1. Injection vulnerability
1.1 SQL Injection Vulnerability
1.2 XSS Vulnerability
1.3 Command Injection vulnerability
1.4 HTTP Response Header Injection Vulnerability
1.5 Jump Vulnerability
1.6 XML Injection Vulnerability
2. Information Disclosure Vulnerability
2.1 PHPInfo () Information Disclosure Vulnerability
2.2 test page leaks out of network vulnerability
2.3 Backup file leaks out of network vulnerability
2.4 Version Management tool file Information Disclosure Vulnerability
2.5 HTTP Authentication Disclosure Vulnerability
2.6 Managing a Background disclosure vulnerability
2.7 Leaking employee e-mail Vulnerability and extension number
2.8 Error Details Disclosure vulnerability
3. Request forgery of a vulnerability
4. Permission Control Vulnerability
4.1 File Upload Vulnerability
4.2 Crossdomain.xml improperly configured vulnerability
4.3 flash label improperly configured vulnerability
4.4 Embed label improperly configured vulnerability
4.5 Concurrency Vulnerability
4.6 Cookie Security vulnerability
4.7 Frame-proxy Attack Vulnerability
This article is from the "Sanr" blog, make sure to keep this source http://0x007.blog.51cto.com/6330498/1677020
Web vulnerability detection and remediation solutions