm Confusion (RS256 to HS256)
  14. JWT Kid Parameter Injection
  15. JWT Weak Secret Bruteforce
  16. OAuth Misconfiguration
  17. OAuth State Parameter Leakage
  18. OAuth Redirect URI Bypass
  19. Single Sign-On (SSO) Bypass
  20. SAML Assertion Injection
  21. SAML Signature Wrapping
  22. Insecure Direct Object References via GraphQL

4. SECURITY MISCONFIGURATION (21)

Resulting from insecure default configurations, incomplete or ad-hoc configurations

  1. XML External Entity (XXE) Injection
  2. Blind XXE
  3. XXE via SVG Upload
  4. Default Credentials
  5. Exposed Admin Panels
  6. Directory Listing Enabled
  7. Information Disclosure via Headers (Server, X-Powered-By)
  8. Debug Mode Enabled in Production
  9. Stack Trace/Verbose Error Messages
  10. Weak Password Policy
  11. No Account Lockout Policy
  12. Missing Security Headers (HSTS, CSP, X-Frame-Options)
  13. Content Security Policy (CSP) Bypass
  14. Insecure Cryptographic Storage
  15. Hardcoded API Keys/Credentials in Source Code
  16. Hardcoded Secrets in Mobile Apps
  17. Hardcoded Secrets in JavaScript Files
  18. Exposed S3 Buckets/Cloud Storage
  19. Exposed Git Repository (.git/config)
  20. Exposed Environment Files (.env)
  21. Outdated Software with Known Vulnerabilities

5. SERVER-SIDE & BUSINESS LOGIC (27)

Flaws in the design and flow of an application that can be exploited

  1. Server-Side Request Forgery (SSRF) – Basic
  2. Blind SSRF
  3. SSRF via Webhooks
  4. SSRF via PDF Generators
  5. SSRF via Image Processing
  6. Business Logic Flaw – Price Manipulation
  7. Business Logic Flaw – Quantity Manipulation (Negative Numbers)
  8. Business Logic Flaw – Coupon/Discount Abuse
  9. Business Logic Flaw – Unlimited Usage of Single-Use Items
  10. Business Logic Flaw – Step/Workflow Bypass
  11. Business Logic Flaw – Parameter Tampering
  12. Race Condition – Concurrent Requests
  13. Race Condition – Time-of-Check to Time-of-Use (TOCTOU)
  14. Race Condition – Payment/Limit Bypass
  15. Insecure Deserialization (PHP)
  16. Insecure Deserialization (Java)
  17. Insecure Deserialization (Python/Node.js)
  18. HTTP Request Smuggling (CL.TE)
  19. HTTP Request Smuggling (TE.CL)
  20. HTTP Request Smuggling (TE.TE)
  21. HTTP/2 Request Smuggling
  22. Unrestricted File Upload
  23. File Upload – MIME Type Bypass
  24. File Upload – Double Extensions
  25. File Upload – Polyglot Files
  26. Server-Side Template Injection (SSTI)
  27. Web Cache Poisoning

6. AUTHENTICATION & SESSION MANAGEMENT (22)

Flaws in functions related to user identity, login, and session handling

  1. Authentication Bypass
  2. Brute Force – Login Endpoint
  3. Brute Force – OTP/2FA Endpoint
  4. Weak Captcha Implementation
  5. Captcha Bypass via Response Manipulation
  6. Session Fixation
  7. Session Hijacking
  8. Session Token in URL
  9. Predictable Session Tokens
  10. Insufficient Session Expiry
  11. Password Reset Token Leakage via Referrer
  12. Password Reset Token Hijacking
  13. Password Reset Poisoning (Host Header)
  14. 2FA Bypass – Backup Code Abuse
  15. 2FA Bypass – Response Manipulation
  16. 2FA Bypass – Missing Rate Limiting
  17. 2FA Bypass – OAuth Integration Flaw
  18. Account Takeover (ATO) via CSRF
  19. Account Takeover via IDOR
  20. Account Takeover via Password Reset
  21. OTP Leakage in Response Body
  22. Replay Attacks

7. INFORMATION DISCLOSURE (17)

Exposure of sensitive information to unauthorized parties

  1. Sensitive Data Exposure (PII)
  2. Information Disclosure via Error Messages
  3. Information Disclosure via Debug Endpoints
  4. Information Disclosure via Source Code Comments
  5. Information Disclosure via JavaScript Files
  6. Information Disclosure via Backup Files (.bak, .old)
  7. Internal IP Address Disclosure
  8. Internal Path Disclosure
  9. Internal Email Disclosure
  10. API Key Leakage in JavaScript
  11. API Key Leakage in Mobile Traffic
  12. Cloud Metadata Exposure via SSRF
  13. AWS Keys via Instance Metadata
  14. Google Hacking/Dorking Vulnerabilities
  15. GitHub Secrets Exposure
  16. Wayback Machine/Hidden Endpoint Discovery
  17. Information Disclosure via Response Timing

8. API-SPECIFIC VULNERABILITIES (20)

Flaws particularly common or impactful in Application Programming Interfaces

  1. Broken Object Level Authorization (BOLA/IDOR in APIs)
  2. Broken Function Level Authorization (BFLA)
  3. Broken User Authentication
  4. Mass Assignment in APIs
  5. Excessive Data Exposure
  6. Lack of Resources/Rate Limiting
  7. API Key Leakage
  8. GraphQL Introspection Enabled
  9. GraphQL Query Depth Attacks
  10. GraphQL Alias-Based Attacks
  11. GraphQL Batching Attacks
  12. GraphQL Field Duplication Abuse
  13. Improper Assets Management (Stale/Shadow APIs)
  14. Webhooks Exploitation
  15. Hidden Parameters in API Requests
  16. Improper Error Messaging (Verbose Errors)
  17. API Versioning Bypass
  18. Shadow APIs from Mobile Apps
  19. Shadow APIs from JavaScript
  20. JSON Parameter Pollution

9. INFRASTRUCTURE & CRYPTOGRAPHIC FAILURES (18)

Failures related to the supporting infrastructure or cryptography

  1. Subdomain Takeover
  2. Subdomain Hijacking via Expired CNAME
  3. Subdomain Takeover via Azure/AWS/GCP Services
  4. DNS Cache Poisoning
  5. DNS Zone Transfer
  6. Buffer Overflow
  7. Integer Overflow
  8. Memory Leak
  9. Use-After-Free
  10. Insecure Communication (HTTP instead of HTTPS)
  11. Weak SSL/TLS Ciphers
  12. SSL/TLS Certificate Validation Bypass
  13. Open Ports Exposure
  14. Exposed Database (MongoDB, Elasticsearch, Redis)
  15. Exposed Development Services (Jenkins, Kibana)
  16. Exposed Kubernetes Dashboard
  17. Weak Cryptographic Key Generation
  18. Predictable Random Number Generation

10. MODERN & EMERGING ATTACKS (25)

Newer vulnerability classes and advanced attack chains

  1. LLM Prompt Injection – Direct
  2. LLM Prompt Injection – Indirect
  3. LLM Training Data Poisoning
  4. LLM Sensitive Data Leakage
  5. LLM Plugin/Tool Abuse
  6. Dependency Confusion (Supply Chain)
  7. Typosquatting Package Attacks
  8. CI/CD Pipeline Injection
  9. WebAssembly (WASM) – Hardcoded Secrets
  10. WebAssembly (WASM) – Logic Bypass via Modification
  11. Prototype Pollution – Client-Side
  12. Prototype Pollution – Server-Side (via JSON)
  13. Web Cache Deception
  14. Cache Poisoning via HTTP/2
  15. Dangling JSONP Endpoints
  16. Feature Flag Manipulation
  17. SaaS Token Reuse
  18. Zip Slip (Archive Extraction Vulnerability)
  19. HTML-to-PDF Injection/SSRF
  20. ImageTragick/ImageMagick Exploits
  21. Exiftool RCE (CVE-2021-22204)
  22. Log4Shell (CVE-2021-44228)
  23. WebSocket Hijacking
  24. Server-Side JavaScript Injection
  25. Web Cache Poisoning via Unkeyed Headers

11. KNOWN CVEs & CRITICAL VULNERABILITIES (14)

High-profile, real-world vulnerabilities frequently hunted in bug bounties

  1. Heartbleed (CVE-2014-0160) – OpenSSL Memory Leak
  2. Shellshock (CVE-2014-6271) – Bash RCE
  3. POODLE (CVE-2014-3566) – SSL 3.0 Fallback
  4. GHOST (CVE-2015-0235) – glibc RCE
  5. DROWN (CVE-2016-0800) – SSLv2 Decryption
  6. Apache Struts2 S2-045 (CVE-2017-5638) – RCE
  7. Apache Struts2 S2-057 (CVE-2018-11776) – RCE
  8. BlueKeep (CVE-2019-0708) – RDP RCE
  9. Citrix ADC RCE (CVE-2019-19781)
  10. F5 BIG-IP RCE (CVE-2020-5902)
  11. ZeroLogon (CVE-2020-1472) – Netlogon Privilege Escalation
  12. Windows CryptoAPI Spoofing (CVE-2020-0601)
  13. ProxyLogon (CVE-2021-26855) – Exchange Server RCE
  14. Confluence OGNL Injection (CVE-2021-26084)

12. MISCELLANEOUS & NICHÉ (13)

Specialized or less common but valid vulnerabilities

  1. Captcha Bypass via OCR
  2. Captcha Bypass via Replay
  3. Referer Leakage
  4. User Enumeration via Response Timing
  5. User Enumeration via Forgot Password
  6. User Enumeration via Registration
  7. Host Header Injection
  8. X-Forwarded-For Spoofing
  9. HTTP Parameter Pollution (HPP)
  10. Cacheable HTTPS Responses with Sensitive Data
  11. Mixed Content Warnings
  12. Autocomplete on Sensitive Fields
  13. Missing Anti-Clickjacking Headers

BUG CATEGORY SUMMARY

CategoryNumber of Bugs
Injection Attacks21
XSS & Client-Side19
Broken Access Control22
Security Misconfiguration21
Server-Side & Business Logic27
Authentication & Session22
Information Disclosure17
API-Specific20
Infrastructure & Crypto18
Modern & Emerging Attacks25
Known CVEs14
Miscellaneous & Niché13
TOTAL239

HOW TO USE THIS LIST

  1. Checklist Methodology: Use this as a comprehensive checklist when testing a target
  2. Prioritize by Impact: Focus on critical categories like Access Control, SSRF, and Authentication flaws
  3. Combine Techniques: Chain lower-severity bugs for critical impact
  4. Stay Updated: New vulnerability classes emerge regularly—keep learning!

Leave a Reply

Your email address will not be published. Required fields are marked *