Last updated：2020-05-22 11:32:19
|SQL injection||Deceives the server into executing malicious SQL commands by inserting them into the submitted Web form or the query string for a domain name or page request.|
|Cross-site Scripting (XSS)||Inserts malicious script codes into the web page, which will be executed during page browsing.|
|File-inclusion||Injects a malicious script or coding into the website, which is then executed on the server.|
|Remote command execution||The program fails to examine the input data strictly. Then, the attacker can control the command execution and intrude the system.|
|Sensitive data exposure||Obtains personal or enterprise’s sensitive data by exploiting system vulnerabilities.|
|Malicious scanning||Uses automatic scanners to exploit Web vulnerabilities.|
|Challenge collapsar (CC)||Uses a proxy server to generate and send standard HTTP requests to the targeted Web server frequently to exhaust the resources of the Web server.|
Did you find the above information helpful?
Please give us your feedback.
Thank you for your feedback.