PHP Injection PHP Object Injection is an application level vulnerability that could allow an attacker to perform different kinds of malicious attacks, such as Code Injection, SQL Injection... PHP-CGI Remote Code Execution PHP is a commonly used server-side scripting language used on website. PII (Personally Identifiable Information) Personal data only includes information relating to natural persons who can be identified or who are identifiable, directly from the information in question ... POODLE POODLE, short for Padding Oracle On Downgraded Legacy Encryption, is a security flaw that can be exploited to conduct a man-in-the-middle attack. Predictable Resource Locations Predictable Resource Location is an attack technique used to uncover hidden web site content and functionality. Privilege Escalation Privilege escalation is using a vulnerability such as a bug, design flaw, or configuration error in an application or operating system to gain privileges other than what was originally intended for the user. Protocol Violation Cyber security protocols are plans, protocols, actions and measures that aim to keep your organization safe from malicious attacks, data breaches and other security incidents. RASP (Runtime Application Self Protecting) Runtime application self-protection (RASP) is a security technology that is built or linked into an application or application runtime environment. Previous ... 13 14 15 16 17 18 ... Next 13 14 15
PHP Injection PHP Object Injection is an application level vulnerability that could allow an attacker to perform different kinds of malicious attacks, such as Code Injection, SQL Injection...
PII (Personally Identifiable Information) Personal data only includes information relating to natural persons who can be identified or who are identifiable, directly from the information in question ...
POODLE POODLE, short for Padding Oracle On Downgraded Legacy Encryption, is a security flaw that can be exploited to conduct a man-in-the-middle attack.
Predictable Resource Locations Predictable Resource Location is an attack technique used to uncover hidden web site content and functionality.
Privilege Escalation Privilege escalation is using a vulnerability such as a bug, design flaw, or configuration error in an application or operating system to gain privileges other than what was originally intended for the user.
Protocol Violation Cyber security protocols are plans, protocols, actions and measures that aim to keep your organization safe from malicious attacks, data breaches and other security incidents.
RASP (Runtime Application Self Protecting) Runtime application self-protection (RASP) is a security technology that is built or linked into an application or application runtime environment.