Following the same approach as in Part 1, we aim to break down vulnerabilities and simplify them to the basic level of their nature and implications with examples and illustrations.
- Sensitive Data Exposure
- Missing Function Level Access Control
- Cross-Site Request Forgery (CSRF)
- Using Components with Known Vulnerabilities
- Unvalidated Redirects and Forwards