File Path Traversal A file path traversal attack (also known as directory traversal) is a web security vulnerability that allows an attacker to access files and directories that are stored outside the web root folder. Form Field Tampering Form field tampering (also known as form field manipulation) occurs when a hacker maliciously manipulates the form fields to change the data sent to a web server. Formjacking Formjacking is a type of cyber attack that occurs when hackers inject malicious JavaScript code into a webpage and take over the functionality of the site's form page, usually a payment form, to collect sensitive user information. Function Call Injection A function call injection attack consists of an insertion of a function name parameter from code running on the client-side to the application meaning that a successful injection can execute any built-in or user definted function. Headless Browser A headless browser is a web browser without a user interface. Headless browsers perform all the normal functions of a web page, such as clicking links, navigating pages, downloading and uploading a document... Heartbleed Heartbleed is caused by a vulnerability in OpenSSL cryptographic source code library. The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. HSTS HTTP Strict Transport Security (HSTS) is a is a web server directive that allows websites to state that they should only be accessed via a secure connection. HTML Fingerprinting HTML fingerprinting (also known as browser fingerprinting or Canvas fingerprinting) is a tracking technique used by websites which exploits the HTML5 canvas element to collect information about users, such as the browser... Previous 1 2 3 4 5 6 ... Next 4 5 6
File Path Traversal A file path traversal attack (also known as directory traversal) is a web security vulnerability that allows an attacker to access files and directories that are stored outside the web root folder.
Form Field Tampering Form field tampering (also known as form field manipulation) occurs when a hacker maliciously manipulates the form fields to change the data sent to a web server.
Formjacking Formjacking is a type of cyber attack that occurs when hackers inject malicious JavaScript code into a webpage and take over the functionality of the site's form page, usually a payment form, to collect sensitive user information.
Function Call Injection A function call injection attack consists of an insertion of a function name parameter from code running on the client-side to the application meaning that a successful injection can execute any built-in or user definted function.
Headless Browser A headless browser is a web browser without a user interface. Headless browsers perform all the normal functions of a web page, such as clicking links, navigating pages, downloading and uploading a document...
Heartbleed Heartbleed is caused by a vulnerability in OpenSSL cryptographic source code library. The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software.
HSTS HTTP Strict Transport Security (HSTS) is a is a web server directive that allows websites to state that they should only be accessed via a secure connection.
HTML Fingerprinting HTML fingerprinting (also known as browser fingerprinting or Canvas fingerprinting) is a tracking technique used by websites which exploits the HTML5 canvas element to collect information about users, such as the browser...