Penetration Test Penetration testing (also known as pen testing or ethical hacking) is a method for gaining assurance in the security of an IT system by attempting to breach some ... Persistent XSS Persistent Cross-site Scripting (also known as Persistent XSS or Stored XSS) is a type of Cross-Site Scripting (XSS) attack. Phar The PHAR format in PHP uses a single file format which can be used to store and execute multiple PHP code. PHP Configuration Exposure PHP configuration can be exposed when pdirectory indexing has not been disabled to the config or cgi-bin folders. PHP Deserialization Serialization is when an object in a programming language (such as PHP) is converted into a format that can be stored or transferred (much like a zip file). Whereas deserialization refers to the opposite ... PHP Injection PHP Object Injection is an application level vulnerability that could allow an attacker to perform different kinds of malicious attacks, such as Code Injection, SQL Injection... PHP-CGI Remote Code Execution PHP is a commonly used server-side scripting language used on website. PII (Personally Identifiable Information) Personal data only includes information relating to natural persons who can be identified or who are identifiable, directly from the information in question ... Previous ... 7 8 9 10 11 12 ... Next 10 11 12
Penetration Test Penetration testing (also known as pen testing or ethical hacking) is a method for gaining assurance in the security of an IT system by attempting to breach some ...
Persistent XSS Persistent Cross-site Scripting (also known as Persistent XSS or Stored XSS) is a type of Cross-Site Scripting (XSS) attack.
Phar The PHAR format in PHP uses a single file format which can be used to store and execute multiple PHP code.
PHP Configuration Exposure PHP configuration can be exposed when pdirectory indexing has not been disabled to the config or cgi-bin folders.
PHP Deserialization Serialization is when an object in a programming language (such as PHP) is converted into a format that can be stored or transferred (much like a zip file). Whereas deserialization refers to the opposite ...
PHP Injection PHP Object Injection is an application level vulnerability that could allow an attacker to perform different kinds of malicious attacks, such as Code Injection, SQL Injection...
PII (Personally Identifiable Information) Personal data only includes information relating to natural persons who can be identified or who are identifiable, directly from the information in question ...