What is this?

Pwn The Notes is a web security vulnerability knowledge library that systematically classifies over 100 web vulnerability classes into 13 categories. Unlike conventional cheat sheets or CVE lists, each topic is organized based on structural mutation criteria — what is mutated, what mismatch results, and where it is exploited as an attack.

Each topic is an in-depth structured reference document, covering the entire attack surface of a vulnerability class through a three-axis taxonomy (Mutation Target, Bypass/Mismatch Type, Attack Scenario).

Topics

Injection

CategoryDescription
SQL InjectionSQL injection mutation vectors and filter bypass taxonomy
NoSQL InjectionNoSQL injection operators, syntax variations, and blind extraction
Command InjectionOS command injection chaining, filter evasion, and shell-specific mutations
XSSContext-dependent Cross-Site Scripting payloads and filter bypasses
SSTIServer-Side Template Injection in various template engines
EL InjectionExpression Language injection in Java EE / Spring ecosystem
XXEXML External Entity injection, OOB exfiltration, and parser differentials
XPath InjectionQuery injection mutation taxonomy on LDAP and XPath
Prototype PollutionJavaScript prototype chain pollution vectors and gadget chains
GraphQLGraphQL introspection abuse, batching attacks, and injection vectors
LaTeX InjectionLaTeX injection mutation vectors and document processing exploitation
Protocol-Level InjectionProtocol-level injection on SMTP, LDAP, and other wire protocols
XSLT InjectionServer-Side Includes, Edge Side Includes, and XSLT injection for RCE
ORM Misuse → SQL InjectionORM query function misuse leading to SQL injection
CSV Formula InjectionSpreadsheet formula injection through CSV/Excel export functionality
CSS InjectionCSS-based data exfiltration and style injection attacks

Authentication & Authorization

CategoryDescription
Authentication Bypass & SSOAuthentication bypass patterns and Single Sign-On mechanisms.
OAuthOAuth 2.0 flow exploitation and token theft patterns.
JWTJSON Web Token algorithm confusion, key injection, and claim abuse.
SAMLSAML assertion forgery, signature wrapping, and parser differentials.
CORS MisconfigurationCross-Origin Resource Sharing misconfiguration exploitation patterns.
BOLABroken Object Level Authorization and reference manipulation.
Account TakeoverAuthentication bypass chains and account recovery exploitation.
Mass AssignmentParameter binding abuse and hidden field injection.
Cryptographic Implementation VulnerabilitiesCryptographic implementation vulnerabilities in web contexts and bypass patterns.