Written by Jakub Maslowski for Zone-h ORG
1. Cross site scripting (XSS)
2. Injection flaws
3. Malicious file execution
4. Insecure direct object reference
5. Cross site request forgery
6. Information leakage and improper error handling
7. Broken authentication and session management
8. Insecure cryptographic storage
9. Insecure communications
10. Failure to restrict URL access
View more information here :
http://www.zone-h.org/content/view/14865/1/
Exploit just the begining ,
u may stop them with several patch ,
but for the hacking konsep ,
i dont think so
No comments:
Post a Comment