iFrame Injection XSS An iframe is a HTML webpage that is embedded inside another webpage on a website, allowing for the inclusion of content from external sources, such as advertising, on webpages. Insecure Application Design Insecure Application Design refers to the risks related to missing or ineffective design controls and architectural flaws in application development. Insufficient Logging and Monitoring Insufficient logging and monitoring refers to a security event not being correctly detected, logged and monitored to ensure adequate and timely response to the incident or breach. IP reputation An IP address with a strong history of non-malicious activity, for example, that has never been associated with malicious behaviour or malware... JavaScript Challenge JavaScript Challenge is a method that is used in DDoS mitigation to filter out requests that are characteristic of a botnet or other malicious computer. jQuery Injection jQuery is a small, fast, feature-rich JavaScript library ('write less, do more') commonly used in web applications. jQuery takes a lot of common tasks that require many lines of JavaScript ... Kubernetes Kubernetes, also known as K8s, is a portable, extensible, open-source orchestration tool for automating deployment, scaling, and management of containerized applications. LDAP Injection LDAP injection is a code injection technique used to exploit web applications which could reveal sensitive user information or modify information represented in the LDAP (Lightweight Directory Access Protocol) data stores. Previous ... 7 8 9 10 11 12 ... Next 7 8 9
iFrame Injection XSS An iframe is a HTML webpage that is embedded inside another webpage on a website, allowing for the inclusion of content from external sources, such as advertising, on webpages.
Insecure Application Design Insecure Application Design refers to the risks related to missing or ineffective design controls and architectural flaws in application development.
Insufficient Logging and Monitoring Insufficient logging and monitoring refers to a security event not being correctly detected, logged and monitored to ensure adequate and timely response to the incident or breach.
IP reputation An IP address with a strong history of non-malicious activity, for example, that has never been associated with malicious behaviour or malware...
JavaScript Challenge JavaScript Challenge is a method that is used in DDoS mitigation to filter out requests that are characteristic of a botnet or other malicious computer.
jQuery Injection jQuery is a small, fast, feature-rich JavaScript library ('write less, do more') commonly used in web applications. jQuery takes a lot of common tasks that require many lines of JavaScript ...
Kubernetes Kubernetes, also known as K8s, is a portable, extensible, open-source orchestration tool for automating deployment, scaling, and management of containerized applications.
LDAP Injection LDAP injection is a code injection technique used to exploit web applications which could reveal sensitive user information or modify information represented in the LDAP (Lightweight Directory Access Protocol) data stores.