Some poorly designed website systems may contain many security vulnerabilities that can be exploited. These vulnerabilities are like opening a backdoor for remote attackers, allowing them to easily launch some malicious attacks. For example, CVE (Common Vulnerabilities and Exposures) published a vulnerability item of add_2_basket.asp on the Web page of Element InstantShop, remote attackers can modify the price information by hiding the form variable "price. The form is as follows: <input type = hidden name = "id" VALUE = "AUTO0034"> <input type = hidden name = "product" VALUE = "BMW545"> <input type = hidden name =" name "VALUE =" Expensive Car "> <input type = hidden name =" price "VALUE =" 100 "> exploit this vulnerability, malicious users can set the value of the price field at will and submit it to the backend server of the InstantShop website to obtain a BMW545 at $100. Tip: the best way to discover similar security vulnerabilities is to review the code. In addition to code review, testers can also use some testing tools, such as Paessler Site Inspector and Web Developer.