📖Web Attacks Documents
Explore common web attacks, their impacts, and recommended remediation techniques. Enhance your understanding of security vulnerabilities and fortify your web applications.
Name | Category | Severity |
---|---|---|
Injection | Critical | |
High | ||
Medium | ||
Injection | Critical | |
Medium | ||
Identification and Authentication Failures | High | |
Vulnerable and Outdated Components | Informational | |
Broken Access Control | High | |
Injection | Medium | |
Medium | ||
Broken Access Control | High | |
Broken Access Control | High | |
Injection | Medium | |
Medium | ||
Medium | ||
Medium | ||
N/A | ||
Critical | ||
Server-side request forgery (SSRF) | High | |
Injection | Critical | |
Injection | High | |
Cryptographic Failures | Medium | |
Cryptographic Failures | Medium | |
Medium | ||
Identification and Authentication Failures | High |
Last updated