Top 10 Web Attacks

Injection Injection flaws, such as SQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data. Cross-Site Scripting (XSS) XSS flaws occur whenever an application takes untrusted data and