• Home
  • Posts
  • Contact

Vulnerabilities

Table of Contents
  • How do we identify them?

OWASP

TODO add notes here.

  1. https://github.blog/2021-12-06-write-more-secure-code-owasp-top-10-proactive-controls/
  2. https://github.blog/2022-02-16-encoding-escaping-untrusted-data-prevent-injection-attacks/
  1. Cross Site Scripting attacks - XSS
  2. SQL injection

How do we identify them?

By looking at the checkmarx and other scan reports for the application.


Links to this note

  • Programming



© 2025 . Generated with Hugo and Mainroad theme.