Page 5 - Cybersecurity_Flipbook_17Aug2020
P. 5
web-based vulnerabilities and threats.
PLACEHOLDER:
Types of vulnerabilities and threats
Click each input validation to learn more. Provide summary, context or
commentary for the web
Input validation Input Validation environment threats.
Command injection Path or Directory Traversal
Parameter validation Unicode Encoding
Session management URL Encoding
Replay attack Buffer Overflow
SQL Injection
Client side validation Click each of the three types of XSS vulnerabilities.
Cross-site scripting (XSS) Types of XSS Vulnerabilities
Nonpersistent XSS vulnerabilities, or
PLACEHOLDER: reflected vulnerabilities
Additional space for context or commentary, depending on needs.
Persistent XSS vulnerabilities, stored
or second order vulnerabilities
DOM (Document Object Model) or
local cross-site scripting