OWASP Top 10 list

External Data threats

  • stored XSS: malicious code is stored in database
  • Reflected XSS: code in browser use unsanitized input directly. Those input could cause harm.
  • DOM XSS: be aware of ways uncontrollable data could be included on the page

Infrastructure threats

ID threats

Other threats

--

--

--

Software Engineer

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Scala Roadmap 2022

A Whole Lot of Honey(pots): Cross-Continent Honeypot Analysis

Write Up zh3r0 CTF 2020

{UPDATE} Games of Cards Hack Free Resources Generator

PointPay Mobile Crypto Banking Applications Launched

Welcome to the amazing story of the ✧STARGAZER✧ NFT’s!

Ownly House of Art: A Modern Gallery Through The Use of NFTs

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Steve Mu

Steve Mu

Software Engineer

More from Medium

Keeping Contact with Kyiv

5 Easy and Effective Ways to Maximize Profits | Episode 1 of 2 with Kenny Harper

Goal Setting Review for June-Dec 2021

11 Tasks to Outsource to a Virtual Assistant