Common Vulnerabilities and Exploits Series - Episode 2 - POST RequestsConexNet TeamDec 31, 20191 min readUpdated: Jan 15, 2021POST requests without input sanitation can be used to manipulate a web page's HTML.
Comments