OWASP Top 10 list

External Data threats

  • stored XSS: malicious code is stored in database
  • Reflected XSS: code in browser use unsanitized input directly. Those input could cause harm.
  • DOM XSS: be aware of ways uncontrollable data could be included on the page

Infrastructure threats

ID threats

Other threats




Software Engineer

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

AWS SAA-C02 Updates

{UPDATE} Impulse! - Brick breaker Hack Free Resources Generator

How to Install and Run Your Own Private VPN Server for Extra Security Online

{UPDATE} 장기도사 Hack Free Resources Generator

WordPress and Joomla are still the easiest targets to hack

Security, Connectivity, and Privacy: Plume’s CEO on the Importance of Smart Homes in the World of…

HackTheBox | Apocalyst CTF Writeup

A New Approach to Fraud Credit Card Transaction Prevention

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Steve Mu

Steve Mu

Software Engineer

More from Medium

A survival guide beyond the code, master these five steps first

How to micromanage effectively in a remote workplace

How I tried to find an idea for a side project in a place of work.