OWASP Top 10 list

External Data threats

  • stored XSS: malicious code is stored in database
  • Reflected XSS: code in browser use unsanitized input directly. Those input could cause harm.
  • DOM XSS: be aware of ways uncontrollable data could be included on the page

Infrastructure threats

ID threats

Other threats

--

--

--

Software Engineer

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

AWS SAA-C02 Updates

{UPDATE} Impulse! - Brick breaker Hack Free Resources Generator

How to Install and Run Your Own Private VPN Server for Extra Security Online

{UPDATE} 장기도사 Hack Free Resources Generator

WordPress and Joomla are still the easiest targets to hack

Security, Connectivity, and Privacy: Plume’s CEO on the Importance of Smart Homes in the World of…

HackTheBox | Apocalyst CTF Writeup

A New Approach to Fraud Credit Card Transaction Prevention

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Steve Mu

Steve Mu

Software Engineer

More from Medium

A survival guide beyond the code, master these five steps first

How to micromanage effectively in a remote workplace

How I tried to find an idea for a side project in a place of work.

5 BEST SALESFORCE ADOPTION STRATEGIES TO BOOST THE ROI