Secure coding — Part 1

With the increasing complexity of business applications, there is a need to establish clear and concise requirements for secure coding practices.

Content

- Bypass application input validation.
- XSS cross-site scripting.
- SQL injection.
- Command injection.
- Log injection.
- HTTP response splitting.