Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit fd0eb3a

Browse files
security
1 parent 91d4394 commit fd0eb3a

File tree

2 files changed

+11
-0
lines changed

2 files changed

+11
-0
lines changed

‎README.md‎

100644100755
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@
88
- [Stack](https://github.com/ankurjuneja/React-Java-Concepts/blob/master/DataStructures/Stack.md)
99
- [Multithreading](https://github.com/ankurjuneja/React-Java-Concepts/blob/master/Java/Multithreading.md)
1010
- Web
11+
- [Security](https://github.com/ankurjuneja/React-Java-Concepts/blob/master/Web-Issues-And-Monitoring/ApplicationSecurity.md)
1112
- [Common Issues](https://github.com/ankurjuneja/React-Java-Concepts/blob/master/Web-Issues-And-Monitoring/Common.md)
1213
- [Concepts](https://github.com/ankurjuneja/React-Java-Concepts/blob/master/Web-Issues-And-Monitoring/Concepts.md)
1314

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
**SQL injection**
2+
- what? insertion/injection of a sql query via the input data from the client/UI to the application/backend.
3+
- harm - attacker can read/modify sensitive data in database, execute administration operations on db.
4+
- how to prevent? use of prepared statements, use of stored procedures, allow-list input validation and
5+
escaping all user-supplied input.
6+
7+
**XSS**
8+
- what?
9+
- type of injection attack in which attacker uses a web application to send malicious code to a different user.
10+
- attacker uses XSS to send malicious script to an unsuspected user.

0 commit comments

Comments
(0)

AltStyle によって変換されたページ (->オリジナル) /