Page 5 - D:\Lori\Documents\CyberSMR24Aug2020\
P. 5
Click on each of the following boxes to learn more about the more common vulnerabilities
In summary
In recent years, we are seeing leading
Types of vulnerabilities and threats companies educate their developers on
Click each input validation to learn more. strategies to develop more secure
Input validation Input Validation application, plus technology solutions
are available to scan application code to
Command injection Path or Directory Traversal identify potential exposures. This is to
Parameter validation Unicode Encoding Having a basic knowledge of these
vulnerabilities and threats will support
Session management URL Encoding your evaluation of a client’s secure
coding practices, and in the review of
Replay attack Buffer Overflow reports issued in conjunction with
attack and penetration engagements.
SQL Injection
Client side validation Click each of the three types of XSS vulnerabilities.
Cross-site scripting (XSS) Types of XSS Vulnerabilities
Nonpersistent XSS vulnerabilities, or
reflected vulnerabilities
Persistent XSS vulnerabilities, stored
or second order vulnerabilities
DOM (Document Object Model) or
local cross-site scripting