Contents page.
The HTTP Protocol
Business Logic Flaws
Injection-Based Vulnerabilities
Authentication-Based Vulnerabilities
Authorisation-Based Vulnerabilities
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery (SSRF)
Clickjacking
Security Misconfigurations
File Inclusion Vulnerabilities
Insecure Coding Practices
Last updated 27 days ago