syn-4ckSecurity Guidelines: Insecure Direct Object Reference (IDOR)Insecure direct object reference (IDOR) is a vulnerability related with broken authorization used by attackers that allows access to data…Feb 28Feb 28
syn-4ckSecurity Guidelines: Cross-Site Scripting (XSS)Cross-Site Scripting (XSS) is a vulnerability based on the injection of malicious scripts into a website in order for the victim to process…Feb 19Feb 19
syn-4ckSecurity Guidelines: SQL injectionSQL injection (SQLi) is a web vulnerability that allows an attacker to inject a malicious SQL query into an application’s relational…Feb 9Feb 9