{"id":18464855,"url":"https://github.com/acceis/vulnerable-code-snippets","last_synced_at":"2025-10-11T18:10:44.024Z","repository":{"id":110848806,"uuid":"598104066","full_name":"Acceis/vulnerable-code-snippets","owner":"Acceis","description":"Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.","archived":false,"fork":false,"pushed_at":"2023-09-04T08:46:22.000Z","size":47,"stargazers_count":22,"open_issues_count":0,"forks_count":6,"subscribers_count":2,"default_branch":"master","last_synced_at":"2025-04-30T19:50:26.832Z","etag":null,"topics":["appsec","avcs","brokencode","codereview","codesnippet","infosec","pentesting","securityexplained","vulnerablecode"],"latest_commit_sha":null,"homepage":"https://acceis.github.io/avcs-website/","language":"Ruby","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Acceis.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2023-02-06T12:09:40.000Z","updated_at":"2025-04-07T10:45:52.000Z","dependencies_parsed_at":"2024-11-06T09:11:24.990Z","dependency_job_id":"40ea3da7-0125-4edb-a309-03016887e94d","html_url":"https://github.com/Acceis/vulnerable-code-snippets","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/Acceis/vulnerable-code-snippets","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Acceis%2Fvulnerable-code-snippets","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Acceis%2Fvulnerable-code-snippets/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Acceis%2Fvulnerable-code-snippets/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Acceis%2Fvulnerable-code-snippets/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Acceis","download_url":"https://codeload.github.com/Acceis/vulnerable-code-snippets/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Acceis%2Fvulnerable-code-snippets/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":279008298,"owners_count":26084428,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-11T02:00:06.511Z","response_time":55,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["appsec","avcs","brokencode","codereview","codesnippet","infosec","pentesting","securityexplained","vulnerablecode"],"created_at":"2024-11-06T09:11:19.822Z","updated_at":"2025-10-11T18:10:44.008Z","avatar_url":"https://github.com/Acceis.png","language":"Ruby","readme":"\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://www.acceis.fr/voy_content/uploads/2021/07/logo.svg\" alt=\"Logo ACCEIS\" width=\"200px\"\u003e\n\u003c/p\u003e\n\n# Vulnerable Code Snippets\n\n\u003e Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.\n\n**Website**: https://acceis.github.io/avcs-website/\n\n## Disclaimer\n\nThe code example showcased here are not suited for production use. You should run them on a secure environment. The code is intentionally vulnerable and is intended for learning purpose only.\n\n## Vulnerabilities\n\n**Open Redirect**:\n\n- n°1 - [open-redirect](open-redirect) folder\n\nRef.\n\n- [OWASP Cheat Sheet - Unvalidated Redirects and Forwards Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html)\n- [CWE-601: URL Redirection to Untrusted Site ('Open Redirect')](https://cwe.mitre.org/data/definitions/601.html)\n\n**Case Transformation Collision**\n\n- n°2 - [case-transformation-collision](case-transformation-collision) folder\n\nRef.\n\n- [CWE-179: Incorrect Behavior Order: Early Validation](https://cwe.mitre.org/data/definitions/179.html)\n- [UAX #15 - Unicode Normalization Forms](https://unicode.org/reports/tr15/)\n\n**Broken access control**\n\n- n°3 - [access-control](access-control) folder\n\nRef.\n\n- [CWE-284: Improper Access Control](https://cwe.mitre.org/data/definitions/284.html)\n- [CWE-178: Improper Handling of Case Sensitivity](https://cwe.mitre.org/data/definitions/178.html)\n- [CWE-1289: Improper Validation of Unsafe Equivalence in Input](https://cwe.mitre.org/data/definitions/1289.html)\n\n**SSRF**\n\n- n°4 - [inconsistent-values](inconsistent-values) folder\n\nRef.\n\n- [CWE-435: Improper Interaction Between Multiple Correctly-Behaving Entities](https://cwe.mitre.org/data/definitions/435.html)\n- [CWE-436: Interpretation Conflict](https://cwe.mitre.org/data/definitions/436.html)\n- [CWE-657: Violation of Secure Design Principles](https://cwe.mitre.org/data/definitions/657.html)\n- [CWE-637: Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')](https://cwe.mitre.org/data/definitions/637.html)\n- [CWE-807: Reliance on Untrusted Inputs in a Security Decision](https://cwe.mitre.org/data/definitions/807.html)\n- [CWE-182: Collapse of Data into Unsafe Value](https://cwe.mitre.org/data/definitions/182.html)\n- [CWE-754: Improper Check for Unusual or Exceptional Conditions](https://cwe.mitre.org/data/definitions/754.html)\n- [CWE-863: Incorrect Authorization](https://cwe.mitre.org/data/definitions/863.html)\n- [CWE-285: Improper Authorization](https://cwe.mitre.org/data/definitions/285.html)\n\n**SSRF**\n\n- n°5 - [dns-rebinding](dns-rebinding) folder\n\nRef.\n\n- [CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition](https://cwe.mitre.org/data/definitions/367.html)\n\n**Resource Injection**\n\n- n°6 - [authentication-bypass](authentication-bypass) folder\n\nRef.\n\n- [CWE-20: Improper Input Validation](https://cwe.mitre.org/data/definitions/20.html)\n- [CWE-914: Improper Control of Dynamically-Identified Variables](https://cwe.mitre.org/data/definitions/914.html)\n- [CWE-621: Variable Extraction Error](https://cwe.mitre.org/data/definitions/621.html)\n- [PHP - extract](https://www.php.net/manual/en/function.extract)\n\n**Local file disclosure**\n\n- n°7 - [local-file-disclosure](local-file-disclosure) folder\n\nRef.\n\n- [CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')](https://cwe.mitre.org/data/definitions/22.html)\n- [CWE-23: Relative Path Traversal](https://cwe.mitre.org/data/definitions/23.html)\n- [CWE-73: External Control of File Name or Path](https://cwe.mitre.org/data/definitions/73.html)\n- [CWE-183: Permissive List of Allowed Inputs](https://cwe.mitre.org/data/definitions/183.html)\n- [CWE-625: Permissive Regular Expression](https://cwe.mitre.org/data/definitions/625.html)\n- [CWE-706: Use of Incorrectly-Resolved Name or Reference](https://cwe.mitre.org/data/definitions/706.html)","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Facceis%2Fvulnerable-code-snippets","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Facceis%2Fvulnerable-code-snippets","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Facceis%2Fvulnerable-code-snippets/lists"}