4. Common vulnerability attack and defenseΒΆ
- 4.1. SQL Injection
- 4.2. XSS
- 4.3. CSRF
- 4.4. SSRF
- 4.5. Command Injection
- 4.6. Directory Traversal
- 4.7. File reading
- 4.8. File Upload
- 4.9. File Include
- 4.10. XXE
- 4.11. Template Injection
- 4.12. Xpath injection
- 4.13. Logic Vulnerability / Business Vulnerability
- 4.14. Configuration and Policy Security
- 4.15. Middleware
- 4.16. Web Cache Spoofing Attack
- 4.17. HTTP Request Smuggling