Content deleted Content added
Line 7:
=== Vulnerabilities ===
Even if we cannot enumerate all vulnerabilities that the webapps scanners are looking for, they are divided in 4 parts:
* [Input validation]/[Weaknesses]: [XSS], [SQL Injection], ...
* Logical flaws: [Cross-Site Request Forgery] (CSRF), ...
* Specific application problems
* Server configuration mistakes/errors: Path Disclosure ...
== Strengths and weaknesses ==
|