1. Cross-Site
Scripting
2. Cross-Site Request
Forgery
3. SQL Injection
4. Remote File
Execution
5. Path Traversal
6. Known worms
7. Remote Command
Execution
8. Probes
9. Denial of Service
attacks
10. Compromised servers
11. Information Leakage
12. Content Spoofing
- Session Hijacking
- Link Injection
- Malware
Comments
Post a Comment
please enter true details, otherwise do not waste your time and our space